2014
DOI: 10.1007/978-3-642-45249-9_29
|View full text |Cite
|
Sign up to set email alerts
|

Stochastic Model for Cognitive Radio Networks under Jamming Attacks and Honeypot-Based Prevention

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…In our previous work [19], we introduced the concept of honeynet in CRN and presented the benefits of dedicating one SU as honeynode in a multichannel CRN provided the honeynode is successful of enticing the attacker. We presented a stochastic model for honeynode selection which proved that in the case of uniform traffic, selecting a SU with lowest queue size is optimal in terms of overall system performance.…”
Section: Background Studiesmentioning
confidence: 99%
“…In our previous work [19], we introduced the concept of honeynet in CRN and presented the benefits of dedicating one SU as honeynode in a multichannel CRN provided the honeynode is successful of enticing the attacker. We presented a stochastic model for honeynode selection which proved that in the case of uniform traffic, selecting a SU with lowest queue size is optimal in terms of overall system performance.…”
Section: Background Studiesmentioning
confidence: 99%
“…It exploits the time and spatial diversity of the CRs to deal with collaborative jamming attack in an infrastructure-based centralised CRN. Furthermore, the concept of honeynode has been shown in Bhunia et al (2014) to be effective in deceiving jammers about the transmitting nodes. In this reference, a single honeynode is dynamically selected for each transmitting period, to act as a normal transmitting CR in order to attract the jammer to a specific channel.…”
Section: Deceptive/reactive Jammingmentioning
confidence: 99%
“…It exploits the time and spatial diversity of the CRs to deal with collaborative jamming attack in an infrastructure based centralized CRN. Furthermore, the concept of honeynode has been shown in [8] to be effective in deceiving jammers about the transmitting nodes. In this reference, a single honeynode is dynamically selected for each transmitting period, to act as a normal transmitting CR in order to attract the jammer to a specific channel.…”
Section: ) Deceptive/reactive Jammingmentioning
confidence: 99%