Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Revenue generation for truthful spectrum auction in dynamic spectrum access
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Spectrum auction framework for access allocation in cognitive radio networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
A technical framework for light-handed regulation of cognitive radios
IEEE Communications Magazine
Improving wireless physical layer security via cooperating relays
IEEE Transactions on Signal Processing
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Clearing the RF smog: making 802.11n robust to cross-technology interference
Proceedings of the ACM SIGCOMM 2011 conference
Enforcing dynamic spectrum access with spectrum permits
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
A Geometric Interpretation of Fading in Wireless Networks: Theory and Applications
IEEE Transactions on Information Theory
Counter-jamming using mixed mechanical and software interference cancellation
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
SP '13 Proceedings of the 2013 IEEE Symposium on Security and Privacy
Hi-index | 0.00 |
In Cognitive Radio Networks (CRNs) with dynamic spectrum access, it is of paramount importance to ensure the spectrum access rules are honestly followed by each secondary user. Existing approaches either require significant modifications to the system hardware, or can only deter the spectrum abuse from happening by punishing abusers after-the-fact, which is ineffective in reality as there lacks universal identification for each device. In this paper, we propose a novel spectrum access rule enforcing scheme by introducing a "spectrum guardian", who punishes abusers immediately on-the-scene through optimally jamming their signals using multiple antennas while without affecting the communication between primary users, thus removing abusers' incentive to exploit the spectrum for their own benefit. Our scheme requires no modifications to Commercial-Off-The-Shelf (COTS) CR devices, nor the need of device identification.