2016
DOI: 10.1109/jsac.2016.2605799
|View full text |Cite
|
Sign up to set email alerts
|

You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(19 citation statements)
references
References 37 publications
0
17
0
Order By: Relevance
“…The SSP mechanism in the Bluetooth standard is responsible for this task. In addition, when we build a secure home network system, the SSP mechanism also is the backbone of the Bluetooth solution to cooperate with other kinds of secure schemes [24][25][26][27][28][29].…”
Section: Performance Analysis Of Improved Passkey Entry Protocolmentioning
confidence: 99%
“…The SSP mechanism in the Bluetooth standard is responsible for this task. In addition, when we build a secure home network system, the SSP mechanism also is the backbone of the Bluetooth solution to cooperate with other kinds of secure schemes [24][25][26][27][28][29].…”
Section: Performance Analysis Of Improved Passkey Entry Protocolmentioning
confidence: 99%
“…if collision from Jammer then 9: C πi = C πi + 1 10: else 11: r t ← 1 12: end if 13: end if 14: end for 15…”
Section: Su Algorithm: Cnjmentioning
confidence: 99%
“…A larger u c o f f indicates that c is better and more suitable for data transmission. It is assumed that each node independently estimates PUs' activities using the above ON/OFF model instead of relying on a geo-location database [34].…”
Section: Problem Formulationmentioning
confidence: 99%