Adversary Detection For Cognitive Radio NetworksOverview of Adversary Detection in CR Networks
Adversary Detection For Cognitive Radio Networks: Overview of Adversary Detection in CR Networks
He, Xiaofan; Dai, Huaiyu
2018-03-08 00:00:00
[As discussed in Chap. 1, the PUE attack and the Byzantine attack are two severe security threats unique to the CR networks, and if not properly addressed, the functionality of the entire CR network will be demolished. With this consideration, advocators of the CR technology have devoted substantial research efforts to address these two security problems in the past decade. Most of them focus on how to detect and identify the adversaries; after all, detection and identification is usually the very first step to remove a security threat. The objective of this chapter is to provide an overview of the recent advancements in detecting these two disrupting attacks. Particularly, in the first part of this chapter, we intend to provide a systematic review of the existing PUE attack detection methods, and in the second part of this chapter, we will switch gear towards the Byzantine attack detection schemes.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/adversary-detection-for-cognitive-radio-networks-overview-of-adversary-v0OdyC0thl
Adversary Detection For Cognitive Radio NetworksOverview of Adversary Detection in CR Networks
[As discussed in Chap. 1, the PUE attack and the Byzantine attack are two severe security threats unique to the CR networks, and if not properly addressed, the functionality of the entire CR network will be demolished. With this consideration, advocators of the CR technology have devoted substantial research efforts to address these two security problems in the past decade. Most of them focus on how to detect and identify the adversaries; after all, detection and identification is usually the very first step to remove a security threat. The objective of this chapter is to provide an overview of the recent advancements in detecting these two disrupting attacks. Particularly, in the first part of this chapter, we intend to provide a systematic review of the existing PUE attack detection methods, and in the second part of this chapter, we will switch gear towards the Byzantine attack detection schemes.]
Published: Mar 8, 2018
Recommended Articles
Loading...
There are no references for this article.
Share the Full Text of this Article with up to 5 Colleagues for FREE
Sign up for your 14-Day Free Trial Now!
Read and print from thousands of top scholarly journals.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.