FRAUDULENT SYNCHRONIZATION BURST DETECTION

During operation of a secondary communication system ( 100 ), a random exponential back off for future sync bursts will be executed following the detection of an unauthenticated beacon. More particularly, a cognitive radio ( 104 ) acts on every sync burst received, until acting on one results in the...

Full description

Saved in:
Bibliographic Details
Main Authors GORDAY, PAUL E, CALLAWAY, EDGAR HERBERT, JR
Format Patent
LanguageEnglish
French
German
Published 17.06.2009
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:During operation of a secondary communication system ( 100 ), a random exponential back off for future sync bursts will be executed following the detection of an unauthenticated beacon. More particularly, a cognitive radio ( 104 ) acts on every sync burst received, until acting on one results in the reception of no beacon or an unauthenticated beacon. The cognitive radio then begins a random exponential back off procedure, in which it must receive a random number of sync bursts before it will schedule time to receive a beacon. For each unauthenticated beacon received, the back off exponent is incremented, thereby increasing the number of sync bursts that must be received before it will schedule time to receive a beacon again.
Bibliography:Application Number: EP20070813475