Recent intensive and extensive development of the fifth-generation (5G) of cellular networks has led to their deployment throughout much of the world. As part of this implementation …
Malicious jamming launched by smart jammers can attack legitimate transmissions, which has been regarded as one of the critical security challenges in wireless communications …
M Chen, W Liu, N Zhang, J Li, Y Ren, M Yi… - Expert Systems with …, 2022 - Elsevier
Abstract The openness of Mobile Edge Computing (MEC) networks makes them vulnerable to interference attacks by malicious jammers, which endangers the communication quality of …
H Sharma, N Kumar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Jamming attack is one of the serious security breaches in the upcoming fifth-generation heterogeneous networks (5G HetNets). Most of the existing anti-jamming techniques, such …
Y Sun, K An, J Luo, Y Zhu, G Zheng… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Malicious jamming attacks have been regarded as a serious threat to Internet of Things (IoT) networks, which can significantly degrade the Quality of Service (QoS) of users. This article …
HM Furqan, MSJ Solaija, H Türkmen… - IEEE Open Journal of …, 2021 - ieeexplore.ieee.org
The diverse requirements of next-generation communication systems necessitate awareness, flexibility, and intelligence as essential building blocks of future wireless …
The Industry 4.0 digital transformation envisages future industrial systems to be fully automated, including the control, upgrade, and configuration processes of a large number of …
Wireless sensor networks (WSNs) are widely applied in battlefield surveillance, where the data collection (eg target tracking or contention zone observation) employed by local sensor …
Vehicular networks, like any other wireless networks, are prone to jamming due to the inherent nature of the wireless environment. In this letter, we consider an attacker who jams …