Securing dynamic spectrum use

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We consider the problem of securely utilizing the dynamic temporal and spatial "holes" in spectrum for communications. Given a model of spectral availability, we consider the problems of secure link establishment, authentication, and a secure method to employ the holes. In a tactical environment, evading interception and detection (LPI/LPD) is critical; hence coding techniques are applied. A simulation study shows that our approach can interoperate within an existing architecture.

Original languageEnglish (US)
Title of host publicationIEEE Vehicular Technology Conference
Pages1153-1157
Number of pages5
Volume60
Edition2
StatePublished - 2004
Event2004 IEEE 60th Vehicular Technology Conference, VTC2004-Fall: Wireless Technologies for Global Security - Los Angeles, CA, United States
Duration: Sep 26 2004Sep 29 2004

Other

Other2004 IEEE 60th Vehicular Technology Conference, VTC2004-Fall: Wireless Technologies for Global Security
CountryUnited States
CityLos Angeles, CA
Period9/26/049/29/04

Fingerprint

Authentication
Availability
Communication

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

Cui, M., Syrotiuk, V., & Colbourn, C. (2004). Securing dynamic spectrum use. In IEEE Vehicular Technology Conference (2 ed., Vol. 60, pp. 1153-1157)

Securing dynamic spectrum use. / Cui, Minghao; Syrotiuk, Violet; Colbourn, Charles.

IEEE Vehicular Technology Conference. Vol. 60 2. ed. 2004. p. 1153-1157.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cui, M, Syrotiuk, V & Colbourn, C 2004, Securing dynamic spectrum use. in IEEE Vehicular Technology Conference. 2 edn, vol. 60, pp. 1153-1157, 2004 IEEE 60th Vehicular Technology Conference, VTC2004-Fall: Wireless Technologies for Global Security, Los Angeles, CA, United States, 9/26/04.
Cui M, Syrotiuk V, Colbourn C. Securing dynamic spectrum use. In IEEE Vehicular Technology Conference. 2 ed. Vol. 60. 2004. p. 1153-1157
Cui, Minghao ; Syrotiuk, Violet ; Colbourn, Charles. / Securing dynamic spectrum use. IEEE Vehicular Technology Conference. Vol. 60 2. ed. 2004. pp. 1153-1157
@inproceedings{40e7c706bc5a4274ab300f84958a80a3,
title = "Securing dynamic spectrum use",
abstract = "We consider the problem of securely utilizing the dynamic temporal and spatial {"}holes{"} in spectrum for communications. Given a model of spectral availability, we consider the problems of secure link establishment, authentication, and a secure method to employ the holes. In a tactical environment, evading interception and detection (LPI/LPD) is critical; hence coding techniques are applied. A simulation study shows that our approach can interoperate within an existing architecture.",
author = "Minghao Cui and Violet Syrotiuk and Charles Colbourn",
year = "2004",
language = "English (US)",
volume = "60",
pages = "1153--1157",
booktitle = "IEEE Vehicular Technology Conference",
edition = "2",

}

TY - GEN

T1 - Securing dynamic spectrum use

AU - Cui, Minghao

AU - Syrotiuk, Violet

AU - Colbourn, Charles

PY - 2004

Y1 - 2004

N2 - We consider the problem of securely utilizing the dynamic temporal and spatial "holes" in spectrum for communications. Given a model of spectral availability, we consider the problems of secure link establishment, authentication, and a secure method to employ the holes. In a tactical environment, evading interception and detection (LPI/LPD) is critical; hence coding techniques are applied. A simulation study shows that our approach can interoperate within an existing architecture.

AB - We consider the problem of securely utilizing the dynamic temporal and spatial "holes" in spectrum for communications. Given a model of spectral availability, we consider the problems of secure link establishment, authentication, and a secure method to employ the holes. In a tactical environment, evading interception and detection (LPI/LPD) is critical; hence coding techniques are applied. A simulation study shows that our approach can interoperate within an existing architecture.

UR - http://www.scopus.com/inward/record.url?scp=17144429357&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=17144429357&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:17144429357

VL - 60

SP - 1153

EP - 1157

BT - IEEE Vehicular Technology Conference

ER -