2020
DOI: 10.1049/iet-com.2020.0024
|View full text |Cite
|
Sign up to set email alerts
|

Survey on cognitive anti‐jamming communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(20 citation statements)
references
References 115 publications
0
16
0
Order By: Relevance
“…Game theory is widely used in wireless communications to solve communication problems like resource allocation [22]- [24], packet relaying [5] and anti-jamming communication [8], [10], [25]- [27] , as shown in Fig. 2.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Game theory is widely used in wireless communications to solve communication problems like resource allocation [22]- [24], packet relaying [5] and anti-jamming communication [8], [10], [25]- [27] , as shown in Fig. 2.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The adaptability of CR could provide intelligence to spec-trum sensing and spectrum decision [5]. On the other hand, the adversary can also manoeuvre the same features intelligently to create more harm to the underlying CR Network (CRN) [8]- [10]. Therefore, ensuring security is of paramount importance to the successful deployment of cognitive radio networks.…”
Section: Introductionmentioning
confidence: 99%
“…To prevent jamming, the CR's flexibility may provide intelligence in spectrum detection and spectrum decisions [1]. On the other hand, the enemy can proactively use the same attributes to cause more damage to the cognitive radio network (CRN)-based communication system [2,3].…”
Section: Introductionmentioning
confidence: 99%
“…Game theory is widely used in wireless communications to solve many communication problems such as resource allocation [10], packet relaying [1], anti-jamming communication [2,3,11,12]. Very recently, Zhu et al in [13] has presented state of the art survey on game's theoretic defensive deception.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, as more and more private sensitive data are exchanged among mobile devices, communication security issues have received widespread attention, such as jamming attacks [1,2]. In the field of anti-jamming, frequency hopping is a common approach and has attracted widespread attention [3,4].…”
Section: Introductionmentioning
confidence: 99%