Back to Results
First PageMeta Content
Technology / Wireless networking / Media Access Control / Carrier sense multiple access with collision avoidance / IEEE 802.11 / Cognitive radio / Distributed coordination function / Channel access method / Channel / Radio resource management / Telecommunications engineering / OSI protocols


Vulnerabilities of Cognitive Radio MAC Protocols and Countermeasures Yan Zhang and Loukas Lazos Dept. of Electrical and Computer Engineering, University of Arizona Email: ,
Add to Reading List

Document Date: 2013-03-07 17:47:49


Open Document

File Size: 1,01 MB

Share Result on Facebook

Company

Cognitive Radio / S&P / IEEE Journal / /

/

Facility

University of Arizona Email / /

IndustryTerm

mac protocol / spectrum management / dynamic spectrum access networks / coordination algorithms / Wireless Communications / wireless link signatures / neighbor discovery protocol / radio wireless networks / wireless networks / radio networks / energy / neighbor discovery protocols / wireless technologies / wireless ad hoc networks / energy detection / legacy systems / candidate solution / /

MusicGroup

Data / /

OperatingSystem

CTSs / DoS / /

Organization

National Science Foundation / University of Arizona Email / CR MAC / /

Person

Ruiliang Chen / Sofie Pollin / Jeffrey H. Reed / Haitao Zheng / Marwan Krunz / Guang-Hua Yang / Mingyan Li / Liangping Ma / Radha Poovendran / Patrick Tague / Jung-Min Park / Sisi Liu / Loukas Lazos / Michael Timmers / Antoine Dejonghe / Nitin H. Vaidya / Francky Catthoor / Xiaofeng Han / Jun Zhao / Chien-Chung Shen / Pradeep Kyasanur / Liesbet Van der Perre / Y. Thomas Hou / Yan Zhang / Kaigui Bian / /

Position

author / /

PublishedMedium

IEEE Communications Magazine / /

RadioStation

Radio MAC Protocols / /

Technology

CSMA/CA protocol / secure two-hop neighbor discovery protocol / promising technology / Wireless Communications / Dynamic open spectrum sharing MAC protocol / using bonding/aggregating technology / Quality of Service / MAC coordination algorithms / frequency hopping / Mobile Computing / promising enabling technology / wireless technologies / MAC protocol / simulation / secure two-hop neighbor discovery protocols / distributed multichannel MAC protocol / MAC protocols / /

SocialTag