000826865 000__ 06393cam\a2200541Ii\4500 000826865 001__ 826865 000826865 005__ 20230306144424.0 000826865 006__ m\\\\\o\\d\\\\\\\\ 000826865 007__ cr\cn\nnnunnun 000826865 008__ 180315s2018\\\\sz\\\\\\ob\\\\000\0\eng\d 000826865 019__ $$a1028902600$$a1028950697$$a1028970603 000826865 020__ $$a9783319758688$$q(electronic book) 000826865 020__ $$a3319758683$$q(electronic book) 000826865 020__ $$z9783319758671 000826865 020__ $$z3319758675 000826865 0247_ $$a10.1007/978-3-319-75868-8$$2doi 000826865 035__ $$aSP(OCoLC)on1028731558 000826865 035__ $$aSP(OCoLC)1028731558$$z(OCoLC)1028902600$$z(OCoLC)1028950697$$z(OCoLC)1028970603 000826865 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dN$T$$dAZU$$dYDX$$dOCLCF$$dUPM$$dEBLCP$$dMERER 000826865 049__ $$aISEA 000826865 050_4 $$aTK5103.4815 000826865 08204 $$a621.382$$223 000826865 1001_ $$aHe, Xiaofan,$$eauthor. 000826865 24510 $$aAdversary detection for cognitive radio networks /$$cXiaofan He, Huaiyu Dai. 000826865 264_1 $$aCham, Switzerland :$$bSpringer,$$c2018. 000826865 300__ $$a1 online resource. 000826865 336__ $$atext$$btxt$$2rdacontent 000826865 337__ $$acomputer$$bc$$2rdamedia 000826865 338__ $$aonline resource$$bcr$$2rdacarrier 000826865 347__ $$atext file$$bPDF$$2rda 000826865 4901_ $$aSpringerBriefs in electrical and computer engineering,$$x2191-8112 000826865 504__ $$aIncludes bibliographical references. 000826865 5050_ $$aIntro; Preface; Contents; 1 Introduction; 1.1 Cognitive Radio Networks and Spectrum Sensing; 1.2 Overview of Security Vulnerabilities in CR Networks; 1.2.1 The PUE Attack; 1.2.2 The Byzantine Attack; 1.3 Summary; References; 2 Preliminaries of Analytical Tools; 2.1 Introduction; 2.2 Statistical Tools; 2.2.1 Sequential Hypothesis Testing; 2.2.2 Belief Propagation; 2.3 Machine Learning Tools; 2.3.1 Non-parametric Bayesian Classification; 2.3.2 Artificial Neural Networks; 2.3.3 Affinity Propagation; 2.4 Summary; References; 3 Overview of Adversary Detection in CR Networks; 3.1 Introduction 000826865 5058_ $$a3.2 PUE Attack Detection3.2.1 Localization Based Approaches; 3.2.1.1 Wireless Sensor Network Assisted Approach; 3.2.1.2 Joint Localization Approach; 3.2.2 Statistical Analysis Based Approaches; 3.2.2.1 Sequential Hypothesis Testing Approach; 3.2.2.2 Belief Propagation Based PUE Attack Detection; 3.2.2.3 Anomaly Behavior Detection; 3.2.3 Physical Layer Approaches; 3.2.3.1 Feature Based Classification Approach; 3.2.3.2 Wireless Feature Based Detection; 3.2.3.3 Channel-Based PUE Attack Detection; 3.2.3.4 Embedding Cryptographic Signatures; 3.2.3.5 Signal Watermarking 000826865 5058_ $$a3.2.4 Machine Learning Approach3.2.5 Other Defense Against PUE Attack; 3.3 Byzantine Attack Detection; 3.3.1 Reputation Based Detection; 3.3.1.1 Suspicious Level; 3.3.1.2 Outlier Factor; 3.3.1.3 Hierarchical Outlier Detection; 3.3.1.4 Trusted Sensor Assisted Reputation Mechanism; 3.3.1.5 Point System Based Detection; 3.3.2 Statistical Approach; 3.3.2.1 Statistical Behavior Comparison Based Approach; 3.3.2.2 Anomaly Behavior Detection; 3.3.2.3 Statistical Tests Based Approach; 3.3.2.4 Sequential Probability Ratio Test; 3.3.2.5 State Estimation Assisted Detection 000826865 5058_ $$a3.3.2.6 Exploiting Temporal Correlation3.3.2.7 Correlation Based Filtering; 3.3.2.8 Goodness-of-Fit Test; 3.3.2.9 Belief Propagation Based Detection; 3.3.2.10 Dempster-Shafer Theory Based Byzantine Attack Detection; 3.3.3 Machine Learning Approaches; 3.3.3.1 No-Regret Learning; 3.3.3.2 Classification Based Detection; 3.3.4 Other Defense Against Byzantine Attack; 3.4 Summary; References; 4 Case Study I: Link Signature Assisted PUE Attack Detection; 4.1 Introduction; 4.2 Background on Link Signature; 4.3 Authenticate the PU Signal at the Helper Node; 4.4 PUE Attack Detection; 4.5 Summary 000826865 506__ $$aAccess limited to authorized users. 000826865 520__ $$aThis SpringerBrief provides a comprehensive study of the unique security threats to cognitive radio (CR) networks and a systematic investigation of the state-of-the-art in the corresponding adversary detection problems. In addition, detailed discussions of the underlying fundamental analytical tools and engineering methodologies of these adversary detection techniques are provided, considering that many of them are quite general and have been widely employed in many other related fields. The exposition of this book starts from a brief introduction of the CR technology and spectrum sensing in Chapter 1. This is followed by an overview of the relevant security vulnerabilities and a detailed discussion of two security threats unique to CR networks, namely, the primary user emulation (PUE) attack and the Byzantine attack. To better prepare the reader for the discussions in later chapters, preliminaries of analytic tools related to adversary detection are introduced in Chapter 2. In Chapter 3, a suite of cutting-edge adversary detection techniques tailor-designed against the PUE and the Byzantine attacks are reviewed to provide a clear overview of existing research in this field. More detailed case studies are presented in Chapters 4 – 6. Specifically, a physical-layer based PUE attack detection scheme is presented in Chapter 4, while Chapters 5 and 6 are devoted to the illustration of two novel detection techniques against the Byzantine attack. Concluding remarks and outlooks for future research are provided in Chapter 7. The primary audience for this SpringerBrief include network engineers interested in addressing adversary detection issues in cognitive radio networks, researchers interested in the state-of-the-art on unique security threats to cognitive radio networks and the corresponding detection mechanisms. Also, graduate and undergraduate students interested in obtaining comprehensive information on adversary detection in cognitive radio networks and applying the underlying techniques to address relevant research problems can use this SpringerBrief as a study guide. . 000826865 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed March 19, 2018). 000826865 650_0 $$aCognitive radio networks. 000826865 650_0 $$aRadio frequency allocation. 000826865 7001_ $$aDai, Huaiyu,$$d1973-$$eauthor. 000826865 77608 $$iPrint version: $$z3319758675$$z9783319758671$$w(OCoLC)1020024954 000826865 830_0 $$aSpringerBriefs in electrical and computer engineering. 000826865 852__ $$bebk 000826865 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-75868-8$$zOnline Access$$91397441.1 000826865 909CO $$ooai:library.usi.edu:826865$$pGLOBAL_SET 000826865 980__ $$aEBOOK 000826865 980__ $$aBIB 000826865 982__ $$aEbook 000826865 983__ $$aOnline 000826865 994__ $$a92$$bISE