• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 32
  • 6
  • 1
  • 1
  • Tagged with
  • 76
  • 76
  • 76
  • 53
  • 47
  • 37
  • 14
  • 13
  • 12
  • 11
  • 10
  • 10
  • 9
  • 9
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Incorporating Obfuscation Techniques in Privacy Preserving Database-Driven Dynamic Spectrum Access Systems

Zabransky, Douglas Milton 11 September 2018 (has links)
Modern innovation is a driving force behind increased spectrum crowding. Several studies performed by the National Telecommunications and Information Administration (NTIA), Federal Communications Commission (FCC), and other groups have proposed Dynamic Spectrum Access (DSA) as a promising solution to alleviate spectrum crowding. The spectrum assignment decisions in DSA will be made by a centralized entity referred to as as spectrum access system (SAS); however, maintaining spectrum utilization information in SAS presents privacy risks, as sensitive Incumbent User (IU) operation parameters are required to be stored by SAS in order to perform spectrum assignments properly. These sensitive operation parameters may potentially be compromised if SAS is the target of a cyber attack or an inference attack executed by a secondary user (SU). In this thesis, we explore the operational security of IUs in SAS-based DSA systems and propose a novel privacy-preserving SAS-based DSA framework, Suspicion Zone SAS (SZ-SAS), the first such framework which protects against both the scenario of inference attacks in an area with sparsely distributed IUs and the scenario of untrusted or compromised SAS. We then define modifications to the SU inference attack algorithm, which demonstrate the necessity of applying obfuscation to SU query responses. Finally, we evaluate obfuscation schemes which are compatible with SZ-SAS, verifying the effectiveness of such schemes in preventing an SU inference attack. Our results show SZ-SAS is capable of utilizing compatible obfuscation schemes to prevent the SU inference attack, while operating using only homomorphically encrypted IU operation parameters. / Master of Science / Dynamic Spectrum Access (DSA) allows users to opportunistically access spectrum resources which were previously reserved for use by specified parties. This spectrum sharing protocol has been identified as a potential solution to the issue of spectrum crowding. This sharing will be accomplished through the use of a centralized server, known as a spectrum access system (SAS). However, current SAS-based DSA proposals require users to submit information such as location and transmission properties to SAS. The privacy of these users is of the utmost importance, as many existing users in these spectrum bands are military radars and other users for which operational security is pivotal. Storing the information for these users in a central database can be an major privacy issue, as this information could be leaked if SAS is compromised by a malicious party. Additionally, malicious secondary users (SUs) may perform an inference attack, which could also reveal the location of these military radars. In this thesis, we demonstrate a SAS-framework, SZ-SAS, which allows SAS to function without direct knowledge of user information. We also propose techniques for mitigating the inference attack which are compatible with SZ-SAS
12

Inclusion of Priority Access in a Privacy-preserving ESC-based DSA System

Lu, Chang 21 August 2018 (has links)
According to the Federal Communications Commission's rules and recommendations set forth for the 3.5 GHz Citizens Broadband Radio Service, a three-tiered structure shall govern the newly established shared wireless band. The three tiers are comprised of three different levels of spectrum access; Incumbent Access, Priority Access and General Authorized Access. In accordance and fulfillment with this dynamic spectrum access framework, we present the inclusion of Priority Access tier into a two-tiered privacy-preserving ESC-based dynamic spectrum access system. / Master of Science / With the development of wireless communication technologies, the number of wireless communication reliant applications has been increasing. Most of these applications require dedicated spectrum frequencies as communication channels. As such, the radio frequency spectrum, utilized and allocated for these wireless applications, is depleting. This problem can be alleviated by adopting dynamic spectrum access schemes. The current static spectrum allocation scheme assigns designated spectrum frequencies to specific users. This static frequency management approach leads to inefficient frequency utilization as the occupation of frequency channels may vary depending upon time periods. Dynamic spectrum access schemes allow unlicensed users opportunistic access to vacant spectrum spaces. Thus, the adoption of these spectrum sharing schemes will increase the efficiency of spectrum utilization, and slow down the spectrum depletion. However, the design and implementation of these schemes face different challenges. These spectrum sharing systems need to guarantee the privacy of the involved parties while maintaining specific functionalities required and recommended by the Federal Communications Commission. In this thesis, we present the inclusion of a three-tiered frame, approved by the Federal Communications Commission, into a privacy-preserving dynamic spectrum system.
13

Dynamic spectrum sharing for future wireless communications

Jiang, Xueyuan January 2013 (has links)
The spectrum has become one of the most important and scarce resources for future wireless communications. However, the current static spectrum policy cannot meet the increasing demands for spectrum access. To improve spectrum efficiency, dynamic spectrum access (DSA) attempts to allocate the spectrum to users in an intelligent manner. Cognitive radio (CR) is an enabling technology for DSA, and can maximize spectrum utilization by introducing unlicensed or secondary users (SUs) to the primary system. The key component of DSA is dynamic spectrum sharing (DSS), which is responsible for providing efficient and fair spectrum allocation or scheduling solutions among licensed or primary users (PUs) and SUs. This thesis focuses on the design of efficient DSS schemes for the future wireless communication networks. Firstly, based on the coordinated DSS model, this thesis proposes a heterogeneous-prioritized spectrum sharing policy for coordinated dynamic spectrum access networks. Secondly, based on the uncoordinated DSS model, a novel partial spectrum sharing strategy and the cross-layer optimization method have been proposed to achieve efficient spectrum sharing between two licensed networks. Then, a hybrid strategy which combines the overlay and underlay schemes is proposed under uncoordinated DSS model. The proposed analytical methods can provide efficient and accurate modeling to predict the behaviors of the PUs and SUs in DSS systems. This thesis presents the performance prediction of the proposed novel DSS schemes that achieve efficient spectrum sharing for coordinated and uncoordinated future wireless networks.
14

Spectrum Sharing: Overview and Challenges of Small Cells Innovation in the Proposed 3.5 GHz Band

Oyediran, David 10 1900 (has links)
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV / Spectrum sharing between Federal and commercial users is a technique proposed by the FCC and NTIA to open up the 3.5 GHz band for wireless broadband use and small cell technology is one of the candidates for its' realization. The traffic on small cells is temporal and their chances of interfering with other services in shared spectrum are limited. DoD has a documented requirement of 865 MHz by 2025 to support telemetry but only 445 MHz is presently available. DoD is conducting researches to realize test and evaluation spectrum efficient technology with the aim to develop, demonstrate, and evaluate technology components required to enable flight and ground test telemetry operations. This paper will provide an overview on spectrum sharing using small cell technology for LTE-Advanced and dynamic spectrum access would be briefly described. Research challenges for protocols and algorithms would be addressed for future studies.
15

Cognitive radio systems in LTE networks

Al-Dulaimi, Anwer January 2012 (has links)
The most important fact in the mobile industry at the moment is that demand for wireless services will continue to expand in the coming years. Therefore, it is vital to find more spectrums through cognitive radios for the growing numbers of services and users. However, the spectrum reallocations, enhanced receivers, shared use, or secondary markets-will not likely, by themselves or in combination, meet the real exponential increases in demand for wireless resources. Network operators will also need to re-examine network architecture, and consider integrating the fibre and wireless networks to address this issue. This thesis involves driving fibre deeper into cognitive networks, deploying microcells connected through fibre infrastructure to the backbone LTE networks, and developing the algorithms for diverting calls between the wireless and fibre systems, introducing new coexistence models, and mobility management. This research addresses the network deployment scenarios to a microcell-aided cognitive network, specifically slicing the spectrum spatially and providing reliable coverage at either tier. The goal of this research is to propose new method of decentralized-to-distributed management techniques that overcomes the spectrum unavailability barrier overhead in ongoing and future deployments of multi-tiered cognitive network architectures. Such adjustments will propose new opportunities in cognitive radio-to-fibre systematic investment strategies. Specific contributions include: 1) Identifying the radio access technologies and radio over fibre solution for cognitive network infrastructure to increase the uplink capacity analysis in two-tier networks. 2) Coexistence of macro and microcells are studied to propose a roadmap for optimising the deployment of cognitive microcells inside LTE macrocells in the case of considering radio over fibre access systems. 3) New method for roaming mobiles moving between microcells and macrocell coverage areas is proposed for managing spectrum handover, operator database, authentication and accounting by introducing the channel assigning agent entity. The ultimate goal is to reduce unnecessary channel adaptations.
16

Frequency Rendezvous and Physical Layer Network Coding for Distributed Wireless Networks

Pu, Di 22 October 2009 (has links)
"In this thesis, a transmission frequency rendezvous approach for secondary users deployed in decentralized dynamic spectrum access networks is proposed. Frequency rendezvous is a critical step in bootstrapping a wireless network that does not possess centralized control. Current techniques for enabling frequency rendezvous in decentralized dynamic spectrum access networks either require pre-existing infrastructure or use one of several simplifying assumptions regarding the architecture, such as the use of regularly spaced frequency channels for communications. Our proposed approach is designed to be operated in a strictly decentralized wireless networking environment, where no centralized control is present and the spectrum does not possess pre-defined channels. In our proposed rendezvous algorithm, the most important step is pilot tone detection and receiver query. In order to realize a shortest search time for the target receiver, an efficient scanning rule should be employed. In this thesis, three scanning rules are proposed and evaluated, namely: frequency sequence scanning, pilot tone strength scanning, and cluster scanning. To validate our result, we test our scanning rules with actual paging band spectrum measurements. Previous research on security of network coding focuses on the protection of data dissemination procedures and the detection of malicious activities such as pollusion attacks. The capabilities of network coding to detect other attacks has not been fully explored. In this thesis, a new mechanism based on physical layer network coding to detect wormhole attacks is proposed. When two signal sequences collide at the receiver, the difference between the two received sequences is determined by its distances to the senders. Therefore, by comparing the differences between the received sequences at two nodes, we can estimate the distance between them and detect those fake neighbor connections through wormholes. While the basic idea is clear, we design many schemes at both physical and network layers to turn the idea into a practical approach. Simulations using BPSK modulation at the physical layer show that the wireless nodes can effectively detect fake neighbor connections without the adoption of any special hardware on them."
17

Novel channel sensing and access strategies in opportunistic spectrum access networks

Kundargi, Nikhil Ulhas 11 July 2012 (has links)
Traditionally radio spectrum was considered a commodity to be allocated in a fixed and centralized manner, but now the technical community and the regulators approach it as a shared resource that can be flexibly and intelligently shared between competing entities. In this thesis we focus on novel strategies to sense and access the radio spectrum within the framework of Opportunistic Spectrum Access via Cognitive Radio Networks (CRNs). In the first part we develop novel transmit opportunity detection methods that effectively exploit the gray space present in packet based networks. Our methods proactively detect the maximum safe transmit power that does not significantly affect the primary network nodes via an implicit feedback mechanism from the Primary network to the Secondary network. A novel use of packet interarrival duration is developed to robustly perform change detection in the primary network's Quality of Service. The methods are validated on real world IEEE 802.11 WLANs. In the second part we study the inferential use of Goodness-of-Fit tests for spectrum sensing applications. We provide the first comprehensive framework for decision fusion of an ensemble of goodness-of-fit tests through use of p-values. Also, we introduce a generalized Phi-divergence statistic to formulate goodness-of-fit tests that are tunable via a single parameter. We show that under uncertainty in the noise statistics or non-Gaussianity in the noise, the performance of such non-parametric tests is significantly superior to that of conventional spectrum sensing methods. Additionally, we describe a collaborative spatially separated version of the test for robust combining of tests in a distributed spectrum sensing setting. In the third part we develop the sequential energy detection problem for spectrum sensing and formulate a novel Sequential Energy Detector. Through extensive simulations we demonstrate that our doubly hierarchical sequential testing architecture delivers a significant throughput improvement of 2 to 6 times over the fixed sample size test while maintaining equivalent operating characteristics as measured by the Probabilities of Detection and False Alarm. We also demonstrate the throughput gains for a case study of sensing ATSC television signals in IEEE 802.22 systems. / text
18

Improving Frequency Reuse and Cochannel Interference Coordination in 4G HetNets

Qaimkhani, Irshad Ali January 2013 (has links)
This report describes my M.A.Sc. thesis research work. The emerging 4th generation (4G) mobile systems and networks (so called 4G HetNets) are designed as multilayered cellular topology with a number of asymmetrically located, asymmetrically powered, self-organizing, and user-operated indoor small cell (e.g., pico/femto cells and WLANs) with a variety of cell architectures that are overlaid by a large cell (macro cell) with some or all interfering wireless links. These designs of 4G HetNets bring new challenges such as increased dynamics of user mobility and data traffic trespassing over the multi-layered cell boundaries. Traditional approaches of radio resource allocation and inter-cell (cochannel) interference management that are mostly centralized and static in the network core and are carried out pre-hand by the operator in 3G and lower cellular technologies, are liable to increased signaling overhead, latencies, complexities, and scalability issues and, thus, are not viable in case of 4G HetNets. In this thesis a comprehensive research study is carried out on improving the radio resource sharing and inter-cell interference management in 4G HetNets. The solution strategy exploits dynamic and adaptive channel allocation approaches such as dynamic and opportunistic spectrum access (DSA, OSA) techniques, through exploiting the spatiotemporal diversities among transmissions in orthogonal frequency division multiple access (OFDMA) based medium access in 4G HetNets. In this regards, a novel framework named as Hybrid Radio Resource Sharing (HRRS) is introduced. HRRS comprises of these two functional modules: Cognitive Radio Resource Sharing (CRRS) and Proactive Link Adaptation (PLA) scheme. A dynamic switching algorithm enables CRRS and PLA modules to adaptively invoke according to whether orthogonal channelization is to be carried out exploiting the interweave channel allocation (ICA) approach or non-orthogonal channelization is to be carried out exploiting the underlay channel allocation (UCA) approach respectively when relevant conditions regarding the traffic demand and radio resource availability are met. Benefits of CRRS scheme are identified through simulative analysis in comparison to the legacy cochannel and dedicated channel deployments of femto cells respectively. The case study and numerical analysis for PLA scheme is carried out to understand the dynamics of threshold interference ranges as function of transmit powers of MBS and FBS, relative ranges of radio entities, and QoS requirement of services with the value realization of PLA scheme.
19

Security and Privacy in Dynamic Spectrum Access: Challenges and Solutions

January 2017 (has links)
abstract: Dynamic spectrum access (DSA) has great potential to address worldwide spectrum shortage by enhancing spectrum efficiency. It allows unlicensed secondary users to access the under-utilized spectrum when the primary users are not transmitting. On the other hand, the open wireless medium subjects DSA systems to various security and privacy issues, which might hinder the practical deployment. This dissertation consists of two parts to discuss the potential challenges and solutions. The first part consists of three chapters, with a focus on secondary-user authentication. Chapter One gives an overview of the challenges and existing solutions in spectrum-misuse detection. Chapter Two presents SpecGuard, the first crowdsourced spectrum-misuse detection framework for DSA systems. In SpecGuard, three novel schemes are proposed for embedding and detecting a spectrum permit at the physical layer. Chapter Three proposes SafeDSA, a novel PHY-based scheme utilizing temporal features for authenticating secondary users. In SafeDSA, the secondary user embeds his spectrum authorization into the cyclic prefix of each physical-layer symbol, which can be detected and authenticated by a verifier. The second part also consists of three chapters, with a focus on crowdsourced spectrum sensing (CSS) with privacy consideration. CSS allows a spectrum sensing provider (SSP) to outsource the spectrum sensing to distributed mobile users. Without strong incentives and location-privacy protection in place, however, mobile users are reluctant to act as crowdsourcing workers for spectrum-sensing tasks. Chapter Four gives an overview of the challenges and existing solutions. Chapter Five presents PriCSS, where the SSP selects participants based on the exponential mechanism such that the participants' sensing cost, associated with their locations, are privacy-preserved. Chapter Six further proposes DPSense, a framework that allows the honest-but-curious SSP to select mobile users for executing spatiotemporal spectrum-sensing tasks without violating the location privacy of mobile users. By collecting perturbed location traces with differential privacy guarantee from participants, the SSP assigns spectrum-sensing tasks to participants with the consideration of both spatial and temporal factors. Through theoretical analysis and simulations, the efficacy and effectiveness of the proposed schemes are validated. / Dissertation/Thesis / Doctoral Dissertation Electrical Engineering 2017
20

Spectrum sharing for future mobile cellular systems

Bennis, M. (Mehdi) 10 November 2009 (has links)
Abstract Spectrum sharing has become a high priority research area over the past few years. The motivation behind this lies in the fact that the limited spectrum is currently inefficiently utilized. As recognized by the World radio communication conference (WRC)-07, the amount of identified spectrum is not large enough to support large bandwidths for a substantial number of operators. Therefore, it is paramount for future mobile cellular systems to share the frequency spectrum and coexist in a more efficient manner. The present dissertation deals with the problem of spectrum scarcity by examining spectrum sharing paradigms where a migration from fixed to flexible resource allocation is investigated. First, a radio resource management (RRM) architecture is proposed where advanced spectrum functionalities accounting for the short-term variations of the spectrum are examined. The achievable gains are shown in a multi-cell, multi-network environment with realistic traffic patterns from a European operator, enhancing thereby spectrum utilization. Second, inter-operator resource sharing in a broadband network is considered where a packet-based cellular network is developed. It is shown that the obtained gains in terms of quality-of-service (QoS), number of operators and different data rates requirements improve the overall efficiency of the network. Besides and in order to cope with the stringent data rate requirements, direct terminal-to-terminal (T2T) communication is examined in which a realistic algorithm is proposed advocating resource reuse in a cellular system with simultaneous communications between mobiles. Numerical results confirm the advantages of resource reuse in terms of throughput, average frame delays and power consumption. In this thesis, a proposal is made as how to enhance spectrum sharing. The concept of hierarchy is proposed in which wireless competitive operators share the same spectrum band. The decentralized hierarchical approach is shown to bridge the gap between the selfish and centralized approach. Interference avoidance is studied for point-to-point communication in a selforganized network where different optimal power allocation strategies are examined along with the impact of frequency reuse on the ergodic capacity of the network.

Page generated in 0.0592 seconds