2014 IEEE 28th International Conference on Advanced Information Networking and Applications 2014
DOI: 10.1109/aina.2014.23
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Constant Jamming in Cognitive Radio Networks Using Hybrid FEC Code

Abstract: Abstract-The task of detecting and mitigating Cognitive Radios (CRs) operating as constant jammers in a Cognitive Radio network (CRN) can be very daunting. The CR constant jammers prey on the adaptable functionalities of CRN so as to cause serious denial of service to the users of the network. In addition, these jammers are capable of introducing value faults in pathological cases as a result of being able to manipulate transmitted data. In previous research, we have investigated the performance of CRNs operat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…The reactive jammers are more dangerous than the other type since the jammer node listen the activities on the network and transmits a random signal immediately on the detection the legitimate activity in order to disrupt legal communication activities on the network [17]- [19].…”
Section: Jammer Typesmentioning
confidence: 99%
“…The reactive jammers are more dangerous than the other type since the jammer node listen the activities on the network and transmits a random signal immediately on the detection the legitimate activity in order to disrupt legal communication activities on the network [17]- [19].…”
Section: Jammer Typesmentioning
confidence: 99%
“…The probability of being jammed by an attacker is low in this scheme due to the use of a Q-function based approach. Authors in [14] present a hybrid forward error correction (FEC) code that provides data integrity service using data redundancy check. The lost or manipulated data caused by jamming attacks need not be retransmitted in this approach.…”
Section: S Trategies For a Nti-j Amming I N Crnmentioning
confidence: 99%
“…Victor et al [14] A hybrid forward error correction code (combination of the Efficient and robust against attacks by only constant jammers Raptor code and the Secure Hash Algorithm-2) that provides in a Cooperative Spectrum Sensing CR. Other types of data integrity service using data redundancy check.…”
Section: S Trategies For a Nti-j Amming I N Crnmentioning
confidence: 99%