{"title":"一个共同的词汇和设计问题,围绕认知无线电网络在存在干扰的情况下运作","authors":"J. Burbank, A. R. Hammons, S.D. Jones","doi":"10.1109/MILCOM.2008.4753631","DOIUrl":null,"url":null,"abstract":"This paper discusses issues surrounding the design of cognitive radio (CR) networks that must operate in the presence of jamming and hostile Electronic Countermeasure (ECM) environments. Much of the research to date in the CR community has focused on spectrum-sensing techniques and multiple-access methods. Until recently, little work had been done in the general area of wireless network security and specifically the area of performance in the presence of jamming. Discussions on this topic have been inhibited in the greater CR community by a poorly defined lexicon, which makes addressing issues such as security and performance in jamming difficult. This paper attempts to provide a basic lexicon that can be used to clearly discuss the issues surrounding CR network security and performance in the presence of jamming. This paper then goes on to discuss the various jammer threats that might be encountered by a CR network and the ramifications of these threat types on CR network design.","PeriodicalId":434891,"journal":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"25","resultStr":"{\"title\":\"A common lexicon and design issues surrounding cognitive radio networks operating in the presence of jamming\",\"authors\":\"J. Burbank, A. R. Hammons, S.D. Jones\",\"doi\":\"10.1109/MILCOM.2008.4753631\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper discusses issues surrounding the design of cognitive radio (CR) networks that must operate in the presence of jamming and hostile Electronic Countermeasure (ECM) environments. Much of the research to date in the CR community has focused on spectrum-sensing techniques and multiple-access methods. Until recently, little work had been done in the general area of wireless network security and specifically the area of performance in the presence of jamming. Discussions on this topic have been inhibited in the greater CR community by a poorly defined lexicon, which makes addressing issues such as security and performance in jamming difficult. This paper attempts to provide a basic lexicon that can be used to clearly discuss the issues surrounding CR network security and performance in the presence of jamming. This paper then goes on to discuss the various jammer threats that might be encountered by a CR network and the ramifications of these threat types on CR network design.\",\"PeriodicalId\":434891,\"journal\":{\"name\":\"MILCOM 2008 - 2008 IEEE Military Communications Conference\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"25\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MILCOM 2008 - 2008 IEEE Military Communications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MILCOM.2008.4753631\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2008 - 2008 IEEE Military Communications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2008.4753631","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A common lexicon and design issues surrounding cognitive radio networks operating in the presence of jamming
This paper discusses issues surrounding the design of cognitive radio (CR) networks that must operate in the presence of jamming and hostile Electronic Countermeasure (ECM) environments. Much of the research to date in the CR community has focused on spectrum-sensing techniques and multiple-access methods. Until recently, little work had been done in the general area of wireless network security and specifically the area of performance in the presence of jamming. Discussions on this topic have been inhibited in the greater CR community by a poorly defined lexicon, which makes addressing issues such as security and performance in jamming difficult. This paper attempts to provide a basic lexicon that can be used to clearly discuss the issues surrounding CR network security and performance in the presence of jamming. This paper then goes on to discuss the various jammer threats that might be encountered by a CR network and the ramifications of these threat types on CR network design.