BDDTPA: Blockchain-driven deep traffic pattern analysis for enhanced security in cognitive radio ad-hoc networks
Cognitive Radio Ad-hoc Networks (CRAHNs) combines characteristics of ad-hoc networks
with cognitive radios to facilitate a variety of communication scenarios. However, these …
with cognitive radios to facilitate a variety of communication scenarios. However, these …
Generative Adversarial Networks for Secure Data Transmission in Wireless Network.
E Jayabalan, R Pugazendi - Intelligent Automation & Soft …, 2023 - search.ebscohost.com
In this paper, a communication model in cognitive radios is developed and uses machine
learning to learn the dynamics of jamming attacks in cognitive radios. It is designed further to …
learning to learn the dynamics of jamming attacks in cognitive radios. It is designed further to …
Constellation design for non-coherent fast-forward relays to mitigate full-duplex jamming attacks
With potential applications to short-packet communication, we address communication of
low-latency messages in fast-fading channels under the presence of a reactive jammer …
low-latency messages in fast-fading channels under the presence of a reactive jammer …
Optimization of Subband Reconstruction for Integrated Communication and Cancellation System
Z Wang, F He, Y Zhang, Q Lu, Z Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In electronic countermeasures, spread spectrum and hop** communication systems are
threatened by broadband inter-ference. To process broadband blocking interference, the …
threatened by broadband inter-ference. To process broadband blocking interference, the …
On Reliable Communication Under Reactive Adversaries With Generalized Energy Detectors
Reactive jamming adversaries refer to those adversaries that inject jamming energy on the
victim's frequency band and also monitor the same band for detecting countermeasures …
victim's frequency band and also monitor the same band for detecting countermeasures …
Security in physical layer of cognitive radio networks
DH Tashman, W Hamouda - 2022 - IET
Fifth-generation (5G) networks and beyond are anticipated to support a vast number of
connections and services. Due to the enormous amount of confidential data shared between …
connections and services. Due to the enormous amount of confidential data shared between …
Non-coherent fast-forward relays for full-duplex jamming attack
This work addresses a strategy to mitigate jamming attack on low-latency communication by
a Full-Duplex (FD) adversary in fast-fading channel conditions. The threat model is such that …
a Full-Duplex (FD) adversary in fast-fading channel conditions. The threat model is such that …
Low-Latency Communication Using Delay-Aware Relays Against Reactive Adversaries
V Chaudhary, H Jagadeesh - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This work addresses a reactive jamming attack on the low-latency messages of a victim,
wherein the jammer deploys countermeasure detection mechanisms to change its strategy …
wherein the jammer deploys countermeasure detection mechanisms to change its strategy …
On High-Rate, Low-Overhead Mitigation Strategies Against Cognitive Adversaries
Cognitive adversary is a type of adversary which can inject jamming signals over a victim's
frequency band while simultaneously monitoring all the network frequency bands for …
frequency band while simultaneously monitoring all the network frequency bands for …
Whisper when under attack: Delay tolerant fast-forward relays against full-duplex jamming
In this work, we synthesise a cooperative strategy to mitigate jamming attacks by a full-
duplex cognitive adversary. The full-duplex adversary is such that it jams a specific …
duplex cognitive adversary. The full-duplex adversary is such that it jams a specific …