8,505 research outputs found
Byzantine Attack and Defense in Cognitive Radio Networks: A Survey
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the
spectrum sensing data falsification (SSDF) attack in the literature, is one of
the key adversaries to the success of cognitive radio networks (CRNs). In the
past couple of years, the research on the Byzantine attack and defense
strategies has gained worldwide increasing attention. In this paper, we provide
a comprehensive survey and tutorial on the recent advances in the Byzantine
attack and defense for CSS in CRNs. Specifically, we first briefly present the
preliminaries of CSS for general readers, including signal detection
techniques, hypothesis testing, and data fusion. Second, we analyze the spear
and shield relation between Byzantine attack and defense from three aspects:
the vulnerability of CSS to attack, the obstacles in CSS to defense, and the
games between attack and defense. Then, we propose a taxonomy of the existing
Byzantine attack behaviors and elaborate on the corresponding attack
parameters, which determine where, who, how, and when to launch attacks. Next,
from the perspectives of homogeneous or heterogeneous scenarios, we classify
the existing defense algorithms, and provide an in-depth tutorial on the
state-of-the-art Byzantine defense schemes, commonly known as robust or secure
CSS in the literature. Furthermore, we highlight the unsolved research
challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral
SaferCross: Enhancing Pedestrian Safety Using Embedded Sensors of Smartphone
The number of pedestrian accidents continues to keep climbing. Distraction
from smartphone is one of the biggest causes for pedestrian fatalities. In this
paper, we develop SaferCross, a mobile system based on the embedded sensors of
smartphone to improve pedestrian safety by preventing distraction from
smartphone. SaferCross adopts a holistic approach by identifying and developing
essential system components that are missing in existing systems and
integrating the system components into a "fully-functioning" mobile system for
pedestrian safety. Specifically, we create algorithms for improving the
accuracy and energy efficiency of pedestrian positioning, effectiveness of
phone activity detection, and real-time risk assessment. We demonstrate that
SaferCross, through systematic integration of the developed algorithms,
performs situation awareness effectively and provides a timely warning to the
pedestrian based on the information obtained from smartphone sensors and Direct
Wi-Fi-based peer-to-peer communication with approaching cars. Extensive
experiments are conducted in a department parking lot for both component-level
and integrated testing. The results demonstrate that the energy efficiency and
positioning accuracy of SaferCross are improved by 52% and 72% on average
compared with existing solutions with missing support for positioning accuracy
and energy efficiency, and the phone-viewing event detection accuracy is over
90%. The integrated test results show that SaferCross alerts the pedestrian
timely with an average error of 1.6sec in comparison with the ground truth
data, which can be easily compensated by configuring the system to fire an
alert message a couple of seconds early.Comment: Published in IEEE Access, 202
Cell degradation detection based on an inter-cell approach
Fault management is a crucial part of cellular network management systems. The status of the base stations is usually monitored by well-defined key performance indicators (KPIs). The approaches for cell degradation detection are based on either intra-cell or inter-cell analysis of the KPIs. In intra-cell analysis, KPI profiles are built based on their local history data whereas in inter-cell analysis, KPIs of one cell are compared with the corresponding KPIs of the other cells. In this work, we argue in favor of the inter-cell approach and apply a degradation detection method that is able to detect a sleeping cell that could be difficult to observe using traditional intra-cell methods. We demonstrate its use for detecting emulated degradations among performance data recorded from a live LTE network. The method can be integrated in current systems because it can operate using existing KPIs without any major modification to the network infrastructure
- âŚ