H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our society, and wireless services become increasingly important as the applications of wireless …
J Xu, L Duan, R Zhang - IEEE transactions on wireless …, 2017 - ieeexplore.ieee.org
To enhance the national security, there is a growing need for authorized parties to legitimately monitor suspicious communication links for preventing intended crimes and …
J Xu, L Duan, R Zhang - IEEE Wireless Communications …, 2015 - ieeexplore.ieee.org
This letter proposes a paradigm shift in wireless security from preventing conventional eavesdropping attacks to a new legitimate surveillance objective by studying how a …
T Erpek, YE Sagduyu, Y Shi - IEEE Transactions on Cognitive …, 2018 - ieeexplore.ieee.org
An adversarial machine learning approach is introduced to launch jamming attacks on wireless communications and a defense strategy is presented. A cognitive transmitter uses a …
With conventional anti-jamming solutions like frequency hopping or spread spectrum, legitimate transceivers often tend to “escape” or “hide” themselves from jammers. These …
Q Yan, H Zeng, T Jiang, M Li, W Lou… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Jamming attack is a serious threat to the wireless communications. Reactive jamming maximizes the attack efficiency by jamming only when the targets are communicating, which …
With the now widespread availability of software-defined radio technology for wireless networks, the distinction between jamming in the original electronic warfare sense and …
MA Aref, SK Jayaweera, E Yepez - IET Communications, 2020 - Wiley Online Library
In this study, the authors review various jamming and anti‐jamming strategies in the context of cognitive radios (CRs). The study explores different jamming models and classifies them …
Signal interference and packet collisions are typically viewed as negative factors that hinder wireless communication networks. When security is the primary concern, signal interference …