2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN) 2015
DOI: 10.1109/icscn.2015.7219898
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent jamming threats to Cognitive Radio based strategic communication networks - A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…The jammer tries to deprive other users from sensing the availability of a channel by sending packets continuously. When an attacker blocks the dedicated channel used to exchange the sensing data between users, the network will be considerably damaged and Gao et al, the trust protocol design using the location of eavesdroppers in Cai et al, and the optimization of secrecy energy efficiency model in Ouyang et al, which enhances significantly both the security and energy efficiency of CRN.…”
Section: Crns Attacks and Vulnerabilitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…The jammer tries to deprive other users from sensing the availability of a channel by sending packets continuously. When an attacker blocks the dedicated channel used to exchange the sensing data between users, the network will be considerably damaged and Gao et al, the trust protocol design using the location of eavesdroppers in Cai et al, and the optimization of secrecy energy efficiency model in Ouyang et al, which enhances significantly both the security and energy efficiency of CRN.…”
Section: Crns Attacks and Vulnerabilitiesmentioning
confidence: 99%
“…The jammer tries to deprive other users from sensing the availability of a channel by sending packets continuously. When an attacker blocks the dedicated channel used to exchange the sensing data between users, the network will be considerably damaged …”
Section: Crns Attacks and Vulnerabilitiesmentioning
confidence: 99%