Dissertations / Theses on the topic 'Cognitive radio networks – Security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 17 dissertations / theses for your research on the topic 'Cognitive radio networks – Security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
León, Abarca Olga. "Contributions to the security of cognitive radio networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2012. http://hdl.handle.net/10803/131053.
Full textAl-Talabani, Ali Mohammed Noori Hasan. "Enhancing physical layer security in cognitive radio networks." Thesis, King's College London (University of London), 2016. https://kclpure.kcl.ac.uk/portal/en/theses/enhancing-physical-layer-security-in-cognitive-radio-networks(d9036158-5310-4292-b93d-f542354269a7).html.
Full textYan, Qiben. "Security Enhanced Communications in Cognitive Networks." Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/49704.
Full textPh. D.
Chen, Changlong. "Robust and Secure Spectrum Sensing in Cognitive Radio Networks." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1383316543.
Full textChen, Ruiliang. "Enhancing Attack Resilience in Cognitive Radio Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26330.
Full textPh. D.
Sibomana, Louis. "Performance Analysis of Cognitive Radio Networks under Spectrum Sharing and Security Constraints." Doctoral thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-11739.
Full textBouallegue, Seifeddine. "Mobility and Security Management in Femtocell Networks." Thesis, Paris 6, 2016. http://www.theses.fr/2016PA066084/document.
Full textTelecommunications networks are subject to continuous improvement and enhancement processes. Every new iteration brings its set of challenges and limitations. In fact, the exponential growth in telecommunication devices, from base stations to user equipments lead to serious energy efficiency issues. Along with the privacy threats, especially for wireless networks as the channels used by operators can also be used by any eavesdropper. Spectrum usage optimization is also a challenge due to the fact that the available spectrum in wireless communications systems has been a very rare resource because of the increasing demand. Emerging networks, such as femtocells, suffer also from the previously mentioned challenges. The current thesis work focuses on proposing several solutions to the previously cited challenges: energy efficiency, spectrum sharing and security. The research work introduced in this thesis has focused on three main axes: First, find a way to minimize the energy consumption of femtocells in macro/femto-cellular BWA networks by decreasing the number of unwanted mobility events and introducing new power states for the femtocell device. Second, propose a solution that aims to reduce the expected transmission time within the dwell time of Secondary User (SU) in the coverage of a femtocell using an algorithm based on the minimum expected transmission time within the dwell time of the User Equipment (UE) in the coverage of the femtocell. Finally, introduce a new scheme that is based on best relay selection method that maximizes the secrecy rate and benefits from increasing the number of relays under QoS constraint at the destination
Chuku, Ejike E. "Security and Performance Engineering of Scalable Cognitive Radio Networks. Sensing, Performance and Security Modelling and Analysis of ’Optimal’ Trade-offs for Detection of Attacks and Congestion Control in Scalable Cognitive Radio Networks." Thesis, University of Bradford, 2019. http://hdl.handle.net/10454/18448.
Full textJackson, David. "Exploiting Rogue Signals to Attack Trust-based Cooperative Spectrum Sensing in Cognitive Radio Networks." VCU Scholars Compass, 2013. http://scholarscompass.vcu.edu/etd/3072.
Full textLo, Brandon Fang-Hsuan. "Design and analysis of common control channels in cognitive radio ad hoc networks." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/50323.
Full textAl-Hraishawi, Hayder Abed Hussein. "DESIGN AND ANALYSIS OF COGNITIVE MASSIVE MIMO NETWORKS WITH UNDERLAY SPECTRUM SHARING." OpenSIUC, 2017. https://opensiuc.lib.siu.edu/dissertations/1412.
Full textDang, Hieu. "Adaptive multiobjective memetic optimization: algorithms and applications." Journal of Cognitive Informatics and Natural Intelligence, 2012. http://hdl.handle.net/1993/30856.
Full textFebruary 2016
Irianto, K. D., and Demetres D. Kouvatsos. "An investigation of performance versus security in cognitive radio networks with supporting cloud platforms." 2014. http://hdl.handle.net/10454/10651.
Full textThe growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Meanwhile, the licensed frequencies are idle most of the time. Cognitive radio is one of the solutions to solve those problems. Cognitive radio is a promising technology that allows the unlicensed users known as secondary users (SUs) to access licensed bands without making interference to licensed users or primary users (PUs). As cloud computing has become popular in recent years, cognitive radio networks (CRNs) can be integrated with cloud platform. One of the important issues in CRNs is security. It becomes a problem since CRNs use radio frequencies as a medium for transmitting and CRNs share the same issues with wireless communication systems. Another critical issue in CRNs is performance. Security has adverse effect to performance and there are trade-offs between them. The goal of this paper is to investigate the performance related to security trade-off in CRNs with supporting cloud platforms. Furthermore, Queuing Network Models with preemptive resume and preemptive repeat identical priority are applied in this project to measure the impact of security to performance in CRNs with or without cloud platform. The generalized exponential (GE) type distribution is used to reflect the bursty inter-arrival and service times at the servers. The results show that the best performance is obtained when security is disabled and cloud platform is enabled.
Ohaeri, Ifeoma Ugochi. "Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri." Thesis, 2012. http://hdl.handle.net/10394/15665.
Full textThesis (M.Sc.(Computer Science) North-West University, Mafikeng Campus, 2012
Zhang, Y. "Enhancing the efficacy and security of emerging wireless systems." 2009. http://hdl.rutgers.edu/1782.2/rucore10001600001.ETD.000051933.
Full textSanjeev, G. "Spectrum Sensing Techniques For Cognitive Radio Applications." Thesis, 2015. http://etd.iisc.ernet.in/handle/2005/2647.
Full textNghiaLe, Trong, and 黎重義. "Security Information Technology of Physical Layer Based on Channel-tap Power for Mobile OFDM Systems and Cognitive Radio Networks." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/5wh563.
Full text國立成功大學
工程科學系
103
This dissertation investigates security information technologies for mobile orthogonal frequency division multiplexing (OFDM) systems and OFDM-based cognitive radio (CR) networks. Traditionally, security is viewed as an independent feature addressed above the physical layer (PHY). All widely used cryptographic protocols are established assuming the PHY layer is merely used to provide an error-free link. However, with the emergence of ad-hoc and decentralized networks, higher-layer security techniques are complex and hard to be implemented. To complement and enhance traditional security mechanism, we study novel schemes for OFDM systems and CR networks based on the channel power-delay profile (PDP), considering channel time and frequency selectivities. More specifically, the PHY layer, employing the properties of OFDM signals over time-variant and multipath fading channels, is aimed to assist the overall authentication process. To identify different transmitters (TXs), we employ the hypothesis test based on their PDPs to distinguish different transmission terminals in OFDM systems and primary user emulation attacks (PUEA) in OFDM-based CR networks. The proposed PDP estimation is obtained based on the redundancy of cyclic prefix (CP), which is a common feature for almost all OFDM systems. In OFDM systems, it is advantageous to use the PDP as the wireless signature, because it depends on the surrounding environment and is therefore considered to be very hard to mimic. In OFDM-based CR networks, channel-tap power is utilized as a radio-frequency fingerprint (RF) to directly detect users via PHY layer. To improve the detection performance of PHY layer in fading channels, the cooperative detection schemes using the fixed sample size test (FSST) and the sequential probability ratio test (SPRT) are devised for CR networks. Although different users can be distinguished, it is still impossible to exactly tell identity of a TX as primary user (PU) or PUEA using only PHY layer. Hence, to accurately know identities of PUs and PUEAs, the cross-layer intelligent learning ability of a mobile secondary user (SU) is exploited to establish detection databases by seamlessly combining the quick detection of PHY layer with the accuracy of higher layer authentication. The proposed methods helps PHY layer completely detect the identities of PUs and PUEAs. Finally, the performances are analyzed, and simulations confirm the advantages of the proposed methods.