KEYWORDS: Chromium, Signal detection, Network security, Sensing systems, Information security, Networks, Computer security, Environmental sensing, Defense and security, Data fusion
In the CR networks, the unlicensed users can access the idle spectrum when they sense that licensed users are not using this spectrum. Due to the ability of dynamically reusing the spare spectrum resources, there is a remarkable increase of the spectrum utilization. However cognitive radio has brought new problems and concerns, especially in safety. Primary user emulation attack (PUEA) and Spectrum Sensing Data Falsity (SSDF) attack are typical attacks in spectrum sensing. In this paper we will give a detailed introduce of this two threats. Then we will represent some methods to weaken the effectiveness of these attacks.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.