Welcome

Anti Essays offers essay examples to help students with their essay writing.

Sign Up

Security Features in Cognitive Radio Essay

  • Submitted by: Lalana
  • on February 21, 2013
  • Category: Miscellaneous
  • Length: 10,232 words

Open Document

Below is an essay on "Security Features in Cognitive Radio" from Anti Essays, your source for research papers, essays, and term paper examples.

Security in Cognitive Radio

A Project Report Presented to The Faculty of the Department of General Engineering San Jose State University

In Partial Fulfilment Of the Requirements for the Degree Master of Science in Engineering

By Shrestha, Junu Sunkara, Avinash Thirunavukkarasu, Balaji

May 2010

i

© 2010 Shrestha, Junu Sunkara, Avinash Thirunavukkarasu, Balaji

ALL RIGHTS RESERVED ii

APPROVED FOR THE DEPARTMENT OF GENERAL ENGINEERING

_________________________________________________________ Prof. Morris Jones Technical Advisor, Part-Time Professor, Dept. of Electrical Engineering, San Jose State University

_________________________________________________________ Dr. Rakesh Rajbanshi Industrial Sponsor, Cisco Systems Inc.

_________________________________________________________ Dr. Ali Zargar Professor, Department of Aviation and technology, San Jose State University

iii

Abstract SECURITY IN COGNITIVE RADIO By Shrestha, Junu Sunkara, Avinash Thirunavukkarasu, Balaji A number of wireless applications have been growing over the last decade. Most of the frequency spectrum has already been licensed by government agencies, such as Federal Communications Commission (FCC). Therefore, there exists an apparent spectrum scarcity for new wireless applications and services. Cognitive radio can efficiently utilize the unused spectrum for secondary usage without interfering a primary licensed user. In cooperative environment, a primary licensed user can share spectrum occupancy information with a secondary user to enable dynamic spectrum access. However, a secondary user needs to verify accuracy of the spectrum occupancy information and it comes from the legitimate primary users. Without the verification, a malicious user can falsify the spectrum occupancy information. This can result interference to the primary users and minimize available spectrum for the secondary usage. In this project, we propose to develop an efficient technique to...

Show More


Citations

MLA Citation

"Security Features in Cognitive Radio". Anti Essays. 10 Dec. 2018

<http://teachingsail.com/free-essays/Security-Features-In-Cognitive-Radio-410669.html>

APA Citation

Security Features in Cognitive Radio. Anti Essays. Retrieved December 10, 2018, from the World Wide Web: http://teachingsail.com/free-essays/Security-Features-In-Cognitive-Radio-410669.html


Withoutabox | kicau remetuk laut | Idol Jihen