The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Network coding: an instant primer
ACM SIGCOMM Computer Communication Review
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Time-efficient distributed layer-2 auto-configuration for cognitive radio networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
On neighbor discovery in cognitive radio networks
Journal of Parallel and Distributed Computing
Neighbor discovery in wireless networks and the coupon collector's problem
Proceedings of the 15th annual international conference on Mobile computing and networking
ACM SIGMOBILE Mobile Computing and Communications Review
Toward network coding-based protocols for data broadcasting in wireless ad hoc networks
IEEE Transactions on Wireless Communications
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
IEEE Journal on Selected Areas in Communications
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
Cognitive radios operate in a particularly challenging wireless environment. Besides the strict requirements imposed by opportunistic coexistence with licensed users, cognitive radios may have to deal with other concurrent (either malicious or selfish) cognitive radios that aim at gaining access to the available spectrum resources with no regard to fairness or other behavioral etiquettes. By taking advantage of their highly flexible RF front-ends, they are able to mimic a licensed user's behavior or simply jam a given channel with high power. This way these concurrent users (jammers) are capable of interrupting or delaying the neighbor discovery process initiated by a cognitive radio, which is interested in using a portion of the available spectrum for its own data communications. To solve this problem we propose a Jamming Evasive Network-coding Neighbor-Discovery Algorithm (JENNA), which ensures complete neighbor discovery for a cognitive radio network in a distributed and asynchronous way. We compare the proposed algorithm with baseline schemes that represent existing solutions, and validate its feasibility in a single-hop cognitive radio network.