2012
DOI: 10.1109/jsac.2012.120103
|View full text |Cite
|
Sign up to set email alerts
|

Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 63 publications
(35 citation statements)
references
References 18 publications
0
35
0
Order By: Relevance
“…For rest of the results, when PER is considered as the cost function (evaluated using ACK/NACK), then the jammer only needs to be synchronous with the victim on a per-packet basis. Similar assumptions have been made in the past [20]- [26]. However, if the jammer is not synchronized, then the jamming performance is degraded as discussed in [13].…”
Section: A Note On the Assumptionsmentioning
confidence: 71%
See 1 more Smart Citation
“…For rest of the results, when PER is considered as the cost function (evaluated using ACK/NACK), then the jammer only needs to be synchronous with the victim on a per-packet basis. Similar assumptions have been made in the past [20]- [26]. However, if the jammer is not synchronized, then the jamming performance is degraded as discussed in [13].…”
Section: A Note On the Assumptionsmentioning
confidence: 71%
“…Although MAB algorithms have been used in the context of wireless communications to address the selection of a wireless channel in either cognitive radio networks [23]- [25] or in the presence of an adversary [26], or antenna selection in MIMO systems [27], these works only consider learning over a finite action set. In contrast, the proposed jamming algorithms in this paper enable the jammer to learn the optimal attack strategies against both static and adaptive victim transmitterreceiver pairs by simultaneously choosing actions from both finite and infinite arm sets (i.e., they can either come from a continuous or a discrete space), that are defined based on the physical layer parameters of the jamming signal.…”
Section: Introductionmentioning
confidence: 99%
“…The decoding process in our protocol is online, i. e., the decoding can start as soon as fragments are arriving. Wang et al [20] model UFH transmissions as a multi-armed bandit problem. Since they assume the same verification schemes as proposed by Strasser et al [18,19], this scheme is vulnerable to reactive jamming due to long packets.…”
Section: Related Workmentioning
confidence: 99%
“…There are a few recent attempts such as [4]- [13] to break the circular dependency between anti-jamming communications and spread-code establishment. The unique features of MANET neighbor discovery, however, make these elegant solutions unsuitable.…”
Section: Introductionmentioning
confidence: 99%
“…In particular, since node encounters are unpredictable in MANETs, each node must be always prepared to accept and validate potential neighbor discovery requests. The existing solutions [4]- [13] all depend on some publicly known communication strategies such as public spread-code sets. The adversary can thus use such public knowledge to inject arbitrary many neighbor discovery requests in the whole network, leading to a special Denial-of-Service (DoS) attack in which all nodes are forced to perform endless verifications of neighbor discovery requests (which often involve expensive digital signature verifications).…”
Section: Introductionmentioning
confidence: 99%