2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) 2014
DOI: 10.1109/ccnc.2014.6866592
|View full text |Cite
|
Sign up to set email alerts
|

LocJam: A novel jamming-based approach to secure localization in wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 42 publications
0
1
0
Order By: Relevance
“…Every SM senses the channel, picks a random element of the matrix, decodes it with appropriate OCS (which it already learnt in the initialization phase) and uses that pseudo-random number to perturb its data. After the j th element of the matrix is fetched and decoded, the SM will jam that element of the matrix (representing an invalid or already-used pseudo-random number) [60]. Assume SM k has fetched and decoded pseudo-random number α j spread with OCS λj .…”
Section: And Consequently Av G I = Av G I ) This Implies Thatmentioning
confidence: 99%
“…Every SM senses the channel, picks a random element of the matrix, decodes it with appropriate OCS (which it already learnt in the initialization phase) and uses that pseudo-random number to perturb its data. After the j th element of the matrix is fetched and decoded, the SM will jam that element of the matrix (representing an invalid or already-used pseudo-random number) [60]. Assume SM k has fetched and decoded pseudo-random number α j spread with OCS λj .…”
Section: And Consequently Av G I = Av G I ) This Implies Thatmentioning
confidence: 99%