© 2015 IEEE. Although in-band full-duplex (IBFD) radios promise to double the throughput of a wireless link, they are more vulnerable to jamming attacks than their out-of-band full-duplex (OBFD) counterparts. For two communicating OBFD nodes, a jammer needs to attack both the uplink and the downlink channels to completely break the communication link. In contrast, only one common channel needs to be jammed in the case of two IBFD nodes. Even worse, a jammer with self-interference suppression (SIS) capabilities (the underlying technique of IBFD radios) can learn the transmitters' activity while injecting interference, allowing it to react instantly to the transmitter's strategies. In this work, we consider a power-constrained IBFD 'reactive-...
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportu...
Anti-jamming in cognitive radio networks (CRN) is mainly accomplished using machine learning techniq...
We address the problem of jamming-resistant broadcast com-munications under an internal threat model...
© 2016 IEEE. Recent advances in the design of in-band full-duplex (IBFD) radios promise to double th...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
Inband full-duplex (IBFD) technology enables radios to simultaneously transmit and receive (STAR) on...
Cognitive radio (CR) promises to be a solution for the spectrum underutilization problems. However, ...
Wireless communications have experienced tremendous growth in the last decade, which has placed sign...
AbstractThe Cognitive radio technology is a promising solution to the imbalance between scarcity and...
Due to the continuous increase of the demands for the wireless network’s capacity, in-band full-dupl...
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportu...
Jamming attacks can significantly impact the performance of wireless communication systems. In addit...
International audienceJamming attacks represent a critical vulnerability for wireless secret key gen...
© 2012 IEEE. This letter introduces a novel idea to defend jamming attacks for wireless communicatio...
Uncoordinated frequency hopping (UFH) has recently emerged as an effective mechanism to defend again...
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportu...
Anti-jamming in cognitive radio networks (CRN) is mainly accomplished using machine learning techniq...
We address the problem of jamming-resistant broadcast com-munications under an internal threat model...
© 2016 IEEE. Recent advances in the design of in-band full-duplex (IBFD) radios promise to double th...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
Inband full-duplex (IBFD) technology enables radios to simultaneously transmit and receive (STAR) on...
Cognitive radio (CR) promises to be a solution for the spectrum underutilization problems. However, ...
Wireless communications have experienced tremendous growth in the last decade, which has placed sign...
AbstractThe Cognitive radio technology is a promising solution to the imbalance between scarcity and...
Due to the continuous increase of the demands for the wireless network’s capacity, in-band full-dupl...
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportu...
Jamming attacks can significantly impact the performance of wireless communication systems. In addit...
International audienceJamming attacks represent a critical vulnerability for wireless secret key gen...
© 2012 IEEE. This letter introduces a novel idea to defend jamming attacks for wireless communicatio...
Uncoordinated frequency hopping (UFH) has recently emerged as an effective mechanism to defend again...
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportu...
Anti-jamming in cognitive radio networks (CRN) is mainly accomplished using machine learning techniq...
We address the problem of jamming-resistant broadcast com-munications under an internal threat model...