By Liang Xiao

This SpringerBrief examines anti-jamming transmissions in cognitive radio networks (CRNs), together with numerous contemporary comparable study themes inside this box. the writer introduces the transmissions in response to uncoordinated unfold spectrum to handle shrewdpermanent jammers in CRNs.

The writer applies online game concept to enquire the interactions among secondary clients and jammers whereas supplying online game theoretic suggestions to suppress jamming incentives in CRNs. Later chapters evaluation the Nash equilibrium and Stackelberg equilibrium of the jamming video games lower than a number of community scenarios.

pros and researchers operating in networks, instant communications and knowledge know-how will locate Anti-Jamming Transmissions in Cognitive Radio Networks useful fabric as a reference. Advanced-level scholars learning electric engineering and machine technological know-how also will locate this short an invaluable tool.

Show description

Read Online or Download Anti-Jamming Transmissions in Cognitive Radio Networks PDF

Similar internet & networking books

Learning and Adaption in Multi-Agent Systems: First International Workshop, LAMAS 2005, Utrecht, The Netherlands, July 25, 2005, Revised Selected

This ebook constitutes the completely refereed post-proceedings of the 1st foreign Workshop on studying and Adaption in Multi-Agent structures, LAMAS 2005, held in Utrecht, The Netherlands, in July 2005, as an linked occasion of AAMAS 2005. The thirteen revised papers provided including invited talks have been rigorously reviewed and chosen from the lectures given on the workshop.

Schattendasein: Das unverstandene Leiden Depression

Schattendasein: Anders als bei anderen Krankheiten wagen es depressive Menschen häufig nicht, über ihre Erkrankung zu sprechen. Unterstützung und Austausch finden sie seit einigen Jahren im Internetforum des ''Kompetenznetz melancholy, Suizidalität''. Vier Betroffene und eine Angehörige sichteten nun die Postings des boards, kommentierten sie und verdichteten sie zu einem Ratgeber – fachlich betreut von Ärzten des Kompetenznetzes melancholy.

Handbook of Space Security: Policies, Applications and Programs

House protection includes using house (in specific verbal exchange, navigation, earth statement, and digital intelligence satellites) for army and safety reasons in the world and in addition the upkeep of house (in specific the earth orbits) as secure and safe parts for undertaking peaceable actions.

Networked Systems: Second International Conference, NETYS 2014, Marrakech, Morocco, May 15-17, 2014. Revised Selected Papers

This e-book constitutes the revised chosen papers of the second one foreign convention on Networked platforms, NETYS 2014, held in Marrakech, Morocco, in may possibly 2014. The 20 complete papers and the 6 brief papers awarded including 2 keynotes have been rigorously reviewed and chosen from eighty submissions. They deal with significant issues similar to multi-core architectures; concurrent and disbursed algorithms; middleware environments; garage clusters; social networks; peer-to-peer networks; sensor networks; instant and cellular networks; in addition to privateness and security features to guard such networked platforms and information from assault and abuse.

Additional info for Anti-Jamming Transmissions in Cognitive Radio Networks

Example text

To address the vulnerabilities in trust establishment methods [56], insider attacks [57] and Byzantine attacks [58]. Direct reciprocity is a powerful mechanism in the evolution of cooperation. In mobile ad hoc networks, direct reciprocity has been used in packet relay with the idea “I relay your packet and you will in the future relay mine” [59].

IEEE Trans. Inf. Forensics Secur. 7(1), 297–309 (2012) 6. : Jamming-resistant broadcast communication without shared keys. In: Proceedings of USENIX Security Symposium, pp. 231–248 (2009) 7. : Interference-resilient information exchange. In: Proceedings of IEEE International Conference on Computer Communications (INFOCOM), pp. 2249–2257 (2009) 8. : A coding-theoretic approach for efficient message verification over insecure channels. In: Proceedings of ACM Conference on Wireless Network Security, pp.

IEEE Netw. 27(3), 22–27 (2013) 3. : Anti-jamming games in multi-channel cognitive radio networks. IEEE J. Sel. Areas Commun. 30(1), 4–15 (2012) 4. : A stochastic game model for jamming in multi-channel cognitive radio systems. In: Proceedings of IEEE International Conference on Computer Communication, pp. 1–6, May 2010 5. : A game-theoretic analysis of denial of service attacks in wireless random access. Wirel. Netw. 15(5), 651–666 (2009) 6. : Jamming in wireless networks under uncertainty. Mob.

Download PDF sample

Download Anti-Jamming Transmissions in Cognitive Radio Networks by Liang Xiao PDF
Rated 4.26 of 5 – based on 36 votes