2015 IEEE Globecom Workshops (GC Wkshps) 2015
DOI: 10.1109/glocomw.2015.7414032
|View full text |Cite
|
Sign up to set email alerts
|

A New Model-Based Method to Detect Radio Jamming Attack to Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…These statistic features can be classified into the following two categories: 1) statistical features of upper layer [11]- [14]; 2) statistical features of physical layer [15]- [19]. [11]- [14]: In [11], the effective channel utilization is calculated and used as a statistic to detect jamming attacks. This statistic is essentially the sum of channel access activities and signal strengths.…”
Section: A Related Literaturesmentioning
confidence: 99%
See 2 more Smart Citations
“…These statistic features can be classified into the following two categories: 1) statistical features of upper layer [11]- [14]; 2) statistical features of physical layer [15]- [19]. [11]- [14]: In [11], the effective channel utilization is calculated and used as a statistic to detect jamming attacks. This statistic is essentially the sum of channel access activities and signal strengths.…”
Section: A Related Literaturesmentioning
confidence: 99%
“…Although many methods have been proposed for jamming detection [11]- [19], very few methods were designed considering the jamming attacks for mission-critical mMTC applications, and existing methods are not suitable for UAJ detection. This is mainly because of the following reasons:…”
Section: ) Statistical Features Of Physical Layermentioning
confidence: 99%
See 1 more Smart Citation