2015 IEEE Globecom Workshops (GC Wkshps) 2015
DOI: 10.1109/glocomw.2015.7414043
|View full text |Cite
|
Sign up to set email alerts
|

Pseudorandom Time-Hopping Anti-Jamming Technique for Mobile Cognitive Users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 12 publications
0
10
0
1
Order By: Relevance
“…The authors of [24] proposed a secretive adaptive frequency hopping scheme for 5G. The authors of [25] proposed a pseudo-random time hopping for anti-jamming in 5G wireless networks. The authors analytically evaluated the performance of the proposed scheme by determining the jamming probability, the switching rate, and bit error rate.…”
Section: )mentioning
confidence: 99%
“…The authors of [24] proposed a secretive adaptive frequency hopping scheme for 5G. The authors of [25] proposed a pseudo-random time hopping for anti-jamming in 5G wireless networks. The authors analytically evaluated the performance of the proposed scheme by determining the jamming probability, the switching rate, and bit error rate.…”
Section: )mentioning
confidence: 99%
“…Adem, Hamdaour and Yavuz propose time-based hopping instead of frequency-based hopping (Adem et al 2015). In this scheme, a channel is divided into n portions, and data is sent by a user over one portion.…”
Section: Jammingmentioning
confidence: 99%
“…Time is divided into slots (for example, enough to send one packet), and users switch continuously between slots based on a predetermined random sequence. In Adem et al (2016), Adem, Hamdaoui and Yavuz expand their work from Adem et al (2015), and offer two additional takes on time-based hopping schemes, applicable when users are mobile instead of stationary, and when there is access to an arbitrary number of channels (even only one). These cases more accurately represent the reality of 5G D2D communications.…”
Section: Jammingmentioning
confidence: 99%
“…However, these techniques are not suitable for use in 5G due to massive device deployments. New techniques are currently under investigation, making this an open research area (Adem et al, 2015;Labib et al, 2015). Denial of service (DoS) and distributed denial of service (DDoS) attacks involve flooding a device or network domain with service requests using a single device or multiple illegitimate devices, respectively.…”
Section: Security Attacks On the Mobile Wireless Network Segmentmentioning
confidence: 99%