Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks 2008
DOI: 10.1145/1460877.1460912
|View full text |Cite
|
Sign up to set email alerts
|

Jamming Mitigation in Multi-Radio Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0
1

Year Published

2009
2009
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(17 citation statements)
references
References 14 publications
0
16
0
1
Order By: Relevance
“…In [19], a jamming game was formulated with the transmission cost considered, and generalized water-filling was proved to be the unique Nash equilibrium. In [20], the blocking probability was analyzed for different kinds of attack strategies and defense strategies. In [21][22] [23], an uncoordinated frequency hopping scheme was developed where a transmitter and several receivers followed their own hopping patterns to mitigate the jamming impact, and a communication link was established when the transmitter and a receiver happened to choose the same unjammed channel.…”
Section: A Related Workmentioning
confidence: 99%
“…In [19], a jamming game was formulated with the transmission cost considered, and generalized water-filling was proved to be the unique Nash equilibrium. In [20], the blocking probability was analyzed for different kinds of attack strategies and defense strategies. In [21][22] [23], an uncoordinated frequency hopping scheme was developed where a transmitter and several receivers followed their own hopping patterns to mitigate the jamming impact, and a communication link was established when the transmitter and a receiver happened to choose the same unjammed channel.…”
Section: A Related Workmentioning
confidence: 99%
“…Current standardization bodies do not consider any jamming resiliency requirements for the next planned release of the LTE advanced standard. Nevertheless, some work has been done in addressing jamming attacks in WLANs [35] and WSNs [15].…”
Section: Related Workmentioning
confidence: 99%
“…There have been quite a few papers on jamming attacks in wireless ad hoc networks, such as [8] and [9]. A jamming game with transmission costs was formulated in [8], and the blocking probability was analyzed for different kinds of attack strategies and defense strategies in [9].…”
Section: Related Workmentioning
confidence: 99%
“…A jamming game with transmission costs was formulated in [8], and the blocking probability was analyzed for different kinds of attack strategies and defense strategies in [9]. However, the problem becomes more complicated in a cognitive radio network where primary users' access has to be taken into consideration.…”
Section: Related Workmentioning
confidence: 99%