DocumentCode
428100
Title
Securing dynamic spectrum use
Author
Cui, Minghao ; Syrotiuk, Violet R. ; Colbourn, Charles J.
Author_Institution
Dept. of Comput. Sci. & Eng., Arizona State Univ., Tempe, AZ, USA
Volume
2
fYear
2004
fDate
26-29 Sept. 2004
Firstpage
1153
Abstract
We consider the problem of securely utilizing dynamic temporal and spatial "holes" in the communications spectrum. Given a model of spectral availability, we consider the problems of secure link establishment, authentication, and a secure method to employ the holes. In a tactical environment, evading interception and detection (LPI/LPD) is critical; hence coding techniques are applied. A simulation study shows that our approach can interoperate within an existing architecture.
Keywords
codes; frequency allocation; message authentication; military communication; telecommunication security; authentication; coding techniques; communications spectrum; dynamic spectrum use; secure link establishment; spectral availability; spectrum allocation; tactical communications; Authentication; Availability; Computer science; Cryptography; Data security; Electrostatic precipitators; Fingerprint recognition; Protocols; Telecommunication traffic; Traffic control;
fLanguage
English
Publisher
ieee
Conference_Titel
Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th
ISSN
1090-3038
Print_ISBN
0-7803-8521-7
Type
conf
DOI
10.1109/VETECF.2004.1400202
Filename
1400202
Link To Document