Edité par LAP LAMBERT Academic Publishing, 2019
ISBN 10 : 6139459710 ISBN 13 : 9786139459711
Langue: anglais
Vendeur : Buchpark, Trebbin, Allemagne
EUR 29,81
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : Hervorragend. Zustand: Hervorragend | Seiten: 92 | Sprache: Englisch | Produktart: Bücher.
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 47,95
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - Master's Thesis from the year 2017 in the subject Computer Science - General, grade: 8.63, , course: M. Tech - Cognitive Radio Networks, language: English, abstract: Cognitive Radio Network (CRN) Technology makes the efficient utilization of scarce spectrum resources by allowing the unlicensed users to opportunistically use the licensed spectrum bands. Cognitive Radio Technology has gained a lot of attention from the researchers over the years however insufficient research has been done related to its security. Cognitive Radio Network due to its flexible and open nature is vulnerable to a number of security attacks. In this thesis we recognize different types of attacks at different layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely affects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). A number of cooperative secondary users are used for detecting the PUEA by comparing its estimated position with the known position of incumbent. The main goal of Novel Bat Algorithm (NBA) is to minimize two fitness functions namely non-linear least square (NLS) and the maximum likelihood (ML) in order to optimize the error in estimation.After evaluation, simulation results clearly demonstrates that NBA results in reduced estimation error as compared to Taylor Series Estimation (TSE) and Particle Swarm Optimization (PSO) and it also needs smaller number of secondary users for cooperation. Also maximum likelihood function performs better than non-linear least square function.
Vendeur : California Books, Miami, FL, Etats-Unis
EUR 60,60
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Edité par GRIN Verlag, GRIN Verlag Mai 2019, 2019
ISBN 10 : 3668943400 ISBN 13 : 9783668943407
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 47,95
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -Master's Thesis from the year 2017 in the subject Computer Science - General, grade: 8.63, , course: M. Tech - Cognitive Radio Networks, language: English, abstract: Cognitive Radio Network (CRN) Technology makes the efficient utilization of scarce spectrum resources by allowing the unlicensed users to opportunistically use the licensed spectrum bands. Cognitive Radio Technology has gained a lot of attention from the researchers over the years however insufficient research has been done related to its security. Cognitive Radio Network due to its flexible and open nature is vulnerable to a number of security attacks. In this thesis we recognize different types of attacks at different layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely affects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). A number of cooperative secondary users are used for detecting the PUEA by comparing its estimated position with the known position of incumbent. The main goal of Novel Bat Algorithm (NBA) is to minimize two fitness functions namely non-linear least square (NLS) and the maximum likelihood (ML) in order to optimize the error in estimation. After evaluation, simulation results clearly demonstrates that NBA results in reduced estimation error as compared to Taylor Series Estimation (TSE) and Particle Swarm Optimization (PSO) and it also needs smaller number of secondary users for cooperation. Also maximum likelihood function performs better than non-linear least square function.BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt 88 pp. Englisch.
Edité par LAP LAMBERT Academic Publishing Mär 2019, 2019
ISBN 10 : 6139459710 ISBN 13 : 9786139459711
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 54,90
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -In this work we recognize di¿erent types of attacks at di¿erent layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely äects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis ¿rst provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA).Books on Demand GmbH, Überseering 33, 22297 Hamburg 92 pp. Englisch.
Vendeur : preigu, Osnabrück, Allemagne
EUR 47,95
Autre deviseQuantité disponible : 5 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Detection of Primary User Emulation Attack in Cognitive Radio Networks based on TDOA using Novel Bat Algorithm | Aasia Rehman | Taschenbuch | 92 S. | Englisch | 2019 | GRIN Verlag | EAN 9783668943407 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.
Edité par LAP LAMBERT Academic Publishing, 2019
ISBN 10 : 6139459710 ISBN 13 : 9786139459711
Langue: anglais
Vendeur : Revaluation Books, Exeter, Royaume-Uni
EUR 101
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Brand New. 92 pages. 8.66x5.91x0.21 inches. In Stock.
Edité par LAP LAMBERT Academic Publishing, 2019
ISBN 10 : 6139459710 ISBN 13 : 9786139459711
Langue: anglais
Vendeur : dsmbooks, Liverpool, Royaume-Uni
EUR 158,15
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierpaperback. Etat : New. New. book.
Edité par LAP LAMBERT Academic Publishing, 2019
ISBN 10 : 6139459710 ISBN 13 : 9786139459711
Langue: anglais
Vendeur : moluna, Greven, Allemagne
EUR 46,15
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Rehman AasiaThe author is pursuing PhD in Computer Science at University of Kashmir, Srinagar. She has been awarded M.Tech in CSE from Shri Mata Vaishno Devi University, Jammu and B.Tech in CSE from University of Kashmir, Srinagar.
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
EUR 47,95
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Master's Thesis from the year 2017 in the subject Computer Science - General, grade: 8.63, , course: M. Tech - Cognitive Radio Networks, language: English, abstract: Cognitive Radio Network (CRN) Technology makes the efficient utilization of scarce spectrum resources by allowing the unlicensed users to opportunistically use the licensed spectrum bands. Cognitive Radio Technology has gained a lot of attention from the researchers over the years however insufficient research has been done related to its security. Cognitive Radio Network due to its flexible and open nature is vulnerable to a number of security attacks. In this thesis we recognize different types of attacks at different layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely affects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). A number of cooperative secondary users are used for detecting the PUEA by comparing its estimated position with the known position of incumbent. The main goal of Novel Bat Algorithm (NBA) is to minimize two fitness functions namely non-linear least square (NLS) and the maximum likelihood (ML) in order to optimize the error in estimation.After evaluation, simulation results clearly demonstrates that NBA results in reduced estimation error as compared to Taylor Series Estimation (TSE) and Particle Swarm Optimization (PSO) and it also needs smaller number of secondary users for cooperation. Also maximum likelihood function performs better than non-linear least square function. 92 pp. Englisch.
Edité par LAP LAMBERT Academic Publishing Mrz 2019, 2019
ISBN 10 : 6139459710 ISBN 13 : 9786139459711
Langue: anglais
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
EUR 54,90
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In this work we recognize di erent types of attacks at di erent layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely a ects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). 92 pp. Englisch.
Edité par LAP LAMBERT Academic Publishing, 2019
ISBN 10 : 6139459710 ISBN 13 : 9786139459711
Langue: anglais
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 55,56
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In this work we recognize di erent types of attacks at di erent layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely a ects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA).