摘要:
In some embodiments, authentication, confidentiality, and privacy are enhanced for a wireless network of cognitive radios by encryption of network management and control messages as well as data traffic, thereby protecting information pertaining to node identification, node location, node-sensed incumbent transmissions, CRN frequency channel selections, and such like. During initial network registration, a temporary ID can be issued to a node, and then replaced once encrypted communication has been established. This prevents association of initial, clear-text messages with later encrypted transmissions. Elliptic curve cryptography can be used for mutual authentication between subscribers and the base station. ECC-based implicit digital certificates can be embedded in co-existence beacons used by CRN nodes to coordinate use of frequency channels, thereby preventing denial of service attacks due to transmitting of falsified beacons. Similar certificates can be embedded within identity beacons used to protect certain incumbents from interference by the CRN.
摘要:
Various cognitive communications system architectures and their corresponding Protocol Reference Models (PRMs) are disclosed. Such PRMs incorporate a Cognitive Plane in addition to conventional Data and Management Planes. The additional Cognitive Plane functionality may include, for example, spectrum sensing, spectrum management, geolocation, and security functions. The Cognitive Plane may further include a Policy Engine and a Learning and Reasoning Module. In some embodiments, Management Plane functions may be effectively combined to form a database of primitives (and their respective values) called a Management Information Base (MIB). In addition, techniques are provided by which various components of cognitive and non-cognitive, as well as mesh-enabled and non-mesh-enabled nodes in a network, inter-operate with each other. The architectures allow a Spectrum Manager (or Signal Space Manager) to combine information from various network layers (e.g., PHY/MAC Layers, Spectrum Sensing Function, Geolocation Function, and/or Security Sublayers), and to make informed decisions on spectrum utilization.
摘要:
Various cognitive communications system architectures and their corresponding Protocol Reference Models (PRMs) are disclosed. Such PRMs incorporate a Cognitive Plane in addition to conventional Data and Management Planes. The additional Cognitive Plane functionality may include, for example, spectrum sensing, spectrum management, geolocation, and security functions. The Cognitive Plane may further include a Policy Engine and a Learning and Reasoning Module. In some embodiments, Management Plane functions may be effectively combined to form a database of primitives (and their respective values) called a Management Information Base (MIB). In addition, techniques are provided by which various components of cognitive and non-cognitive, as well as mesh-enabled and non-mesh-enabled nodes in a network, inter-operate with each other. The architectures allow a Spectrum Manager (or Signal Space Manager) to combine information from various network layers (e.g., PHY/MAC Layers, Spectrum Sensing Function, Geolocation Function, and/or Security Sublayers), and to make informed decisions on spectrum utilization.
摘要:
Various cognitive communications system architectures and their corresponding Protocol Reference Models (PRMs) are disclosed. Such PRMs incorporate a Cognitive Plane in addition to conventional Data and Management Planes. The additional Cognitive Plane functionality may include, for example, spectrum sensing, spectrum management, geolocation, and security functions. The Cognitive Plane may further include a Policy Engine and a Learning and Reasoning Module. In some embodiments, Management Plane functions may be effectively combined to form a database of primitives (and their respective values) called a Management Information Base (MIB). In addition, techniques are provided by which various components of cognitive and non-cognitive, as well as mesh-enabled and non-mesh-enabled nodes in a network, inter-operate with each other. The architectures allow a Spectrum Manager (or Signal Space Manager) to combine information from various network layers (e.g., PHY/MAC Layers, Spectrum Sensing Function, Geolocation Function, and/or Security Sublayers), and to make informed decisions on spectrum utilization.
摘要:
Various cognitive communications system architectures and their corresponding Protocol Reference Models (PRMs) are disclosed. Such PRMs incorporate a Cognitive Plane in addition to conventional Data and Management Planes. The additional Cognitive Plane functionality may include, for example, spectrum sensing, spectrum management, geolocation, and security functions. The Cognitive Plane may further include a Policy Engine and a Learning and Reasoning Module. In some embodiments, Management Plane functions may be effectively combined to form a database of primitives (and their respective values) called a Management Information Base (MIB). In addition, techniques are provided by which various components of cognitive and non-cognitive, as well as mesh-enabled and non-mesh-enabled nodes in a network, inter-operate with each other. The architectures allow a Spectrum Manager (or Signal Space Manager) to combine information from various network layers (e.g., PHY/MAC Layers, Spectrum Sensing Function, Geolocation Function, and/or Security Sublayers), and to make informed decisions on spectrum utilization.
摘要:
In some embodiments, authentication, confidentiality, and privacy are enhanced for a wireless network of cognitive radios by encryption of network management and control messages as well as data traffic, thereby protecting information pertaining to node identification, node location, node-sensed incumbent transmissions, CRN frequency channel selections, and such like. During initial network registration, a temporary ID can be issued to a node, and then replaced once encrypted communication has been established. This prevents association of initial, clear-text messages with later encrypted transmissions. Elliptic curve cryptography can be used for mutual authentication between subscribers and the base station. ECC-based implicit digital certificates can be embedded in co-existence beacons used by CRN nodes to coordinate use of frequency channels, thereby preventing denial of service attacks due to transmitting of falsified beacons. Similar certificates can be embedded within identity beacons used to protect certain incumbents from interference by the CRN.
摘要:
Techniques are disclosed that allow for resource allocation during situations requiring co-existence in cognitive radios. Even under situations of bandwidth scarcity, the techniques allow various users to be guaranteed quality of service (QoS) by proper distribution and allocation of resources. The techniques allow wireless communication systems to operate in a normal mode and a co-existence mode. In the co-existence mode of operation, sub-frame creation, sharing and zone formation schemes are implemented that enable the existing underlying frame structure to remain intact and inter-operable with the legacy systems and at the same time, provide a guaranteed QoS. The zones effectively create partitions in space, time and frequency, which result in interference avoidance and allow various users in neighboring cells to communicate on the same frequencies.
摘要:
Techniques are disclosed that allow for resource allocation during situations requiring co-existence in cognitive radios. Even under situations of bandwidth scarcity, the techniques allow various users to be guaranteed quality of service (QoS) by proper distribution and allocation of resources. The techniques allow wireless communication systems to operate in a normal mode and a co-existence mode. In the co-existence mode of operation, sub-frame creation, sharing and zone formation schemes are implemented that enable the existing underlying frame structure to remain intact and inter-operable with the legacy systems and at the same time, provide a guaranteed QoS. The zones effectively create partitions in space, time and frequency, which result in interference avoidance and allow various users in neighboring cells to communicate on the same frequencies.
摘要:
The present invention relates to phosphonated Rifamycins, and methods of making and using such compounds. These compounds are useful as antibiotics for prophylaxis and/or the treatment of bone and joint infections, especially for the prophylaxis and/or treatment of osteomyelitis.
摘要:
The invention relates to derivatives of glycopeptide and lipoglycopeptide antibiotics possessing an altered ionization state with respect to the parent glycopeptide or lipoglycopeptide antibiotic, and having the ability to be regenerated as the parent glycopeptide or lipoglycopeptide antibiotic under physiological conditions. These compounds are useful as antibiotics for the prevention and/or the treatment of bacterial infections.