Skip to main content

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

  • 689 Accesses

Abstract

In this chapter, we first review the fundamentals of cognitive radio networks (CRNs) in Sect. 1.1. Next, the model of jamming attacks in CRNs is presented in Sect. 1.2, including smart jammers that throw serious threats to cognitive radio networks. We analyze the anti-jamming broadcast as a special case and important example of anti-jamming communications in CRNs. Finally, we conclude in Sect. 1.3.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Poisel, R.A.: Modern Communications Jamming Principles and Techniques. Artech House, Boston (2006)

    Google Scholar 

  2. Goldsmith, A.: Wireless Communications. Cambridge University Press, Cambridge (2005)

    Book  Google Scholar 

  3. Strasser, M., Popper, C., Capkun, S., Cagalj, M.: Jamming-resistant key establishment using uncoordinated frequency hopping. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 64–78 (2008)

    Google Scholar 

  4. Strasser, M., Popper, C., Capkun, S.: Efficient uncoordinated FHSS anti-jamming communication. In: Proceedings of ACM International Symposium Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 207–218 (2009)

    Google Scholar 

  5. Xiao, L., Dai, H., Ning, P.: Jamming-resistant collaborative broadcast using uncoordinated frequency hopping. IEEE Trans. Inf. Forensics Secur. 7(1), 297–309 (2012)

    Article  Google Scholar 

  6. Slater, D., Tague, P., Poovendran, R., Matt, B.: A coding-theoretic approach for efficient message verification over insecure channels. In: Proceedings of ACM Conference of Wireless Network Security (WiSec), pp. 151–160 (2009)

    Google Scholar 

  7. Popper, C., Strasser, M., Capkun, S.: Jamming-resistant broadcast communication without shared keys. In: Proceedings of USENIX Security Symposium, pp. 231–248 (2009)

    Google Scholar 

  8. Liu, Y., Ning, P., Dai, H., Liu, A.: Randomized differential DSSS: jamming-resistant wireless broadcast communication. In: Proceedings of IEEE International Conference on Computer Communication (INFOCOM), pp. 1–9 (2010)

    Google Scholar 

  9. Baird, L., Bahn, W., Collins, M., Carlisle, M., Butler, S.: Keyless jam resistance. In: Proceedings of IEEE Information Assurance and Security Workshop, pp. 143–150 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 The Author(s)

About this chapter

Cite this chapter

Xiao, L. (2015). Introduction. In: Anti-Jamming Transmissions in Cognitive Radio Networks. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-24292-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24292-7_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24290-3

  • Online ISBN: 978-3-319-24292-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics