Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Adversary Detection For Cognitive Radio NetworksOverview of Adversary Detection in CR Networks

Adversary Detection For Cognitive Radio Networks: Overview of Adversary Detection in CR Networks [As discussed in Chap. 1, the PUE attack and the Byzantine attack are two severe security threats unique to the CR networks, and if not properly addressed, the functionality of the entire CR network will be demolished. With this consideration, advocators of the CR technology have devoted substantial research efforts to address these two security problems in the past decade. Most of them focus on how to detect and identify the adversaries; after all, detection and identification is usually the very first step to remove a security threat. The objective of this chapter is to provide an overview of the recent advancements in detecting these two disrupting attacks. Particularly, in the first part of this chapter, we intend to provide a systematic review of the existing PUE attack detection methods, and in the second part of this chapter, we will switch gear towards the Byzantine attack detection schemes.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Adversary Detection For Cognitive Radio NetworksOverview of Adversary Detection in CR Networks

Loading next page...
 
/lp/springer-journals/adversary-detection-for-cognitive-radio-networks-overview-of-adversary-v0OdyC0thl
Publisher
Springer International Publishing
Copyright
© The Author(s) 2018
ISBN
978-3-319-75867-1
Pages
19 –44
DOI
10.1007/978-3-319-75868-8_3
Publisher site
See Chapter on Publisher Site

Abstract

[As discussed in Chap. 1, the PUE attack and the Byzantine attack are two severe security threats unique to the CR networks, and if not properly addressed, the functionality of the entire CR network will be demolished. With this consideration, advocators of the CR technology have devoted substantial research efforts to address these two security problems in the past decade. Most of them focus on how to detect and identify the adversaries; after all, detection and identification is usually the very first step to remove a security threat. The objective of this chapter is to provide an overview of the recent advancements in detecting these two disrupting attacks. Particularly, in the first part of this chapter, we intend to provide a systematic review of the existing PUE attack detection methods, and in the second part of this chapter, we will switch gear towards the Byzantine attack detection schemes.]

Published: Mar 8, 2018

There are no references for this article.