2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications 2020
DOI: 10.1109/pimrc48278.2020.9217140
|View full text |Cite
|
Sign up to set email alerts
|

Mitigation of Jamming Attacks via Deception

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…More recently, Nan et al [34] introduced a ground-breaking Stackelberg deception game based on power allocation. They considered two pairs of a transmitter-receiver.…”
Section: Deception Based Defence Strategiesmentioning
confidence: 99%
“…More recently, Nan et al [34] introduced a ground-breaking Stackelberg deception game based on power allocation. They considered two pairs of a transmitter-receiver.…”
Section: Deception Based Defence Strategiesmentioning
confidence: 99%
“…The work in [28] proposes an anti-jamming algorithm in which "decoy" users are used to trap the jammer. Similar to [28], the authors in [29] propose to foil the jammer by dedicating a secondary user that transmits fake signals to attract a portion of the jamming power. The authors in [30] propose an anti-jamming method where a transmitter forms a decoy beam in another frequency channel than the main communication channel to distract the jammer from the main communication beam.…”
Section: A Related Workmentioning
confidence: 99%
“…As a result, the problem of finding the optimal channel allocation and user selection as a decoy are not considered. Moreover, since the works in [28] and [29] devote at least one user to secure other users' communication, they are not practical for single user scenarios. Furthermore, similar to the works in [12], [15], [16], [20], and [26], the proposed methods in [30] and [31] are restricted to specific system models since [31] employs an RF tag to back scatter information, which is not available in all the networks, and both works assume that the legitimate nodes are equipped with multi-array antennas.…”
Section: A Related Workmentioning
confidence: 99%
“…Recently, a new deception mechanism has been developed to trap the jammer into attacking a decoy channel. The authors in [34] proposed to transmit fake information over a second transmitter‐receiver pair and deceive the jammer into investing some of its power budget for jamming the decoy channel. In [35], the authors extended the single‐user situation in [34] to the multi‐user scenario and further considered the selection of decoy channel.…”
Section: Introductionmentioning
confidence: 99%