2016
DOI: 10.1002/wcm.2745
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating jamming attacks in mobile cognitive networks through time hopping

Abstract: 5G wireless networks will support massive connectivity mainly due to device-to-device communications. An enabling technology for device-to-device links is the dynamical spectrum access. The devices, which are equipped with cognitive radios, are to be allowed to reuse spectrum occupied by cellular links. The dynamical spectrum availability makes cognitive users switch between channels. Switching leads to energy consumption, latency, and communication overhead in general. The performance degrades even more when … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Time is divided into slots (for example, enough to send one packet), and users switch continuously between slots based on a predetermined random sequence. In Adem et al (2016), Adem, Hamdaoui and Yavuz expand their work from Adem et al (2015), and offer two additional takes on time-based hopping schemes, applicable when users are mobile instead of stationary, and when there is access to an arbitrary number of channels (even only one). These cases more accurately represent the reality of 5G D2D communications.…”
Section: Jammingmentioning
confidence: 99%
“…Time is divided into slots (for example, enough to send one packet), and users switch continuously between slots based on a predetermined random sequence. In Adem et al (2016), Adem, Hamdaoui and Yavuz expand their work from Adem et al (2015), and offer two additional takes on time-based hopping schemes, applicable when users are mobile instead of stationary, and when there is access to an arbitrary number of channels (even only one). These cases more accurately represent the reality of 5G D2D communications.…”
Section: Jammingmentioning
confidence: 99%
“…In the works of Adem et al, 2 jamming mitigation techniques for CRNs, where mobile nodes are assumed to have no access to multiple channels during jamming, are provided. Both techniques rely on time‐based hopping and time evasion when jamming happens.…”
Section: Related Workmentioning
confidence: 99%
“…Security and privacy in CRN s have gained some attention recently. Adem et al [7] addressed jamming attacks in CRN s.…”
Section: A Related Workmentioning
confidence: 99%