• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 48
  • 9
  • 3
  • 1
  • 1
  • Tagged with
  • 104
  • 104
  • 78
  • 70
  • 61
  • 42
  • 21
  • 19
  • 15
  • 15
  • 13
  • 12
  • 12
  • 12
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Primary User Obfuscation in an Incumbent Informed Spectrum Access System

Makin, Cameron 24 June 2021 (has links)
With a growing demand for spectrum availability, spectrum sharing has become a high-profile solution to overcrowding. In order to enable spectrum sharing between incumbent/primary and secondary users, incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility for PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation scheme can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance. / Master of Science / With a growing demand for spectrum availability, wireless spectrum sharing has become a high-profile solution to spectrum overcrowding. In order to enable spectrum sharing between incumbent/primary (e.g.,federal communications, naval radar, users already grandfathered into the band) and secondary users (e.g., commercial communications companies), incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the incumbent informed SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility of PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation tactic can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance.
22

Enabling Dynamic Spectrum Access in 4G Networks and Beyond

Deaton, Juan Diego 03 May 2012 (has links)
As early as 2014, mobile network operators' spectral capacity will be overwhelmed by the demand brought on by new devices and applications. To augment capacity and meet this demand, operators may choose to deploy a Dynamic Spectrum Access (DSA) overlay. Spectrum regulation is following suit, with regulators attempting to incorporate spectrum sharing through the design of spectrum access rules that support DSA. This dissertation explores the idea of DSA applied to Long Term Evolution Advanced (LTE+) networks. This idea is explored under functional, architectural, and spectrum policy aspects. Under the functional and architectural aspects of this topic, the signaling and functionality required by such an overlay have not yet been fully considered in the architecture of an LTE+. This dissertation presents a Spectrum Accountability framework to be integrated into LTE+ MacroNet and HetNet architectures, defining specific element functionality, protocol interfaces, and signaling flow diagrams required to enforce the rights and responsibilities of primary and secondary users. We also identify and propose three DSA management frameworks for LTE+ HetNets: Spectrum Accountability Client Only, Cell Spectrum Management, and Domain Spectrum Management. Our Spectrum Accountability framework may serve as a guide in the development of future LTE+ network standards that account for DSA. We also quantify, through simulation and integer programs, the benefits of using DSA channels to augment capacity under a scenario in which LTE+ network can opportunistically use TV and GSM spectrum. In our first experiment, we a consider a scenario where three different operators share the same cell site with LTE+ equipment and a Dynamic Spectrum Access (DSA) band to augment spectral capacity. Our experiments show that throughput can increase by as much as 40%. We develop integer programs to model the assignment of spectrum channels to both a MacroNet and HetNet. In our selected scenario, we observe TV white spectrum provides the largest gain in performance for both Nets: 27% for MacroNet and 9% increase for the HetNet over our measured ranges. Although the gains in using opportunistic use of GSM is more modest, 10% and 2% for the Macro and HetNet, respectively, we believe that these gains will significantly increase as operators continue to migrate users to LTE+, thus freeing up portions of the bands currently used for GSM service. In our final analytical model, we create integer program sets to represent the different three DSA management frameworks for LTE+ HetNets and compare their results. Under the spectrum policy aspects, this dissertation develops a decision-theoretic framework for regulators to assess the impacts of different spectrum access rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, combining sensing information of only the transmitter and receiver of a communication link provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. We hope these results will prove useful to regulators and network developers in un and developing rules for future DSA regulation. / Ph. D.
23

Spectrum-efficient Cooperation and Bargaining-based Resource Allocation for Secondary Users in Cognitive Radio Networks

Abdelraheem, Mohamed Medhat Tawfik 20 November 2015 (has links)
Dynamic spectrum access (DSA) is a promising approach to alleviate spectrum scarcity and improve spectrum utilization. Our work aims to enhance the utilization of the available white spaces in the licensed spectrum by enabling cooperative communication in the secondary networks. We investigate the ability of a two-hop cooperative transmission to reduce the effect of primary user interruption on secondary transmissions. We analyze the performance of a cooperative secondary transmission by modeling the interaction between primary user and secondary user transmissions using a discrete time Markov chain (DTMC). The analysis shows a significant enhancement in the secondary transmission efficiency and throughput when cooperative transmission is utilized compared to that of direct transmission, especially at high levels of primary user activity. We extend our study to model secondary cooperative transmission in realistic scenarios. We evaluate the throughput performance enhancement in the secondary infrastructure network analytical and by simulation. A simple scenario is modeled analytically by a DTMC that captures the probability of finding intermediate relays according to nodes' density and by discrete event simulation where both results confined each other. We introduce a dedicated cooperative and cognitive Media Access Control (MAC) protocol named CO2MAC to facilitate secondary users transmissions in infrastructure-based secondary networks. The proposed MAC enables utilizing cooperative Multi-Input-Multi-Output (MIMO) transmission techniques to further enhance the throughput performance. By using the proposed MAC, we quantify the enhancement in the throughput of secondary infrastructure networks via simulation for complex scenarios. The results show an enhancement in cooperative transmission throughput compared to that of direct transmission, especially at crowded spectrum due to the ability of cooperative transmissions to reduce the negative effect of primary user interruptions by buffering the data at intermediate relays. Also, the cooperative throughput performance enhances compared to that of direct transmission as the nodes' density increases due to the increase in the probability of finding intermediate relays. After that, we answer two questions. The first question is about the way a secondary user pays the cooperation price to its relay and what are the conditions under which the cooperation is beneficial for both of them. The second question is about how to pair the cooperating nodes and allocate channels in an infrastructure based secondary network. To answer the first question, we model the cooperation between the secondary user and its relay as a resource exchange process, where the secondary user vacates part of its dedicated free spectrum access time to the relay as a price for the energy consumed by the relay in forwarding the secondary user's packets. We define a suitable utility function that combines the throughput and the energy then we apply axiomatic bargaining solutions, namely Nash bargaining solution (NBS) and egalitarian bargaining solution (EBS) to find the new free spectrum access shares for the secondary user and the relay based on the defined utility in the cooperation mode. We show that under certain conditions, the cooperation is beneficial for both the secondary user and the relay where both achieve a higher utility and throughput compared to the non-cooperative mode. Finally, based on the bargaining based shares of the cooperating nodes, the node pairing and channel allocation are optimized for different objectives, namely maximizing the total network throughput or minimizing the maximum unsatisfied demand. Our bargaining based framework shows a comparable performance with the case when the nodes' free spectrum access time shares are jointly optimized with the pairing and allocation process, at the same time, our cooperation framework provides an incentive reward for the secondary users and the relays to involve in cooperation by giving every node a share of the free spectrum that proportional to its utility. We also study the case of using multiple secondary access points which gives more flexibility in node pairing and channel allocation and achieves a better performance in terms of the two defined objectives. / Ph. D.
24

Incorporating Obfuscation Techniques in Privacy Preserving Database-Driven Dynamic Spectrum Access Systems

Zabransky, Douglas Milton 11 September 2018 (has links)
Modern innovation is a driving force behind increased spectrum crowding. Several studies performed by the National Telecommunications and Information Administration (NTIA), Federal Communications Commission (FCC), and other groups have proposed Dynamic Spectrum Access (DSA) as a promising solution to alleviate spectrum crowding. The spectrum assignment decisions in DSA will be made by a centralized entity referred to as as spectrum access system (SAS); however, maintaining spectrum utilization information in SAS presents privacy risks, as sensitive Incumbent User (IU) operation parameters are required to be stored by SAS in order to perform spectrum assignments properly. These sensitive operation parameters may potentially be compromised if SAS is the target of a cyber attack or an inference attack executed by a secondary user (SU). In this thesis, we explore the operational security of IUs in SAS-based DSA systems and propose a novel privacy-preserving SAS-based DSA framework, Suspicion Zone SAS (SZ-SAS), the first such framework which protects against both the scenario of inference attacks in an area with sparsely distributed IUs and the scenario of untrusted or compromised SAS. We then define modifications to the SU inference attack algorithm, which demonstrate the necessity of applying obfuscation to SU query responses. Finally, we evaluate obfuscation schemes which are compatible with SZ-SAS, verifying the effectiveness of such schemes in preventing an SU inference attack. Our results show SZ-SAS is capable of utilizing compatible obfuscation schemes to prevent the SU inference attack, while operating using only homomorphically encrypted IU operation parameters. / Master of Science / Dynamic Spectrum Access (DSA) allows users to opportunistically access spectrum resources which were previously reserved for use by specified parties. This spectrum sharing protocol has been identified as a potential solution to the issue of spectrum crowding. This sharing will be accomplished through the use of a centralized server, known as a spectrum access system (SAS). However, current SAS-based DSA proposals require users to submit information such as location and transmission properties to SAS. The privacy of these users is of the utmost importance, as many existing users in these spectrum bands are military radars and other users for which operational security is pivotal. Storing the information for these users in a central database can be an major privacy issue, as this information could be leaked if SAS is compromised by a malicious party. Additionally, malicious secondary users (SUs) may perform an inference attack, which could also reveal the location of these military radars. In this thesis, we demonstrate a SAS-framework, SZ-SAS, which allows SAS to function without direct knowledge of user information. We also propose techniques for mitigating the inference attack which are compatible with SZ-SAS
25

Inclusion of Priority Access in a Privacy-preserving ESC-based DSA System

Lu, Chang 21 August 2018 (has links)
According to the Federal Communications Commission's rules and recommendations set forth for the 3.5 GHz Citizens Broadband Radio Service, a three-tiered structure shall govern the newly established shared wireless band. The three tiers are comprised of three different levels of spectrum access; Incumbent Access, Priority Access and General Authorized Access. In accordance and fulfillment with this dynamic spectrum access framework, we present the inclusion of Priority Access tier into a two-tiered privacy-preserving ESC-based dynamic spectrum access system. / Master of Science / With the development of wireless communication technologies, the number of wireless communication reliant applications has been increasing. Most of these applications require dedicated spectrum frequencies as communication channels. As such, the radio frequency spectrum, utilized and allocated for these wireless applications, is depleting. This problem can be alleviated by adopting dynamic spectrum access schemes. The current static spectrum allocation scheme assigns designated spectrum frequencies to specific users. This static frequency management approach leads to inefficient frequency utilization as the occupation of frequency channels may vary depending upon time periods. Dynamic spectrum access schemes allow unlicensed users opportunistic access to vacant spectrum spaces. Thus, the adoption of these spectrum sharing schemes will increase the efficiency of spectrum utilization, and slow down the spectrum depletion. However, the design and implementation of these schemes face different challenges. These spectrum sharing systems need to guarantee the privacy of the involved parties while maintaining specific functionalities required and recommended by the Federal Communications Commission. In this thesis, we present the inclusion of a three-tiered frame, approved by the Federal Communications Commission, into a privacy-preserving dynamic spectrum system.
26

A Context-Aware Dynamic Spectrum Access System for Spectrum Research and Development

Kumar, Saurav 03 January 2024 (has links)
Our hunger for data has grown tremendously over the years which has led to a demand for the increase in the available radio spectrum for communications. The Federal Communications Commission in the United States allowed for the sharing of the CBRS band (3550-3700 MHz) a few years ago. Since then, research has been done by both industry and academia to identify similar opportunities in other radio bands as well. This research is, however, being hampered due to a lack of experimental frameworks where the various aspects of spectrum sharing can be studied. To this end, we propose to develop an open-source spectrum access system that incorporates context awareness and multi-band operational support and serves as an RandD tool for the research community. We have developed a novel Prioritization Framework that takes the current operational context of each user into account to determine their relative priority, within or outside their user class/group, for transmission in the network. We also introduce a Policy Engine for the configuration and management of dynamic policies (or rules) for defining the relationships between the various forms of context information and their relative impact on a user's overall priority. We have performed several experiments to show how context awareness impacts the spectrum sharing efficiency and quality of service. Due to its modular and extensible nature, we expect that this tool will be used by researchers and policy-makers to implement their own policies and algorithms and test their efficacy in a simulated radio environment. / Master of Science / Over the years, the advancements in the internet and communication technology have made us more and more data-hungry. Consequently, the electromagnetic spectrum on which data is transmitted has become a sparse resource. Governments worldwide are working together with academia and industry to find the most efficient utilization of this resource. If the current users of protected spectrum could share their bands with other licensed or opportunistic users, then a tremendous amount of spectrum could be freed up for public and private use. To facilitate rapid research and development in this field, this thesis proposes the development of an open-source, modular, and extensible Context-Aware Dynamic Spectrum Access System. In this system, we explore the usage of several traditional and novel context information in spectrum allocation, which in turn helps us improve the efficiency and resiliency of spectrum management while ensuring that incumbent users are not adversely affected by other licensed or unlicensed users. We develop cognitive modules for context-based prioritization of users for allocation through a novel Prioritization Framework and for enabling the use of dynamic policies or rules (governing spectrum allocation) instead of static policies that most systems use today. We simulate several operational scenarios and depict our tool's performance in them. Through our experiments and discussions, we highlight the significance of this tool for researchers, policy-makers, and regulators for studying spectrum sharing in general, and context-aware, dynamic policy-based spectrum sharing in particular.
27

Using Decoys as a Resiliency Mechanism in Spectrally Harsh DSA Environments

Lerch, Marc Alger 07 March 2014 (has links)
As wireless communication mediums develop and Dynamic Spectrum Access (DSA) is implemented as a means to increase capacity on a limited spectrum, the threat of reactive interference becomes real. The motivation for this thesis is to address this problem by suggesting a mechanism which could be used in these spectrally harsh DSA environments. Overcoming certain types of interference in DSA environments requires unique approaches to transmitting and receiving data. This thesis discusses a decoy-based approach to mitigate conditions in which interference reacts to the spectral movement of the transmitting DSA radio as it hops around the frequency spectrum. Specifically using a polyphase channelizer, multiple replicas of the information signal are simultaneously transmitted at separate frequencies to lure reactive interference away from the main source of transmission. Using either serial or parallel transmission (splitting the signal in time or splitting the signal's energy) with the decoy signals and the original signal can either maximize data throughput in a minimal-interference environment or can add necessary robustness in the presence of multiple sources of reactive interference. This decoy-based approach is verified with network simulation. An event-based simulator written in C++ was used to define the capacity or maximum throughput. Configuration files loaded with the necessary presets are used to run three network simulation scenarios: First Responder, Military Patrol, and Airborne Network. / Master of Science
28

Spectrum Opportunity Duration Assurance: A Primary-Secondary Cooperation Approach for Spectrum Sharing Systems

Sohul, Munawwar Mahmud 05 September 2017 (has links)
The radio spectrum dependent applications are facing a huge scarcity of the resource. To address this issue, future wireless systems require new wireless network architectures and new approaches to spectrum management. Spectrum sharing has emerged as a promising solution to address the radio frequency (RF) spectrum bottleneck. Although spectrum sharing is intended to provide flexible use of the spectrum, the architecture of the existing approaches, such as TV White Space [1] and Citizen Broadband Radio Services (CBRS) [2], have a relatively fixed sharing framework. This fixed structure limits the applicability of the architecture to other bands where the relationship between various new users and different types of legacy users co-exist. Specifically, an important aspect of sharing that has not been explored enough is the cooperation between the resource owner and the opportunistic user. Also in a shared spectrum system, the users do not have any information about the availability and duration of the available spectrum opportunities. This lack of understanding about the shared spectrum leads the research community to explore a number of core spectrum sharing tasks, such as opportunity detection, dynamic opportunity scheduling, and interference protection for the primary users, etc. This report proposes a Primary-Secondary Cooperation Framework to provide flexibility to all the involved parties in terms of choosing the level of cooperation that allow them to satisfy different objective priorities. The cooperation framework allows exchange of a probabilistic assurance: Spectrum Opportunity Duration Assurance (SODA) between the primary and secondary operations to improve the overall spectrum sharing experience for both the parties. This capability will give the spectrum sharing architectures new flexibility to handle evolutions in technologies, regulations, and the requirements of new bands being transitioned from fixed to share usage. In this dissertation we first look into the regulatory aspect of spectrum sharing. We analyze the Federal Communications Commission's (FCC) initiatives with regards to the commercial use of the 150 MHz spectrum block in the 3.5 GHz band. This analysis results into a Spectrum Access System (SAS) architecture and list of required functionalities. Then we address the nature of primary-secondary cooperation in spectrum sharing and propose to generate probabilistic assurances for spectrum opportunities. We use the generated assurance to observe the impact of cooperation from the perspective of spectrum sharing system management. We propose to incorporate primary user cooperation in the auctioning and resource allocation procedures to manage spectrum opportunities. We also analyze the improvement in spectrum sharing experience from the perspective of the primary and secondary users as a result of cooperation. We propose interference avoidance schemes that involve cooperation to improve the achievable quality of service. Primary-secondary cooperation has the potential to significantly influence the mechanism and outcomes of the spectrum sharing systems. Both the primary and secondary operations can benefit from cooperation in a sharing scenario. Based on the priorities of the primary and secondary operations, the users may decide on the level of cooperation that they are willing to participate. Also access to information about the availability and usability of the spectrum opportunity will result in efficient spectrum opportunity management and improved sharing performance for both the primary and secondary users. Thus offering assurances about the availability and duration of spectrum opportunity through primary-secondary cooperation will significantly improve the overall spectrum sharing experience. The research reported in this dissertation is expected to provide a fundamental analytical framework for characterizing and quantifying the implications of primary-secondary cooperation in a spectrum sharing context. It analyzes the technical challenges in modeling different level of cooperation and their impact on the spectrum sharing experience. We hope that this dissertation will establish the fundamentals of the spectrum sharing to allow the involved parties to participate in sharing mechanisms that is suitable to their objective priorities. / PHD
29

Spectral-efficient design in modern wireless communications networks

Lu, Lu 21 September 2015 (has links)
We investigate spectral-efficient design and develop novel schemes to improve spectral efficiency of the modern wireless communications networks. Nowadays, more and more spectrum resources are required to support various high-data-rate applications while spectrum resources are limited. Moreover, static allocation and exclusive access in current spectrum assignment policy caused a lot of licensed spectrum bands to be underutilized. To deal with the problem, cognitive radio (CR) has been developed, which allows unlicensed/secondary users to transmit with licensed/primary users as long as the former ones do not generate intolerable interference to the latter ones. The coexistence of users and networks requires careful and dynamic planning to mitigate interference. Otherwise, the network performance will be severely undermined. We study both spectrum sensing and spectrum access techniques and propose several transmit schemes for different types of cognitive ratio networks, including spectrum overlay and spectrum underlay systems. The proposed algorithms can improve spectral efficiency of the networks efficiently and have potentials to be used in future wireless communications networks.
30

Dynamic spectrum sharing for future wireless communications

Jiang, Xueyuan January 2013 (has links)
The spectrum has become one of the most important and scarce resources for future wireless communications. However, the current static spectrum policy cannot meet the increasing demands for spectrum access. To improve spectrum efficiency, dynamic spectrum access (DSA) attempts to allocate the spectrum to users in an intelligent manner. Cognitive radio (CR) is an enabling technology for DSA, and can maximize spectrum utilization by introducing unlicensed or secondary users (SUs) to the primary system. The key component of DSA is dynamic spectrum sharing (DSS), which is responsible for providing efficient and fair spectrum allocation or scheduling solutions among licensed or primary users (PUs) and SUs. This thesis focuses on the design of efficient DSS schemes for the future wireless communication networks. Firstly, based on the coordinated DSS model, this thesis proposes a heterogeneous-prioritized spectrum sharing policy for coordinated dynamic spectrum access networks. Secondly, based on the uncoordinated DSS model, a novel partial spectrum sharing strategy and the cross-layer optimization method have been proposed to achieve efficient spectrum sharing between two licensed networks. Then, a hybrid strategy which combines the overlay and underlay schemes is proposed under uncoordinated DSS model. The proposed analytical methods can provide efficient and accurate modeling to predict the behaviors of the PUs and SUs in DSS systems. This thesis presents the performance prediction of the proposed novel DSS schemes that achieve efficient spectrum sharing for coordinated and uncoordinated future wireless networks.

Page generated in 5.8597 seconds