BDDTPA: Blockchain-driven deep traffic pattern analysis for enhanced security in cognitive radio ad-hoc networks

D Dansana, PK Behera, AA Darem, Z Ashraf… - IEEE …, 2023 - ieeexplore.ieee.org
Cognitive Radio Ad-hoc Networks (CRAHNs) combines characteristics of ad-hoc networks
with cognitive radios to facilitate a variety of communication scenarios. However, these …

Generative Adversarial Networks for Secure Data Transmission in Wireless Network.

E Jayabalan, R Pugazendi - Intelligent Automation & Soft …, 2023 - search.ebscohost.com
In this paper, a communication model in cognitive radios is developed and uses machine
learning to learn the dynamics of jamming attacks in cognitive radios. It is designed further to …

Constellation design for non-coherent fast-forward relays to mitigate full-duplex jamming attacks

V Chaudhary, H Jagadeesh - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With potential applications to short-packet communication, we address communication of
low-latency messages in fast-fading channels under the presence of a reactive jammer …

Optimization of Subband Reconstruction for Integrated Communication and Cancellation System

Z Wang, F He, Y Zhang, Q Lu, Z Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In electronic countermeasures, spread spectrum and hop** communication systems are
threatened by broadband inter-ference. To process broadband blocking interference, the …

On Reliable Communication Under Reactive Adversaries With Generalized Energy Detectors

S Hazra, J Harshan - IEEE Transactions on Vehicular …, 2024 - ieeexplore.ieee.org
Reactive jamming adversaries refer to those adversaries that inject jamming energy on the
victim's frequency band and also monitor the same band for detecting countermeasures …

Security in physical layer of cognitive radio networks

DH Tashman, W Hamouda - 2022 - IET
Fifth-generation (5G) networks and beyond are anticipated to support a vast number of
connections and services. Due to the enormous amount of confidential data shared between …

Non-coherent fast-forward relays for full-duplex jamming attack

V Chaudhary, J Harshan - 2021 IEEE Global Communications …, 2021 - ieeexplore.ieee.org
This work addresses a strategy to mitigate jamming attack on low-latency communication by
a Full-Duplex (FD) adversary in fast-fading channel conditions. The threat model is such that …

Low-Latency Communication Using Delay-Aware Relays Against Reactive Adversaries

V Chaudhary, H Jagadeesh - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This work addresses a reactive jamming attack on the low-latency messages of a victim,
wherein the jammer deploys countermeasure detection mechanisms to change its strategy …

On High-Rate, Low-Overhead Mitigation Strategies Against Cognitive Adversaries

S Hazra, J Harshan - 2024 National Conference on …, 2024 - ieeexplore.ieee.org
Cognitive adversary is a type of adversary which can inject jamming signals over a victim's
frequency band while simultaneously monitoring all the network frequency bands for …

Whisper when under attack: Delay tolerant fast-forward relays against full-duplex jamming

V Chaudhary, J Harshan - 2022 14th International Conference …, 2022 - ieeexplore.ieee.org
In this work, we synthesise a cooperative strategy to mitigate jamming attacks by a full-
duplex cognitive adversary. The full-duplex adversary is such that it jams a specific …