The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cognitive radio networks (CRNs) are vulnerable to various attacks. Primary user emulation attack (PUEA) is one kind of serious attacks. In order to combat PUEA, we propose an algorithm to detect PUEA in CRNs based on probability density function (PDF) assisted by belief propagation (BP), called PDF-BP. In the proposed algorithm, every secondary user (SU) calculates its belief value based on the PDF...
In this paper, we investigate the cooperation issue via spectrum sharing when employing physical layer security concept into the device-to-device (D2D) communications underlaying cellular networks. First, we derive the optimal joint power control solutions of the cellular communication links and D2D pairs in terms of the secrecy capacity under a simple cooperation case and further propose a secrecy-based...
The efficient design of evolving smart grid faces serious challenges of a variety of malicious attacks. In this paper, the complex decision making processes between a network of electricity users that perform wireless meter data aggregation via other users and multiple sophisticated wireless attackers that are able to act as eavesdroppers and as jammers are investigated. We model the interactions...
In this paper, we investigate the cooperation issue via spectrum sharing when employing the physical layer security concept into the Device-to-Device (D2D) communications underlaying cellular network. Different from previously related works, we consider a more general interference case that multiple D2D pairs can access the same resource block (RB) and one D2D pair is also permitted to access multiple...
For the basic requirements of power system operation of security, high quality, economy, environmental protection, a multi-objective optimal power flow(MOPF) model is established to minimize three objective functions of load buses voltage deviations, network active power loss, pollution gas emissions and meanwhile to satisfy the security constraints of power transmission limits in lines. The normal...
Smart grid is the modernization of the existing nation-wide power grid. As a core component of the smart grid, Advanced Metering Infrastructure (AMI) integrates a two-way communications network which enables customers and utilities to actively monitor and manage their energy use. While the deployment of AMI brings enormous social and industrial benefits, some incurred security and privacy issues need...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.