Common Contracts

1 similar Transfer Agreement contracts

NETWORK ACCESS SECURITY POLICIES FOR COGNITIVE RADIO
Transfer Agreement • June 15th, 2008

In this paper we explore security access methods and techniques for Cognitive Radio (CR) and compare different methods for complexity of implementation, effectiveness and applicability. In Cognitive radio (CR), which changes frequency band of operation with software while technology is being developed and actually fielded in certain tactical applications and operations, security of accessing the spectrum is still undefined. With the cognitive approach any radio spectrum can be accessed with certain hardware and software combination. In order to use the spectrum efficiently, spectrum of use must be well defined for specific radio operation. Here, we first discuss different attacks in wireless communication at the physical layer. These generalized attacks apply to CR communications. The types of attacks are physical layer attacks which can cause network operation to malfunction or to stop completely. We then present three different methods for secured cognitive access over a defined spec

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!