2011
DOI: 10.1109/twc.2011.010411.100057
|View full text |Cite
|
Sign up to set email alerts
|

Spectrally Efficient Jamming Mitigation Based on Code-Controlled Frequency Hopping

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…Proactive channel hopping is the simplest implementation. Different variations of channel hopping are discussed in (Khattab et al, 2008a,b;Wood et al, 2007;Navda et al, 2007;Gummadi et al, 2007;Kerkez et al, 2009;Wang et al, 2011;Yoon et al, 2010). They improve the effectiveness of channel hopping by making it reactive, adaptive and code-controlled.…”
Section: Channel Hoppingmentioning
confidence: 99%
See 2 more Smart Citations
“…Proactive channel hopping is the simplest implementation. Different variations of channel hopping are discussed in (Khattab et al, 2008a,b;Wood et al, 2007;Navda et al, 2007;Gummadi et al, 2007;Kerkez et al, 2009;Wang et al, 2011;Yoon et al, 2010). They improve the effectiveness of channel hopping by making it reactive, adaptive and code-controlled.…”
Section: Channel Hoppingmentioning
confidence: 99%
“…Recently, Wang et al (2011) put forward a code-controlled message-driven frequency hopping mechanism. It generates a dynamic hopping pattern each time the channel is changed.…”
Section: Channel Hoppingmentioning
confidence: 99%
See 1 more Smart Citation
“…In [15], Xiao et al proposed a collaborative UFH scheme in which earlier receivers of a broadcast message serve as relays for other nodes, and the scheme was subsequently analyzed in [16]. More recently, jamming-resistant communication against inside attacker has been studied in [17]- [19]. These schemes are based on frequency hopping and thus cannot be directly applied to our target scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, it is of paramount importance to investigate the jamming issue to enhance wireless security. In this regards, various schemes have been proposed to defend jamming attacks in recent years, such as frequency hopping [2], uncoordinated frequency hopping [3], power control [4], and so on.…”
Section: Introductionmentioning
confidence: 99%