© 2018 IEEE. The Cognitive Radio can be considered as a mandatory part of the Internet of Things applications. It helps to solve the sacristy issues in the frequency bands of the wireless network component of the technology. However, the security problem is the primary challenge that needs to be carefully mitigated. Specifically, defending the Cognitive Radio mechanism against the jamming attacks. The aim this research paper is to investigate and provide a reliable and adaptive Cognitive Radio protection methods against the jamming attacks. Thus, improving the performance of the wireless network of IoT technology, enhancing the bandwidth and solving the issue of the sacristy of the frequency bands. The mentioned objectives will be accomplis...
The internet of Things (IoT) is used to interconnect a massive number of heterogeneous resource cons...
Anti-jamming in cognitive radio networks (CRN) is mainly accomplished using machine learning techniq...
Abstract—This paper describes an adaptation of cognitive radio technology for tactical wireless netw...
Cognitive radio (CR) promises to be a solution for the spectrum underutilization problems. However, ...
\u3cp\u3eCognitive radio (CR) promises to be a solution for the spectrum underutilization problems. ...
Wireless communication is one of the most booming industries right now. With its expansion all over ...
Wireless communication is one of the most booming industries right now. With its expansion all over ...
Wireless communication is one of the most booming industries right now. With its expansion all over ...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
The open nature of the wireless communication medium renders it vulnerable to jamming attacks by mal...
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread ...
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread ...
Cognitive radio (CR) promises to be a solution for the spectrum underutilization problems. However, ...
A jamming combating power allocation strategy is proposed to secure the data communication in IoT ne...
The internet of Things (IoT) is used to interconnect a massive number of heterogeneous resource cons...
Anti-jamming in cognitive radio networks (CRN) is mainly accomplished using machine learning techniq...
Abstract—This paper describes an adaptation of cognitive radio technology for tactical wireless netw...
Cognitive radio (CR) promises to be a solution for the spectrum underutilization problems. However, ...
\u3cp\u3eCognitive radio (CR) promises to be a solution for the spectrum underutilization problems. ...
Wireless communication is one of the most booming industries right now. With its expansion all over ...
Wireless communication is one of the most booming industries right now. With its expansion all over ...
Wireless communication is one of the most booming industries right now. With its expansion all over ...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
The open nature of the wireless communication medium renders it vulnerable to jamming attacks by mal...
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread ...
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread ...
Cognitive radio (CR) promises to be a solution for the spectrum underutilization problems. However, ...
A jamming combating power allocation strategy is proposed to secure the data communication in IoT ne...
The internet of Things (IoT) is used to interconnect a massive number of heterogeneous resource cons...
Anti-jamming in cognitive radio networks (CRN) is mainly accomplished using machine learning techniq...
Abstract—This paper describes an adaptation of cognitive radio technology for tactical wireless netw...