We discuss some of the critical security and privacy threats that impact the dynamic spectrum sharing model, and present a taxonomy for classifying the various threats and the developed countermeasures.
To realize an effective enforcement entity in the spectrum sharing environment, we propose a crowd-sourcing mechanism to addresses the critical challenges which include little or no knowledge of transmission parameters.
To realize an effective enforcement entity in the spectrum sharing environment, we propose a crowd-sourcing mechanism to addresses the critical challenges which include little or no knowledge of transmission parameters.
We show that the addition of the controlled inter-symbol interference introduces redundancy in a message signal which can be utilized to embed an authentication signal without sacrificing message throughput or increasing power.
We develop novel techniques to enable a regulatory enforcement entity to uniquely identify a transmitter and collect verifiable evidence of a rogue transmission that can be used later during an adjudication process.
We show that the addition of the controlled inter-symbol interference introduces redundancy in a message signal which can be utilized to embed an authentication signal without sacrificing message throughput or increasing power.
We review some of the critical security and privacy threats that impact the dynamic spectrum sharing model, and propose a taxonomy for classifying the various threats and the developed countermeasures.
We develop a novel mechanism for embedding an authentication information into the transmitted waveform, which can be extracted by an enforcement entity without knowing the transmission parameters.
We show that the addition of the controlled inter-symbol interference introduces redundancy in a message signal which can be utilized to embed an authentication signal without sacrificing message throughput or increasing power.
We show that the duobinary signaling mechanism introduces redundancy in a message signal which can be utilized to embed an authentication signal without sacrificing message throughput or increasing power.