2021 International Conference on Engineering and Emerging Technologies (ICEET) 2021
DOI: 10.1109/iceet53442.2021.9659646
|View full text |Cite
|
Sign up to set email alerts
|

COVER FIRE: Deceptive Anti-Jamming using Pseudo Secondary Users in Cognitive Radio Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…In [32], Zhang et al proposed an anti-jamming method that devoted parts of users' benefits to trap the jammer and defend transmissions of the rest users. In [33], a deception method based on pseudo secondary user was proposed by introducing a sweetener to mislead the jammer and protect the communication system. Recently, a new deception mechanism has been developed to trap the jammer into attacking a decoy channel.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…In [32], Zhang et al proposed an anti-jamming method that devoted parts of users' benefits to trap the jammer and defend transmissions of the rest users. In [33], a deception method based on pseudo secondary user was proposed by introducing a sweetener to mislead the jammer and protect the communication system. Recently, a new deception mechanism has been developed to trap the jammer into attacking a decoy channel.…”
Section: Related Work and Motivationmentioning
confidence: 99%