Dynamic Spectrum Sharing

Policy enforcement in dynamic spectrum sharing

We discuss some of the critical security and privacy threats that impact the dynamic spectrum sharing model, and present a taxonomy for classifying the various threats and the developed countermeasures.

Crowd-sourced authentication for enforcement in dynamic spectrum sharing

To realize an effective enforcement entity in the spectrum sharing environment, we propose a crowd-sourcing mechanism to addresses the critical challenges which include little or no knowledge of transmission parameters.

Enforcement in spectrum sharing: Crowd-sourced blind authentication of co-channel transmitters

To realize an effective enforcement entity in the spectrum sharing environment, we propose a crowd-sourcing mechanism to addresses the critical challenges which include little or no knowledge of transmission parameters.

Transmitter authentication using hierarchical modulation in dynamic spectrum sharing

We show that the addition of the controlled inter-symbol interference introduces redundancy in a message signal which can be utilized to embed an authentication signal without sacrificing message throughput or increasing power.

Transmitter authentication in dynamic spectrum sharing

We develop novel techniques to enable a regulatory enforcement entity to uniquely identify a transmitter and collect verifiable evidence of a rogue transmission that can be used later during an adjudication process.

PHY-layer authentication using duobinary signaling for spectrum enforcement

We show that the addition of the controlled inter-symbol interference introduces redundancy in a message signal which can be utilized to embed an authentication signal without sacrificing message throughput or increasing power.

Security and enforcement in spectrum sharing

We review some of the critical security and privacy threats that impact the dynamic spectrum sharing model, and propose a taxonomy for classifying the various threats and the developed countermeasures.

Blind transmitter authentication for spectrum security and enforcement

We develop a novel mechanism for embedding an authentication information into the transmitted waveform, which can be extracted by an enforcement entity without knowing the transmission parameters.

PHY-layer authentication using hierarchical modulation and duobinary signaling

We show that the addition of the controlled inter-symbol interference introduces redundancy in a message signal which can be utilized to embed an authentication signal without sacrificing message throughput or increasing power.

PHY-layer authentication by introducing controlled inter symbol interference

We show that the duobinary signaling mechanism introduces redundancy in a message signal which can be utilized to embed an authentication signal without sacrificing message throughput or increasing power.