
NSF Org: |
AST Division Of Astronomical Sciences |
Recipient: |
|
Initial Amendment Date: | August 26, 2014 |
Latest Amendment Date: | August 26, 2014 |
Award Number: | 1443956 |
Award Instrument: | Standard Grant |
Program Manager: |
Jon Williams
jonwilli@nsf.gov (703)292-2455 AST Division Of Astronomical Sciences MPS Directorate for Mathematical and Physical Sciences |
Start Date: | September 1, 2014 |
End Date: | July 31, 2018 (Estimated) |
Total Intended Award Amount: | $459,875.00 |
Total Awarded Amount to Date: | $459,875.00 |
Funds Obligated to Date: |
|
History of Investigator: |
|
Recipient Sponsored Research Office: |
3227 CHEADLE HALL SANTA BARBARA CA US 93106-0001 (805)893-4188 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
CA US 93106-5110 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): | EARS |
Primary Program Source: |
|
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.049 |
ABSTRACT
The scientists identify an important issue for a world of devices all communicating wirelessly: "How to identify malfunctioning devices or those not fairly sharing the spectrum with others?" The scientists explore scenarios for leveraging local, crowd-sourced mobile devices to detect and identify unauthorized transmitters. The goal of this technique is to reduce the cost of enforcement of network rules by adding the capability of some smart phones to sense the radio spectrum use and report back to a central database.
The PIs propose to develop a Crowd-based Spectrum ENforcement System (CSENS), which takes a data-driven approach to spectrum enforcement. Specifically, the PIs propose to conduct 3 tasks: (i) real-time on-demand spectrum monitoring, which enables real-time responses to spectrum measurement tasks; (ii) utilizing physical layer features to embed cryptographic spectrum permits into transmissions, which enables reliably distinguish between authorized and unauthorized spectrum users; (iii) using a library of known signatures for network applications, unauthorized transmitters can be uniquely identified.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
Please report errors in award information by writing to: awardsearch@nsf.gov.