Academic literature on the topic 'Spectrum Access System Privacy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Spectrum Access System Privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Spectrum Access System Privacy"

1

Clark, Matthew A., and Konstantinos Psounis. "Trading Utility for Privacy in Shared Spectrum Access Systems." IEEE/ACM Transactions on Networking 26, no. 1 (February 2018): 259–73. http://dx.doi.org/10.1109/tnet.2017.2778260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Mengyuan, Jiming Chen, Shibo He, Lei Yang, Xiaowen Gong, and Junshan Zhang. "Privacy-Preserving Database Assisted Spectrum Access for Industrial Internet of Things: A Distributed Learning Approach." IEEE Transactions on Industrial Electronics 67, no. 8 (August 2020): 7094–103. http://dx.doi.org/10.1109/tie.2019.2938491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ahmed, Iqrar, Heikki Karvonen, Timo Kumpuniemi, and Marcos Katz. "Wireless Communications for the Hospital of the Future: Requirements, Challenges and Solutions." International Journal of Wireless Information Networks 27, no. 1 (October 28, 2019): 4–17. http://dx.doi.org/10.1007/s10776-019-00468-1.

Full text
Abstract:
Abstract In this conceptual paper, we discuss the concept of hospital of the future (HoF) and the requirements for its wireless connectivity. The HoF will be mostly wireless, connecting patients, healthcare professionals, sensors, computers and medical devices. Spaces of the HoF are first characterized in terms of communicational performance requirements. In order to fulfil the stringent requirements of future healthcare scenarios, such as enhanced performance, security, safety, privacy, and spectrum usage, we propose a flexible hybrid optical-radio wireless network to provide efficient, high-performance wireless connectivity for the HoF. We introduce the concept of connected HoF exploiting reconfigurable hybrid optical-radio networks. Such a network can be dynamically reconfigured to transmit and receive optical, radio or both signals, depending on the requirements of the application. We envisage that HoF will consist of numerous communication devices and hybrid optical-radio access points to transmit data using radio waves and visible light. Light-based communications exploit the idea of visible light communications (VLC), where solid-state luminaries, white light-emitting diodes (LEDs) provide both room illumination as well as optical wireless communications (OWC). The hybrid radio-optical communication system can be used in principle in every scenario of the HoF. In addition to the hybrid access, we also propose a reconfigurable optical-radio communications wireless body area network (WBAN), extending the conventional WBAN to more generic and highly flexible solution. As the radio spectrum is becoming more and more congested, hybrid wireless network approach is an attractive solution to use the spectrum more efficiently. The concept of HoF aims at enhancing healthcare while using hospital resources efficiently. The enormous surge in novel communication technologies such as internet of things (IoT) sensors and wireless medical communications devices could be undermined by spectral congestion, security, safety and privacy issues of radio networks. The considered solution, combining optical and radio transmission network could increase spectral efficiency, enhancing privacy while reducing patient exposure to radio frequency (RF). Parallel radio-optical communications can enhance reliability and security. We also discuss possible operation scenarios and applications that can be introduced in HoF as well as outline potential challenges.
APA, Harvard, Vancouver, ISO, and other styles
4

Sun, Guiling, Weijian Zhao, Ruobin Wang, and Xuanjie Li. "Design of Ethernet-VLC Data Conversion System Based on FPGA." International Journal of Computer Theory and Engineering 12, no. 3 (2020): 69–73. http://dx.doi.org/10.7763/ijcte.2020.v12.1266.

Full text
Abstract:
Visible light communication (VLC) has attracted people's attention due to its wide range of spectrum resources and good privacy in recent year. But research on visible light communication is mostly focused on LED materials, transfer protocol, transmission rates, etc. Lack of research that connect the visible light communications with existing communications methods. In this paper, we propose an Ethernet-visible data conversion system based on FPGA, including Ethernet interface logic, bit-width conversion logic, data buffer logic, and visible light communication transceiver logic. The proposed system achieves Ethernet and visible light access, and realizes 1000Mbps Ethernet data and 625Mbps visible light data conversion. Through buffer control, Ethernet data can be completely and reliably transmitted from high speed to low speed. By defining the structure of visible light communication frame and adding data self-recovery mechanism, data transmission has higher stability on the path of visible light. The feasibility of the system is proved by actual measurements.
APA, Harvard, Vancouver, ISO, and other styles
5

Vorakulpipat, Chalee, Soontorn Sirapaisan, Ekkachan Rattanalerdnusorn, and Visut Savangsuk. "A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives." Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/2057260.

Full text
Abstract:
Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD). However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy) to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.
APA, Harvard, Vancouver, ISO, and other styles
6

Zong Chen, Joy Iong, and Kong-Long Lai. "Internet of Things (IoT) Authentication and Access Control by Hybrid Deep Learning Method - A Study." December 2020 2, no. 4 (January 19, 2021): 236–45. http://dx.doi.org/10.36548/jscp.2020.4.005.

Full text
Abstract:
In the history of device computing, Internet of Things (IoT) is one of the fastest growing field that facing many security challenges. The effective efforts should have been made to address the security and privacy issues in IoT networks. The IoT devices are basically resource control device which provide routine attract impression for cyber attackers. The IoT participation nodes are increasing rapidly with more resource constrained that creating more challenging conditions in the real time. The existing methods provide an ineffective response to the tasks for effective IoT device. Also, it is an insufficient to involve the complete security and safety spectrum of the IoT networks. Because of the existing algorithms are not enriched to secure IoT bionetwork in the real time environment. The existing system is not enough to detect the proxy to the authorized person in the embedding devices. Also, those methods are believed in single model domain. Therefore, the effectiveness is dropping for further multimodal domain such as combination of behavioral and physiological features. The embedding intelligent technique will be securitizing for the IoT devices and networks by deep learning (DL) techniques. The DL method is addressing different security and safety problems arise in real time environment. This paper is highlighting hybrid DL techniques with Reinforcement Learning (RL) for the better performance during attack and compared with existing one. Also, here we discussed about DL combined with RL of several techniques and identify the higher accuracy algorithm for security solutions. Finally, we discuss the future direction of decision making of DL based IoT security system.
APA, Harvard, Vancouver, ISO, and other styles
7

Mitrea, Teodor, Vlad Vasile, and Monica Borda. "Mobile Applications - (in) Security Overview." International conference KNOWLEDGE-BASED ORGANIZATION 25, no. 3 (June 1, 2019): 42–45. http://dx.doi.org/10.2478/kbo-2019-0115.

Full text
Abstract:
Abstract Over the last years, there has been a real revolution of mobile devices, which has effectively translated into the exponential increase in internet access rates on a mobile device as opposed to accessing it on desktop systems. Given the growing importance of smartphones, it is important to assess the privacy and security risks of these devices in order to mitigate them. However, as we know, in modern mobile security architecture, applications represent the most critical elements. In this paper we review common mobile applications flaws involving network communications, data storage, user input handling and also exploring a number of vulnerabilities. While applications provide amazing features and benefits for users, they also represent the main attraction for cyber criminals. In order to have a true picture of the mobile security threat spectrum, this article presents the means of how mobile applications can impact systems security, stability and compromise personal data if they are not handled properly.
APA, Harvard, Vancouver, ISO, and other styles
8

Szydłowski, Dariusz, and Kamil Martyniak. "Contemporary threats related to content processing in the cyberspace." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 23, no. 1 (April 30, 2019): 13–17. http://dx.doi.org/10.5604/01.3001.0013.1759.

Full text
Abstract:
The Internet, as a social medium has a wide spectrum of applications. In general, the cyberspace serves as a provider of services, a commercial platform and the arena of social networking. On one hand, the Internet offers unlimited possibilities with respect to the access to all sources of information but, on the other hand, it can generate a series of threats to the established social and legal order. The threats may pertain to systems, data security, computer programs, users' privacy and intellectual property. Although the problem is important socially as well as politically, until recently the Polish literature on the subject did not address the issue of counteracting and punishing offences related to electronic data processing widely enough. The motivation behind this paper was recent social discourse on the free flow of information on the Internet and the multiplicity of controversies accompanying this topic.
APA, Harvard, Vancouver, ISO, and other styles
9

Petrenko, Christie LM, Jennifer Parr, Carson Kautz, Cristiano Tapparello, and Heather Carmichael Olson. "A Mobile Health Intervention for Fetal Alcohol Spectrum Disorders (Families Moving Forward Connect): Development and Qualitative Evaluation of Design and Functionalities." JMIR mHealth and uHealth 8, no. 4 (April 6, 2020): e14721. http://dx.doi.org/10.2196/14721.

Full text
Abstract:
Background Fetal alcohol spectrum disorders (FASD) affect approximately 2% to 5% of the US population. However, most families are unable to access FASD-informed interventions. Barriers to care include the lack of a knowledgeable and skilled workforce and family-level barriers such as limited financial resources, inability to access childcare, and stigma. As a result, families often try peer-to-peer and self-help support strategies. However, they often take these strategies from disparate sources, which have quite variable intervention quality and empirical support. Objective This study aimed to initiate systematic development and evaluation of a mobile health intervention (app) for caregivers raising children with FASD. Focus groups were conducted to elicit participant perspectives on app design and functionalities to inform further app development. Methods The app, called FMF Connect, was derived from the scientifically validated Families Moving Forward (FMF) Program, a clinician-delivered behavioral consultation intervention. FMF Connect was intended for caregiver self-delivery and included five main components: (1) Learning Modules, (2) Family Forum, (3) Library, (4) Notebook, and (5) Dashboard. Focus group methods were used to solicit perspectives from diverse families during the early stages of app development. Questions were asked about interface design, relevance of components and content, and perceived barriers and facilitators of use. A total of 25 caregivers participated in 7 focus groups across 5 US cities. Data were analyzed thematically. Results Focus group participants were generally enthusiastic about the app interface design and components. Four global positive impression themes emerged, including (1) ease of access, (2) how the app guides and organizes information, (3) connection to other users and information, and (4) ability to share some content with others. Themes arose not only in discussions relating to positive app features but also when participants were asked about motivators for app use. Participants related how these positive global themes could address some system-level barriers, such as limited access to services, feeling isolated, and increased advocacy needs related to the societal lack of FASD knowledge. Participants identified many positive features about individual app components and functionalities. They also communicated potential barriers to use and raised important concerns and considerations relating to several app components. These included recognizability of the app based on the logo, and the balance of following the planned intervention sequence versus obtaining immediate answers. Also mentioned were privacy and dynamics within the Family Forum. Conclusions FMF Connect is a promising novel intervention with potential to reach many families in need and reduce significant barriers to care, resulting in a broader public health impact. Study findings will guide further app development both in terms of content and technological advances to optimize intervention effects. FMF Connect app development provides useful directions for other apps aimed at changing parenting practices.
APA, Harvard, Vancouver, ISO, and other styles
10

Gwynette, McLeod Frampton, Danielle Morriss, Nancy Warren, James Truelove, Jennifer Warthen, Charles Paul Ross, George Mood, Charlotte Anne Snook, and Jeffrey Borckardt. "Social Skills Training for Adolescents With Autism Spectrum Disorder Using Facebook (Project Rex Connect): A Survey Study." JMIR Mental Health 4, no. 1 (January 23, 2017): e4. http://dx.doi.org/10.2196/mental.6605.

Full text
Abstract:
Background Adolescents with autism spectrum disorder (ASD) spend more time using electronic screen media than neurotypical peers; preliminary evidence suggests that computer-assisted or Web-based interventions may be beneficial for social skills acquisition. The current generation of adolescents accesses the Internet through computers or phones almost daily, and Facebook is the most frequently used social media platform among teenagers. This is the first research study to explore the use of Facebook as a therapeutic tool for adolescents with ASD. Objective To study the feasibility and clinical impact of using a Web-based social platform in combination with social skills training for adolescents with ASD. Methods This pilot study enrolled 6 participants (all males; mean age 14.1 years) in an online social skills training group using Facebook. Data was collected on the participants’ social and behavioral functioning at the start and conclusion of the intervention. Outcome measures included the Social Responsiveness Scale-2, the Social Skills Improvement System Rating Scale, and the Project Rex Parent Survey. Participants were surveyed at the conclusion of the intervention regarding their experience. Results No statistically significant differences in measurable outcomes were observed. However, the online addition of Facebook was well received by participants and their parents. The Facebook intervention was able to be executed with a careful privacy protocol in place and at minimal safety risk to participants. Conclusions The utilization of Facebook to facilitate delivery of social skills training for adolescents with ASD appears to be feasible, although the clinical impact of such an addition is still unclear. It is important to note that social difficulties of participants persisted with the addition of the online platform and participants still required assistance to engage with peers in an online environment. A Web-based intervention such as the one utilized in this study has the potential to reach a mass number of patients with ASD and could address disparities in access to in-person treatment services. However, the complexity and evolving nature of Facebook’s website and privacy settings leads to a number of unique online safety concerns that may limit its clinical utility. Issues encountered in our study support the development of an alternative and closed Web-based social platform designed specifically for the target audience with ASD; this platform could be a safer and more easily moderated setting for aiding in social skills development. Despite a small sample size with no statistically significant improvements of target symptoms, the use of electronic screen media as a therapeutic tool for adolescents with ASD is still a promising area of research warranting further investigation. Our study helps inform future obstacles regarding feasibility and safety.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Spectrum Access System Privacy"

1

Makin, Cameron. "Primary User Obfuscation in an Incumbent Informed Spectrum Access System." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104015.

Full text
Abstract:
With a growing demand for spectrum availability, spectrum sharing has become a high-profile solution to overcrowding. In order to enable spectrum sharing between incumbent/primary and secondary users, incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility for PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation scheme can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance.
Master of Science
With a growing demand for spectrum availability, wireless spectrum sharing has become a high-profile solution to spectrum overcrowding. In order to enable spectrum sharing between incumbent/primary (e.g.,federal communications, naval radar, users already grandfathered into the band) and secondary users (e.g., commercial communications companies), incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the incumbent informed SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility of PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation tactic can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance.
APA, Harvard, Vancouver, ISO, and other styles
2

Dou, Yanzhi. "Toward Privacy-Preserving and Secure Dynamic Spectrum Access." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/81882.

Full text
Abstract:
Dynamic spectrum access (DSA) technique has been widely accepted as a crucial solution to mitigate the potential spectrum scarcity problem. Spectrum sharing between the government incumbents and commercial wireless broadband operators/users is one of the key forms of DSA. Two categories of spectrum management methods for shared use between incumbent users (IUs) and secondary users (SUs) have been proposed, i.e., the server-driven method and the sensing-based method. The server-driven method employs a central server to allocate spectrum resources while considering incumbent protection. The central server has access to the detailed IU operating information, and based on some accurate radio propagation model, it is able to allocate spectrum following a particular access enforcement method. Two types of access enforcement methods -- exclusion zone and protection zone -- have been adopted for server-driven DSA systems in the current literature. The sensing-based method is based on recent advances in cognitive radio (CR) technology. A CR can dynamically identify white spaces through various incumbent detection techniques and reconfigure its radio parameters in response to changes of spectrum availability. The focus of this dissertation is to address critical privacy and security issues in the existing DSA systems that may severely hinder the progress of DSA's deployment in the real world. Firstly, we identify serious threats to users' privacy in existing server-driven DSA designs and propose a privacy-preserving design named P2-SAS to address the issue. P2-SAS realizes the complex spectrum allocation process of protection-zone-based DSA in a privacy-preserving way through Homomorphic Encryption (HE), so that none of the IU or SU operation data would be exposed to any snooping party, including the central server itself. Secondly, we develop a privacy-preserving design named IP-SAS for the exclusion-zone- based server-driven DSA system. We extend the basic design that only considers semi- honest adversaries to include malicious adversaries in order to defend the more practical and complex attack scenarios that can happen in the real world. Thirdly, we redesign our privacy-preserving SAS systems entirely to remove the somewhat- trusted third party (TTP) named Key Distributor, which in essence provides a weak proxy re-encryption online service in P2-SAS and IP-SAS. Instead, in this new system, RE-SAS, we leverage a new crypto system that supports both a strong proxy re-encryption notion and MPC to realize privacy-preserving spectrum allocation. The advantages of RE-SAS are that it can prevent single point of vulnerability due to TTP and also increase SAS's service performance dramatically. Finally, we identify the potentially crucial threat of compromised CR devices to the ambient wireless infrastructures and propose a scalable and accurate zero-day malware detection system called GuardCR to enhance CR network security at the device level. GuardCR leverages a host-based anomaly detection technique driven by machine learning, which makes it autonomous in malicious behavior recognition. We boost the performance of GuardCR in terms of accuracy and efficiency by integrating proper domain knowledge of CR software.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
3

Lu, Chang. "Inclusion of Priority Access in a Privacy-preserving ESC-based DSA System." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/84872.

Full text
Abstract:
According to the Federal Communications Commission's rules and recommendations set forth for the 3.5 GHz Citizens Broadband Radio Service, a three-tiered structure shall govern the newly established shared wireless band. The three tiers are comprised of three different levels of spectrum access; Incumbent Access, Priority Access and General Authorized Access. In accordance and fulfillment with this dynamic spectrum access framework, we present the inclusion of Priority Access tier into a two-tiered privacy-preserving ESC-based dynamic spectrum access system.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
4

Zabransky, Douglas Milton. "Incorporating Obfuscation Techniques in Privacy Preserving Database-Driven Dynamic Spectrum Access Systems." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/85001.

Full text
Abstract:
Modern innovation is a driving force behind increased spectrum crowding. Several studies performed by the National Telecommunications and Information Administration (NTIA), Federal Communications Commission (FCC), and other groups have proposed Dynamic Spectrum Access (DSA) as a promising solution to alleviate spectrum crowding. The spectrum assignment decisions in DSA will be made by a centralized entity referred to as as spectrum access system (SAS); however, maintaining spectrum utilization information in SAS presents privacy risks, as sensitive Incumbent User (IU) operation parameters are required to be stored by SAS in order to perform spectrum assignments properly. These sensitive operation parameters may potentially be compromised if SAS is the target of a cyber attack or an inference attack executed by a secondary user (SU). In this thesis, we explore the operational security of IUs in SAS-based DSA systems and propose a novel privacy-preserving SAS-based DSA framework, Suspicion Zone SAS (SZ-SAS), the first such framework which protects against both the scenario of inference attacks in an area with sparsely distributed IUs and the scenario of untrusted or compromised SAS. We then define modifications to the SU inference attack algorithm, which demonstrate the necessity of applying obfuscation to SU query responses. Finally, we evaluate obfuscation schemes which are compatible with SZ-SAS, verifying the effectiveness of such schemes in preventing an SU inference attack. Our results show SZ-SAS is capable of utilizing compatible obfuscation schemes to prevent the SU inference attack, while operating using only homomorphically encrypted IU operation parameters.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Yousi. "Spectrum Management Issues in Centralized and Distributed Dynamic Spectrum Access." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/104362.

Full text
Abstract:
Dynamic spectrum access (DSA) is a powerful approach to mitigate the spectrum scarcity problem caused by rapid increase in wireless communication demands. Based on architecture design, DSA systems can be categorized as centralized and distributed. To successfully enable DSA, both centralized and distributed systems have to deal with spectrum management issues including spectrum sensing, spectrum decision, spectrum sharing and spectrum mobility. Our work starts by investigating the challenges of efficient spectrum monitoring in centralized spectrum sensing. Since central controllers usually require the presence information of incumbent users/primary users (IUs) for decision making, which is obtained during spectrum sensing, privacy issues of IUs become big concerns in some DSA systems where IUs have strong operation security needs. To aid in this, we design novel location privacy protection schemes for IUs. Considering the general drawbacks of centralized systems including high computational overhead for central controllers, single point failure and IU privacy issues, in many scenarios, a distributed DSA system is required. In this dissertation, we also cope with the spectrum sharing issues in distributed spectrum management, specifically the secondary user (SU) power control problem, by developing distributed and secure transmit power control algorithms for SUs. In centralized spectrum management, the common approach for spectrum monitoring is to build infrastructures (e.g. spectrum observatories), which cost much money and manpower yet have relatively low coverage. To aid in this, we propose a crowdsourcing based spectrum monitoring system to capture the accurate spectrum utilization at a large geographical area, which leverages the power of masses of portable mobile devices. The central controller can accurately predict future spectrum utilization and intelligently schedule the spectrum monitoring tasks among mobile SUs accordingly, so that the energy of mobile devices can be saved and more spectrum activities can be monitored. We also demonstrate our system's ability to capture not only the existing spectrum access patterns but also the unknown patterns where no historical spectrum information exists. The experiment shows that our spectrum monitoring system can obtain a high spectrum monitoring coverage with low energy consumption. Environmental Sensing Capability (ESC) systems are utilized in DSA in 3.5 GHz to sense the IU activities for protecting them from SUs' interference. However, IU location information is often highly sensitive in this band and hence it is preferable to hide its true location under the detection of ESCs. As a remedy, we design novel schemes to preserve both static and moving IU's location information by adjusting IU's radiation pattern and transmit power. We first formulate IU privacy protection problems for static IU. Due to the intractable nature of this problem, we propose a heuristic approach based on sampling. We also formulate the privacy protection problem for moving IUs, in which two cases are analyzed: (1) protect IU's moving traces; (2) protect its real-time current location information. Our analysis provides insightful advice for IU to preserve its location privacy against ESCs. Simulation results show that our approach provides great protection for IU's location privacy. Centralized DSA spectrum management systems has to bear several fundamental issues, such as the heavy computational overhead for central controllers, single point failure and privacy concerns of IU caused by large amounts of information exchange between users and controllers and often untrusted operators of the central controllers. In this dissertation, we propose an alternative distributed and privacy-preserving spectrum sharing design for DSA, which relies on distributed SU power control and security mechanisms to overcome the limitations of centralized DSA spectrum management.
Doctor of Philosophy
Due to the rapid growth in wireless communication demands, the frequency spectrum is becoming increasingly crowded. Traditional spectrum allocation policy gives the unshared access of fixed bands to the licensed users, and there is little unlicensed spectrum left now to allocate to newly emerged communication demands. However, studies on spectrum occupancy show that many licensed users who own the license of certain bands are only active for a small percentage of time, which results in plenty of underutilized spectrum. Hence, a new spectrum sharing paradigm, called dynamic spectrum access (DSA), is proposed to mitigate this problem. DSA enables the spectrum sharing between different classes of users, generally, the unlicensed users in the DSA system can access the licensed spectrum opportunistically without interfering with the licensed users. Based on architecture design, DSA systems can be categorized as centralized and distributed. In centralized systems, a central controller will make decisions on spectrum usage for all unlicensed users. Whereas in distributed systems, unlicensed users can make decisions for themselves independently. To successfully enable DSA, both centralized and distributed DSA systems need to deal with spectrum management issues, such as resource allocation problems and user privacy issues, etc. The resource allocation problems include, for example, the problems to discover and allocate idle bands and the problems to control users' transmit power for successful coexistence. Privacy issues may also arise during the spectrum management process since certain information exchange is inevitable for global decision making. However, due to the Federal Communications Commission's (FCC) regulation, licensed users' privacy such as their location information must be protected in any case. As a result, dynamic and efficient spectrum management techniques are necessary for DSA users. In this dissertation, we investigate the above-mentioned spectrum management issues in both types of DSA systems, specifically, the spectrum sensing challenges with licensed user location privacy issues in centralized DSA, and the spectrum sharing problems in distributed DSA systems. In doing so, we propose novel schemes for solving each related spectrum management problem and demonstrate their efficacy through the results from extensive evaluations and simulations. We believe that this dissertation provides insightful advice for DSA users to solve different spectrum management issues for enabling DSA implementation, and hence helps in a wider adoption of dynamic spectrum sharing.
APA, Harvard, Vancouver, ISO, and other styles
6

Bhadriraju, Abhay Rao. "Misuse Detection in Dynamic Spectrum Access Networks." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/49259.

Full text
Abstract:
With dynamic spectrum access emerging as an important paradigm for efficient spectrum use, mechanisms are required to ensure disciplined spectrum access by secondary users. This must be done without requiring secondary users to disclose private data, such as their exact usage pattern or identities of parties involved. We formulate, design and evaluate a mechanism to collect spectrum activity information using a set of CPEs. A system design is presented which uses a number of techniques to address mobility and security issues involved in relying on CPEs to collect spectrum activity information. The system imposes an observation probability such that a rational cheater is dissuaded from spectrum misuse. The minimum number of CPEs required to impose this observation probability is determined by formulating it as an integer linear program. The security and privacy of this system is analyzed, along with simulation results to evaluate the quality of the solution. Based on the current design, directions for future work are identified and preliminary approaches are presented.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
7

Ullah, Abid. "Mechanisms for Enhancing Spectrum Utilization in a Spectrum Access System." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/84932.

Full text
Abstract:
The goal of this thesis is to build a Protected Shared Access Model (PSAM) through database enabled Spectrum Access System (SAS). A model for the SAS is proposed, which is based on our vision for the SAS as a more dynamic and responsive architecture as a geolocation database than the current TVWS database. Major functions and capabilities of the model include, calculations of exclusion zone (EZ) of primary users with different operational parameters, use interference estimation techniques for predicting interference levels that will be generated by the new secondary users (SUs) and existing systems operating in the database service area, allocate location based transmit power levels and provide an algorithm for communications among the PUs, SUs, and the SAS to implement management and authorization framework of spectrum resources to different types of SUs. The selection of a propagation model is of utmost importance in spectrum sharing studies. Existing literature on EZs with simplified propagation models does not consider the effect of LOS interference between the PU to SU link and SU to PU link on peak points in the terrain area around the PU. The use of a terrain profile based model captures the essence of propagation over irregular terrain. Terrain regions that are far away from the PU may have a LOS between the PU and SU. So its not only the nearest area where the PU/SU can get interference, but interference is present from areas further away on high grounds having a direct LOS with the PU antenna. The exclusion zone computation with terrain profile based propagation model captures this effect, and it is the same effect that makes the shape of the exclusion zone irregular. So the propagation model used in spectrum sharing studies must be able to use the terrain for the specific geographical area for precise propagation calculations, and provide statistical reliability parameters for the computed propagation values for area of interest. For a multi-tier shared access model with incumbent access (IA) users, priority access (PA) users and general authorized access (GAA) users. The SU interference tolerance thresholds varies by the type of SU's i-e., PA users like public safety systems and mission critical users have low tolerance for interference and hence need to operate further from the PU. While GAA users like commercial broadband systems have higher interference tolerances and can operate closer to the PU. This multi-tier shared access model requires varying levels of interference protection from PU, that can be provided with multiple exclusion zones defined for different types of SU's. We propose the concept of differential spectrum access hierarchy, and define it in the context of a multi-tiered EZs that are based on quantiles of tolerable interference levels for different tiers of SUs. We also quantify and show the gain in SU capacity (or throughput) obtained by using multi-tiered EZs for different tiers of SUs. Using simulation results, we show that the size of EZs can be significantly reduced with the use of a terrain profile-based propagation model that takes into account terrain profile for signal attenuation between PUs and SUs in the P2P link. The exclusion zones involve the use of interference test points at the circumference of the protection contour of the PU. They are monitoring test points that the SAS uses with a propagation model and locations of SUs to calculate interference. Consider a model of Figure 5.1, the coexistence environment with PU, SU and the SAS with a database. As more SUs enter the system, their transmit powers creates interference for the PUs. In the event of SU interference exceeding a predefined threshold level at any of the test points, the SAS uses an interference based power control algorithm to turnoff the nearest dominant interferer's. Turning off the dominant interferers eliminates interference generated by that node at the PU. This nearest node interference cancellation significantly reduces the outage probability at the PU. Unlike existing metrics for spectrum utilization efficiency that considers separate metrics for PU interference protection and maximum use of the band for secondary use, we define a new metric for spectrum utilization efficiency. This metric uses utility functions and cost functions to measure the impact of secondary use of the spectrum on PUs as well as the degree of satisfaction SUs can achieve from reuse of such spectrum. The new spectrum utilization metric is used to evaluate tradeoffs between interference protection of PUs and SU spectrum utilization.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
8

Ye, Yuxian. "Study of Sensing Issues in Dynamic Spectrum Access." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/90184.

Full text
Abstract:
Dynamic Spectrum Access (DSA) is now a commonly used spectrum sharing paradigm to mitigate the spectrum shortage problem. DSA technology allows unlicensed secondary users to access the unused frequency bands without interfering with the incumbent users. The key technical challenges in DSA systems lie in spectrum allocation problems and spectrum user's security issues. This thesis mainly focuses on spectrum monitoring technology in spectrum allocation and incumbent users' (IU) privacy issue. Spectrum monitoring is a powerful tool in DSA to help commercial users to access the unused bands. We proposed a crowdsourcing-based unknown IU pattern monitoring scheme that leverages the power of masses of portable mobile devices to reduce the cost of the spectrum monitoring and demonstrate the ability of our system to capture not only the existing spectrum access patterns but also the unknown patterns where no historical spectrum information exist. Due to the energy limit of the battery-based system, we then leverage solar energy harvesting and develop an energy management scheme to support our spectrum monitoring system. We also provide best privacy-protection strategies for both static and mobile IUs in terms of hiding their true location under the detection of Environmental Sensing Capabilities system. In this thesis, the heuristic approach for our mathematical formulations and simulation results are described in detail. The simulation results show our spectrum monitoring system can obtain a high spectrum monitoring coverage and low energy consumption. Our IU privacy scheme provides great protection for IU's location privacy.
Master of Science
Spectrum relates to the radio frequencies allocated to the federal users and commercial users for communication over the airwaves. It is a sovereign asset that is overseen by the government in each country to manage the radio spectrum and issue spectrum licenses. In addition, spectrum bands are utilized for various purposes because different bands have different characteristics. However, the overly crowded US frequency allocation chart shows the scarcity of usable radio frequencies. The actual spectrum usage measurements reflect that multiple prized spectrum bands lay idle at most time and location, which indicates that the spectrum shortage is caused by the spectrum management policies rather than the physical scarcity of available frequencies. Dynamic spectrum access (DSA) was proposed as a new paradigm of spectrum sharing that allows commercial users to access the abundant white spaces in the licensed spectrum bands to mitigate the spectrum shortage problem and increase spectrum utilization. In DSA, two of the key technical challenges lie in how to dynamically allocate the spectrum and how to protect spectrum users’ security. This thesis focuses on the development of two types of mechanisms for addressing the above two challenges: (1) developing efficient spectrum monitoring schemes to help secondary users (SU) to accurately and dynamically access the white space in spectrum allocation and (2) developing privacy preservation schemes for incumbent users (IU) to protect their location privacy. Specifically, we proposed an unknown IU pattern monitoring scheme that leverages the power of masses of portable mobile devices to reduce the cost of common spectrum monitoring systems. We demonstrate that our system can track not only the existing IU spectrum access patterns but also the unknown patterns where no historical spectrum information exists. We then leverage the solar energy harvesting and design energy management scheme to support our spectrum monitoring system. Finally, we provide a strategy for both static and mobile IUs to hide their true location under the monitoring of Environmental Sensing Capabilities systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Bahrak, Behnam. "Ex Ante Approaches for Security, Privacy, and Enforcement in Spectrum Sharing." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/24720.

Full text
Abstract:
Cognitive radios (CRs) are devices that are capable of sensing the spectrum and using its free portions in an opportunistic manner. The free spectrum portions are referred to as white spaces or spectrum holes. It is widely believed that CRs are one of the key enabling technologies for realizing a new regulatory spectrum management paradigm, viz. dynamic spectrum access (DSA). CRs often employ software-defined radio (SDR) platforms that are capable of executing artificial intelligence (AI) algorithms to reconfigure their transmission/reception (TX/RX) parameters to communicate efficiently while avoiding interference with licensed (a.k.a. primary or incumbent) users and unlicensed (a.k.a. secondary or cognitive) users. When different stakeholders share a common resource, such as the case in spectrum sharing, security, privacy, and enforcement become critical considerations that affect the welfare of all stakeholders. Recent advances in radio spectrum access technologies, such as CRs, have made spectrum sharing a viable option for significantly improving spectrum utilization efficiency. However, those technologies have also contributed to exacerbating the difficult problems of security, privacy and enforcement. In this dissertation, we review some of the critical security and privacy threats that impact spectrum sharing. We also discuss ex ante (preventive) approaches which mitigate the security and privacy threats and help spectrum enforcement.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
10

Maggenti, Mark A. "Spread spectrum satellite multiple access and overlay service." Thesis, Virginia Tech, 1987. http://hdl.handle.net/10919/45769.

Full text
Abstract:

This thesis presents two applications of spread spectrum technology to very small aperture terminal (VSAT) satellite communication networks. It describes two spread spectrum multiple access systems which use a form of noncoherent M-ary FSK (MFSK) as the primary modulation and analyzes their throughput. The analysis considers such factors as satellite power constraints and adjacent satellite interference. It considers the effect of onâ board processing on the multiple access efficiency and investigates the feasibility of overlaying low data rate spread spectrum signals on existing satellite traffic as a form of frequency reuse.


Master of Science
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Spectrum Access System Privacy"

1

Nagel, Wil. "Privacy schmrivacy?": Drafting privacy policy in an integrated justice environment (and why it's important) : Illinois Integrated Justice Information System. Chicago, Ill: Illinois Criminal Justice Information Authority, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Aleksandar, Damnjanovic, and Vojcic Branimir, eds. The cdma2000® system for mobile communications. Upper Saddle River, NJ: Prentice Hall PTR, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

G, Straus Susan, ed. Patient privacy, consent, and identity management in health information exchange: Issues for the military health system. Santa Monica, CA: RAND, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gounaris, Anieli. Spies and snitches: Electronic privacy protection and challenges. Hauppauge, N.Y: Nova Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Regulating the credit bureau system in South Korea: Toward new legislative approach to ensuring the accuracy and privacy of consumer credit information. 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Regulating the credit bureau system in South Korea: Toward new legislative approach to ensuring the accuracy and privacy of consumer credit information. [S.l: s.n., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Inc, QUALCOMM, and Telecommunications Industry Association. TR45 Committee., eds. Proposed wideband spread spectrum standard: Digital cellular system CDMA-analog dual-mode mobile station-base station compatibility standard. [United States]: QUALCOMM, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Svantesson, Dan Jerker B., and Rebecca Azzopardi. Systematic Government Access to Private-Sector Data in Australia. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190685515.003.0010.

Full text
Abstract:
The chapter provides a summary of Australian privacy law including the Privacy Act and the Australian Privacy Principles. After describing the national legal context and fundamental principles governing Australia’s federal system of government with power distributed among six states, two territories, and the federal government, it describes laws separately governing law enforcement and intelligence agencies, including the Australian Security Intelligence Organisation (ASIO). The authors suggest that, although the Australian government has a range of powers to obtain private-sector data, those powers appear primarily aimed at obtaining specific data for specific purposes. Little was found by way of direct unmediated access by the government to private-sector data or government access to private-sector data in bulk.
APA, Harvard, Vancouver, ISO, and other styles
9

Tsuchiya, Motohiro. Systematic Government Access to Private-Sector Data in Japan. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190685515.003.0013.

Full text
Abstract:
The Japanese legal system has been based on the German legal system since the mid-nineteenth century, but the American legal system was grafted onto it following Japan’s defeat in World War II in 1945. The postwar Constitution contained an article regarding the secrecy of communications and protected privacy in terms of respect of individuals. Now, as the Personal Information Protection Law in the Executive Branch, which was enacted in 1988, and the Personal Information Protection Law, which was enacted in 2003, strictly regulate privacy, there have been fewer problematic cases regarding governmental access to private-sector data. Data gathering for law enforcement or intelligence activities has also been weaker following World War II. Private-sector corporations/organizations might share data with government agencies, but based on voluntary arrangements, not by any mandatory system. More focus is being cast not on governmental access to private-sector data, but on citizen’s access to data.
APA, Harvard, Vancouver, ISO, and other styles
10

Information Security Theory and Practices Security and Privacy of Pervasive Systems and Smart Devices Lecture Notes in Computer Science. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Spectrum Access System Privacy"

1

Li, He, Yaling Yang, Yanzhi Dou, Chang Lu, Doug Zabransky, and Jung-Min Park. "Comparison of Incumbent User Privacy Preserving Technologies in Database Driven Dynamic Spectrum Access Systems." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 55–65. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-05490-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ardagna, Claudio Agostino, Sabrina De Capitani di Vimercati, Eros Pedrini, and Pierangela Samarati. "Privacy-Aware Access Control System: Evaluation and Decision." In Digital Privacy, 377–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19050-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cabrera, Annu. "Towards a National Remote Access System for Register-Based Research." In Privacy in Statistical Databases, 181–89. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45381-1_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Berthold, Oliver, Hannes Federrath, and Stefan Köpsell. "Web MIXes: A System for Anonymous and Unobservable Internet Access." In Designing Privacy Enhancing Technologies, 115–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44702-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sydor, John. "Coral Cognitive WiFi Networking System." In Opportunistic Spectrum Sharing and White Space Access, 123–40. Hoboken, NJ: John Wiley & Sons, Inc, 2015. http://dx.doi.org/10.1002/9781119057246.ch6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rohling, Hermann, Karsten Brüninghaus, and Rainer Grünheid. "Comparison of Multiple Access Schemes for an OFDM Downlink System." In Multi-Carrier Spread-Spectrum, 23–30. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4615-6231-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Spalka, Adrian, Armin B. Cremers, and Hartmut Lehmler. "Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System." In Information Security and Privacy, 1–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10718964_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kolter, Jan, Rolf Schillinger, and Günther Pernul. "A Privacy-Enhanced Attribute-Based Access Control System." In Data and Applications Security XXI, 129–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73538-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Islam, Muhammad Nazmul, Narayan B. Mandayam, Ivan Seskar, and Sastry Kompella. "System Power Minimization in Non-contiguous Spectrum Access." In Handbook of Cognitive Radio, 1–30. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-1389-8_24-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Islam, Muhammad Nazmul, Narayan B. Mandayam, Ivan Seskar, and Sastry Kompella. "System Power Minimization in Non-contiguous Spectrum Access." In Handbook of Cognitive Radio, 839–68. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-1394-2_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Spectrum Access System Privacy"

1

Dou, Yanzhi, He Li, Kexiong Curtis Zeng, Jinshan Liu, Yaling Yang, Bo Gao, and Kui Ren. "Preserving Incumbent Users’ Privacy in Exclusion-Zone-Based Spectrum Access Systems." In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017. http://dx.doi.org/10.1109/icdcs.2017.322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dou, Yanzhi, He Li, Kexiong Zeng, Jinshan Liu, Yaling Yang, Bo Gao, and Kui Ren. "Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access Systems." In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2016. http://dx.doi.org/10.1109/icdcs.2016.40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dou, Yanzhi, Kexiong (Curtis) Zeng, Yaling Yang, and Kui Ren. "Preserving incumbent users' privacy in exclusion-zone-based spectrum access systems." In MobiCom'16: The 22nd Annual International Conference on Mobile Computing and Networking. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2973750.2985283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Guan, Chaowen, Aziz Mohaisen, Zhi Sun, Lu Su, Kui Ren, and Yaling Yang. "When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access." In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017. http://dx.doi.org/10.1109/icdcs.2017.75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Troja, Erald, and Spiridon Bakiras. "Leveraging P2P interactions for efficient location privacy in database-driven dynamic spectrum access." In SIGSPATIAL '14: 22nd SIGSPATIAL International Conference on Advances in Geographic Information Systems. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2666310.2666477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Troja, Erald, and Joshua Gitter. "Privacy-preserving Crowd-sensing for Dynamic Spectrum Access." In MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM). IEEE, 2019. http://dx.doi.org/10.1109/milcom47813.2019.9020713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bahrak, Behnam, Sudeep Bhattarai, Abid Ullah, Jung-Min Jerry Park, Jeffery Reed, and David Gurney. "Protecting the primary users' operational privacy in spectrum sharing." In 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 2014. http://dx.doi.org/10.1109/dyspan.2014.6817800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Troja, Erald, and Ice Lin. "Fraud-resilient Privacy-preserving Crowd-sensing for Dynamic Spectrum Access." In 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring). IEEE, 2021. http://dx.doi.org/10.1109/vtc2021-spring51267.2021.9448648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Anjum, Md Monowar, and Noman Mohammed. "PAARS: Privacy Aware Access Regulation System." In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2020. http://dx.doi.org/10.1109/uemcon51285.2020.9298048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rajkarnikar, Nirajan, Jon M. Peha, and Ana Aguiar. "Location privacy from dummy devices in database-coordinated spectrum sharing." In 2017 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 2017. http://dx.doi.org/10.1109/dyspan.2017.7920796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography