2021 1st Babylon International Conference on Information Technology and Science (BICITS) 2021
DOI: 10.1109/bicits51482.2021.9509929
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive Radio Network: Security and Reliability trade-off - Status, Challenges, and Future trend

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…Under this interpretation the reward for a jammer agent (J) will be (6) 𝑅 w2 = βˆ’1 Γ— 𝑅 w1 . Using above equations, we get (7) 𝑅 w = { 1 if SNR R U β‰₯ SNR cutoff , βˆ’1 otherwise, where cutoff is demodulation threshold, when the SNR at receiver (SNR R U ) is lower than this threshold then the data transmission fails, therefore the agent for jamming process will get positive reward while agent for anti-jamming process will get negative reward.…”
Section: Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Under this interpretation the reward for a jammer agent (J) will be (6) 𝑅 w2 = βˆ’1 Γ— 𝑅 w1 . Using above equations, we get (7) 𝑅 w = { 1 if SNR R U β‰₯ SNR cutoff , βˆ’1 otherwise, where cutoff is demodulation threshold, when the SNR at receiver (SNR R U ) is lower than this threshold then the data transmission fails, therefore the agent for jamming process will get positive reward while agent for anti-jamming process will get negative reward.…”
Section: Environmentmentioning
confidence: 99%
“…A variety of work has been carried out on the topic of anti-jamming and jamming schemes as discussed in [6]. The traditional approaches in the context of anti-jamming communication, mostly rely on pure signal processing methods, which presents significant performance limitations [7,8]. Although in the past recent years jamming issues in CRNs are being addressed by machine learning techniques, game theory method, and Markov decision processes [9,10].…”
Section: Introductionmentioning
confidence: 99%
“…However, the above techniques still could not solve the spectrum limitation of IoT. Faced with the spectrum limitation, cognitive radio (CR) is widely studied, where the spectrum sensing technique is applied to find the idle spectrum [22]- [25]. In the CR networks, the secondary users could use the authorized spectrum of primary users (PUs).…”
Section: Introductionmentioning
confidence: 99%