FRAUDULENT SYNCHRONIZATION BURST DETECTION
During operation of a secondary communication system ( 100 ), a random exponential back off for future sync bursts will be executed following the detection of an unauthenticated beacon. More particularly, a cognitive radio ( 104 ) acts on every sync burst received, until acting on one results in the...
Saved in:
Main Authors | , |
---|---|
Format | Patent |
Language | English French German |
Published |
17.06.2009
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | During operation of a secondary communication system ( 100 ), a random exponential back off for future sync bursts will be executed following the detection of an unauthenticated beacon. More particularly, a cognitive radio ( 104 ) acts on every sync burst received, until acting on one results in the reception of no beacon or an unauthenticated beacon. The cognitive radio then begins a random exponential back off procedure, in which it must receive a random number of sync bursts before it will schedule time to receive a beacon. For each unauthenticated beacon received, the back off exponent is incremented, thereby increasing the number of sync bursts that must be received before it will schedule time to receive a beacon again. |
---|---|
Bibliography: | Application Number: EP20070813475 |