2023
DOI: 10.1109/tmc.2022.3162117
|View full text |Cite
|
Sign up to set email alerts
|

BLOWN: A Blockchain Protocol for Single-Hop Wireless Networks Under Adversarial SINR

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 44 publications
0
13
0
Order By: Relevance
“…Moreover, pseudo‐random time‐hopping anti‐jamming schemes and detection mechanisms based on focused resource allocation and network monitoring can be added to FHSS to further improve its safety. In addition, novel two‐phase Blockchain consensus protocols 71 have been also proposed to establish a jamming‐resistant wireless communication in network environments where nodes have limited physical resources and fall short of well‐established reliable channels.…”
Section: Proposed “Blocksd‐5gnet” Architecture For 5g Networkmentioning
confidence: 99%
“…Moreover, pseudo‐random time‐hopping anti‐jamming schemes and detection mechanisms based on focused resource allocation and network monitoring can be added to FHSS to further improve its safety. In addition, novel two‐phase Blockchain consensus protocols 71 have been also proposed to establish a jamming‐resistant wireless communication in network environments where nodes have limited physical resources and fall short of well‐established reliable channels.…”
Section: Proposed “Blocksd‐5gnet” Architecture For 5g Networkmentioning
confidence: 99%
“…The certificate is passed to the client, which is then sent to a peer in the network. The peer authenticates the user by running the smart contract, which contains information about the user/doctors, action attribute, object attributes, and contextual and subject attributes ( Xu et al, 2021 ). That validates the certificate and returns a response.…”
Section: Iot Founded Health Monitoring Of Patientsmentioning
confidence: 99%
“…For example, in Refs. [13][14][15][16], miners achieve the consensus with a Proof-of-Communication (PoC) scheme based on the physical interference communication model. Specifically, after considering the collision, interference, and failure in the wireless channel, the devices in Refs.…”
Section: Introductionmentioning
confidence: 99%
“…[13,14] adapt their transmission probability by statistically randomized algorithms and the tree structures are built in Refs. [15,16], both providing reliable communications between devices. A PoC scheme is then adopted by devices to achieve the consensus.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation