2018
DOI: 10.1109/tccn.2018.2833549
|View full text |Cite
|
Sign up to set email alerts
|

CR-Honeynet: A Cognitive Radio Learning and Decoy-Based Sustenance Mechanism to Avoid Intelligent Jammer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 32 publications
0
12
0
Order By: Relevance
“…Numerous anti-jamming methods have been proposed in the literature, ranging from frequency hopping [3]- [8] methods that employ techniques such as honeypots to obtain the jammer policy or to harvest the jamming energy [9]- [14]. Frequency hopping methods continuously switch the carrier frequency between different bands and can be performed using strategies such as chaotic frequency hopping [7] or learning-based methods [8].…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Numerous anti-jamming methods have been proposed in the literature, ranging from frequency hopping [3]- [8] methods that employ techniques such as honeypots to obtain the jammer policy or to harvest the jamming energy [9]- [14]. Frequency hopping methods continuously switch the carrier frequency between different bands and can be performed using strategies such as chaotic frequency hopping [7] or learning-based methods [8].…”
Section: A Related Workmentioning
confidence: 99%
“…Frequency hopping methods continuously switch the carrier frequency between different bands and can be performed using strategies such as chaotic frequency hopping [7] or learning-based methods [8]. The authors in [9] propose an anti-jamming technique that assigns a user among all users as a honeypot to obtain the jammer policy for a wiser jamming mitigation. The work in [10] proposes an antijamming method based on dispersing the data in time frames, and models the impacts of the spectrum changes on the mobile cognitive users' performance in hostile environments.…”
Section: A Related Workmentioning
confidence: 99%
“…GRC / USRP was used to test their SDR system. In [19] and [20], the anti-jamming strategy was suggested in various methods and their approach was tested using GRC. In [21], The author has created a mechanism called TREKS to facilitate communication with Spread Spectrum without pre-shared information.…”
Section: Softwarementioning
confidence: 99%
“…The software-defined radio platform makes it possible to generate such a target attack. A honeynet-based defense for jamming is presented [11]. The honeynet learns the attacker's strategy and adapts the preemptive process.…”
Section: Introductionmentioning
confidence: 99%