In this dissertation, I examine the performance of a cognitive radio (CR) system in a hostile environment where an intelligent adversary tries to disrupt communications with a Gaussian noise signal. I analyze a cluster-based network of secondary users (SUs). The adversary can limit access for SUs by either transmitting a spoofing signal in the sensing interval, or a desynchronizing signal in the code acquisition interval. By jamming the network during the transmission interval, the adversary can reduce the rate of successful transmission.In the first part (Chapters 2 and 3), I investigate the optimal strategy for spoofing and jamming to minimize the SU throughput in a generic communication system. I investigate the system performance unde...
The increasing emergence of wireless applications along with the static spectrum allocation followed...
Wireless communication is one of the most booming industries right now. With its expansion all over ...
Cognitive radio networks are more susceptible to jamming attacks due to the nature of unlicensed use...
We examine the performance of a cognitive radio system in a hostile environment where an intelligent...
Cognitive radio (CR), which employs spectrum sensing technology to realize the spectrum reuse, holds...
We design the optimal jamming attack strategy for a cognitive radio network in the presence of path...
Cybersecurity has become a major concern in the modern world. A serious threat to wireless networks ...
© 2015 IEEE. Cognitive radio network is regarded as an emerging technology to solve \u27spectrum sca...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
Anti-jamming in cognitive radio networks (CRN) is mainly accomplished using machine learning techniq...
Graduation date: 2017Access restricted to the OSU Community, at author's request, from September 21,...
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportu...
Cognitive radio (CR), which provides dynamic spectrum access to combat spectrum scarcity, imposes so...
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportu...
Abstract—This paper describes an adaptation of cognitive radio technology for tactical wireless netw...
The increasing emergence of wireless applications along with the static spectrum allocation followed...
Wireless communication is one of the most booming industries right now. With its expansion all over ...
Cognitive radio networks are more susceptible to jamming attacks due to the nature of unlicensed use...
We examine the performance of a cognitive radio system in a hostile environment where an intelligent...
Cognitive radio (CR), which employs spectrum sensing technology to realize the spectrum reuse, holds...
We design the optimal jamming attack strategy for a cognitive radio network in the presence of path...
Cybersecurity has become a major concern in the modern world. A serious threat to wireless networks ...
© 2015 IEEE. Cognitive radio network is regarded as an emerging technology to solve \u27spectrum sca...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
Anti-jamming in cognitive radio networks (CRN) is mainly accomplished using machine learning techniq...
Graduation date: 2017Access restricted to the OSU Community, at author's request, from September 21,...
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportu...
Cognitive radio (CR), which provides dynamic spectrum access to combat spectrum scarcity, imposes so...
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportu...
Abstract—This paper describes an adaptation of cognitive radio technology for tactical wireless netw...
The increasing emergence of wireless applications along with the static spectrum allocation followed...
Wireless communication is one of the most booming industries right now. With its expansion all over ...
Cognitive radio networks are more susceptible to jamming attacks due to the nature of unlicensed use...