Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/223099
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSongjun Maen_US
dc.contributor.authorXiao-Yang Liuen_US
dc.contributor.authorLuoyi Fuen_US
dc.contributor.authorXiaohua Tianen_US
dc.contributor.authorXiaoying Ganen_US
dc.contributor.authorXinbing Wangen_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-04-06T08:21:41Z-
dc.date.available2020-04-06T08:21:41Z-
dc.date.issued2017en_US
dc.identifier.other10.1109/TVT.2017.2722409en_US
dc.identifier.urihttp://localhost/handle/Hannan/223099-
dc.description.abstractRecently, security issues in dynamic spectrum access (DSA) received more and more attention. One type of threat, which we call the greedy resource occupancy, has long been ignored so far. Specifically, a secondary user (SU) may greedily occupy spectrum for a long time, which makes other SUs suffer additional waiting time to access the spectrum and leads to congestion or breakdown. In this paper, we investigated the DSA networks with greedy users. The primary user&x0027;s privilege of accessing the networks at any time is also taken into account. Accordingly, the process of DSA is treated as a privilege-existing multidimensional queueing process. First, we propose an analysis framework for the queueing system and exploit it to investigate impacts of greedy SUs (GSUs) on system performance, i.e., the queue size and waiting time in queue. Second, we propose a wavelet based method to detect the greedy resource occupancy threat quickly. Since a sudden change in average occupancy time of the GSU will produce dramatic performance degradation, the GSU prefers to increase his occupancy time in a gradual manner to avoid the easy detection. Third, to protect honest SUs from being affected by GSUs, a protection strategy is put forward, and the system performance with the strategy has also been analyzed by the queueing analysis. Last, we conduct numerical analyses to demonstrate explicit impacts of GSUs on the system performance as well as efficacy of the protection strategy. We also carry out simulations on the detecting approach, and the results verify effectiveness and efficiency of our proposed approach.en_US
dc.format.extent11233,en_US
dc.format.extent11248en_US
dc.publisherIEEEen_US
dc.relation.haspart7967769.pdfen_US
dc.titleOn the Greedy Resource Occupancy Threat in Dynamic Spectrum Accessen_US
dc.typeArticleen_US
dc.journal.volume66en_US
dc.journal.issue12en_US
Appears in Collections:2017

Files in This Item:
File SizeFormat 
7967769.pdf1.86 MBAdobe PDF
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSongjun Maen_US
dc.contributor.authorXiao-Yang Liuen_US
dc.contributor.authorLuoyi Fuen_US
dc.contributor.authorXiaohua Tianen_US
dc.contributor.authorXiaoying Ganen_US
dc.contributor.authorXinbing Wangen_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-04-06T08:21:41Z-
dc.date.available2020-04-06T08:21:41Z-
dc.date.issued2017en_US
dc.identifier.other10.1109/TVT.2017.2722409en_US
dc.identifier.urihttp://localhost/handle/Hannan/223099-
dc.description.abstractRecently, security issues in dynamic spectrum access (DSA) received more and more attention. One type of threat, which we call the greedy resource occupancy, has long been ignored so far. Specifically, a secondary user (SU) may greedily occupy spectrum for a long time, which makes other SUs suffer additional waiting time to access the spectrum and leads to congestion or breakdown. In this paper, we investigated the DSA networks with greedy users. The primary user&x0027;s privilege of accessing the networks at any time is also taken into account. Accordingly, the process of DSA is treated as a privilege-existing multidimensional queueing process. First, we propose an analysis framework for the queueing system and exploit it to investigate impacts of greedy SUs (GSUs) on system performance, i.e., the queue size and waiting time in queue. Second, we propose a wavelet based method to detect the greedy resource occupancy threat quickly. Since a sudden change in average occupancy time of the GSU will produce dramatic performance degradation, the GSU prefers to increase his occupancy time in a gradual manner to avoid the easy detection. Third, to protect honest SUs from being affected by GSUs, a protection strategy is put forward, and the system performance with the strategy has also been analyzed by the queueing analysis. Last, we conduct numerical analyses to demonstrate explicit impacts of GSUs on the system performance as well as efficacy of the protection strategy. We also carry out simulations on the detecting approach, and the results verify effectiveness and efficiency of our proposed approach.en_US
dc.format.extent11233,en_US
dc.format.extent11248en_US
dc.publisherIEEEen_US
dc.relation.haspart7967769.pdfen_US
dc.titleOn the Greedy Resource Occupancy Threat in Dynamic Spectrum Accessen_US
dc.typeArticleen_US
dc.journal.volume66en_US
dc.journal.issue12en_US
Appears in Collections:2017

Files in This Item:
File SizeFormat 
7967769.pdf1.86 MBAdobe PDF
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSongjun Maen_US
dc.contributor.authorXiao-Yang Liuen_US
dc.contributor.authorLuoyi Fuen_US
dc.contributor.authorXiaohua Tianen_US
dc.contributor.authorXiaoying Ganen_US
dc.contributor.authorXinbing Wangen_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-04-06T08:21:41Z-
dc.date.available2020-04-06T08:21:41Z-
dc.date.issued2017en_US
dc.identifier.other10.1109/TVT.2017.2722409en_US
dc.identifier.urihttp://localhost/handle/Hannan/223099-
dc.description.abstractRecently, security issues in dynamic spectrum access (DSA) received more and more attention. One type of threat, which we call the greedy resource occupancy, has long been ignored so far. Specifically, a secondary user (SU) may greedily occupy spectrum for a long time, which makes other SUs suffer additional waiting time to access the spectrum and leads to congestion or breakdown. In this paper, we investigated the DSA networks with greedy users. The primary user&x0027;s privilege of accessing the networks at any time is also taken into account. Accordingly, the process of DSA is treated as a privilege-existing multidimensional queueing process. First, we propose an analysis framework for the queueing system and exploit it to investigate impacts of greedy SUs (GSUs) on system performance, i.e., the queue size and waiting time in queue. Second, we propose a wavelet based method to detect the greedy resource occupancy threat quickly. Since a sudden change in average occupancy time of the GSU will produce dramatic performance degradation, the GSU prefers to increase his occupancy time in a gradual manner to avoid the easy detection. Third, to protect honest SUs from being affected by GSUs, a protection strategy is put forward, and the system performance with the strategy has also been analyzed by the queueing analysis. Last, we conduct numerical analyses to demonstrate explicit impacts of GSUs on the system performance as well as efficacy of the protection strategy. We also carry out simulations on the detecting approach, and the results verify effectiveness and efficiency of our proposed approach.en_US
dc.format.extent11233,en_US
dc.format.extent11248en_US
dc.publisherIEEEen_US
dc.relation.haspart7967769.pdfen_US
dc.titleOn the Greedy Resource Occupancy Threat in Dynamic Spectrum Accessen_US
dc.typeArticleen_US
dc.journal.volume66en_US
dc.journal.issue12en_US
Appears in Collections:2017

Files in This Item:
File SizeFormat 
7967769.pdf1.86 MBAdobe PDF