2017
DOI: 10.1109/tvt.2017.2672682
|View full text |Cite
|
Sign up to set email alerts
|

Jammer-Type Estimation in LTE With a Smart Jammer Repeated Game

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
16
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(17 citation statements)
references
References 32 publications
1
16
0
Order By: Relevance
“…Typically, in literature, uncertainty on one parameter is considered. For example, in [3,5,6,9], uncertainty about rival's type was investigated. In [12], uncertainty on fading channel gains was considered in the context of single carrier communications with non-hostile interference caused by selfish users, while, in [2,10], with hostile interference caused by an adversary.…”
Section: Introductionmentioning
confidence: 99%
“…Typically, in literature, uncertainty on one parameter is considered. For example, in [3,5,6,9], uncertainty about rival's type was investigated. In [12], uncertainty on fading channel gains was considered in the context of single carrier communications with non-hostile interference caused by selfish users, while, in [2,10], with hostile interference caused by an adversary.…”
Section: Introductionmentioning
confidence: 99%
“…Typically, jamming problems can be categorized according to two frameworks: (i) maintaining communication reliability and (ii) maintaining communication connectivity. In communication reliability problems, the transmitter's payoff is a function of throughput or Signal-to-Interference-plus-Noise Ratio (SINR) at the receiver, and the transmitter intends to maximize such payoff [3,4,5,6,7,8,9,10,11]. Meanwhile, in communication connectivity problems the transmitter must keep its SINR greater than or equal to a threshold value to ensure a connection can be sustained [12,13,14,15,16,17,18,19].…”
Section: Introductionmentioning
confidence: 99%
“…There are many competitive settings in which players have asymmetric information about the underlying state of the game. Examples include cyber security problems [1], [2], resource competitions in air transportation systems [3], [4], national defense [5], [6], economic systems [7], power networks [8] and so on. In these systems, because of the noncooperation between players, a player usually holds private information that is not shared with the other players, which causes the information asymmetry in games.…”
Section: Introductionmentioning
confidence: 99%
“…The fact that the one-stage payoff is unavailable to the uninformed player happens in practice. For example, when jamming wireless sensor networks, the attacker may observe which channel the network uses (action of the informed player), but cannot measure the throughput in the channel (payoff of the informed player) [1], [9].…”
Section: Introductionmentioning
confidence: 99%