Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (1)

Search Parameters:
Keywords = rate-aware jammers

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 644 KB  
Article
Entice to Trap: Enhanced Protection against a Rate-Aware Intelligent Jammer in Cognitive Radio Networks
by Khalid Ibrahim, Abdullah M. Alnajim, Aqdas Naveed Malik, Athar Waseem, Saleh Alyahya, Muhammad Islam and Sheroz Khan
Sustainability 2022, 14(5), 2957; https://doi.org/10.3390/su14052957 - 3 Mar 2022
Cited by 9 | Viewed by 3000
Abstract
Anti-jamming in cognitive radio networks (CRN) is mainly accomplished using machine learning techniques in the domains of frequency, coding, power and rate. Jamming is a major threat to CRN because it can cause severe performance damage such as network isolation, network application interruption [...] Read more.
Anti-jamming in cognitive radio networks (CRN) is mainly accomplished using machine learning techniques in the domains of frequency, coding, power and rate. Jamming is a major threat to CRN because it can cause severe performance damage such as network isolation, network application interruption and even physical damage to infrastructure simple radio devices. With the improvement in communication technologies, the capabilities of adversaries are also increased. The intelligent jammer knows the rate at which users transmit data, which is based on the attractiveness factor of each user. The higher the data rate for a secondary user, the more attractive it is to the rate-aware jammer. In this paper, we present a dummy user in the network as a honeypot of the jammer to get the jammer’s attention. A new anti-jamming deceiving theoretical method based on rate modifications is introduced to increase the bandwidth efficiency of the entire cognitive radio-based communication system. We employ a defensive anti-jamming deception mechanism of the Pseudo Secondary User (PSU) to as an entice to trap the attacker by providing thus enhanced protection for the rest of the network from the impact of the attacker. Our analytical simulation results show a significant improvement in performance using the proposed solution. The utility of the proposed intelligent anti-jamming algorithm lies in its applications to support the secondary wireless sensor nodes. Full article
Show Figures

Figure 1

Back to TopTop