Blockchain and Game Theory-Based Strategies for Anti-Jamming and Eavesdropping in EH-CR Networks
In Cognitive Radio (CR) networks combined with Energy Harvesting (EH) technology, Secondary Users (SUs) are vulnerable to jamming attacks when sensing idle channels. At the same time, they may encounter numerous jamming and eavesdropping attacks during the data transmission phase. This paper examine...
Saved in:
| Main Authors: | Haifeng Hou, Ruiquan Lin, Jun Wang, Sheng Li, Wencheng Chen |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2024-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10701517/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A survey of acoustic eavesdropping attacks: Principle, methods, and progress
by: Yiwei Chen, et al.
Published: (2024-12-01) -
Proactive Eavesdropping With Adaptive Full-Duplex Jamming-Helping Method for Infrastructure-Free Relay Networks
by: Young-Jun Yoon, et al.
Published: (2023-01-01) -
A proactive defense method against eavesdropping attack in SDN-based storage environment
by: Yuming Liu, et al.
Published: (2024-11-01) -
Cooperative Jamming for RIS-Assisted UAV-WSN Against Aerial Malicious Eavesdropping
by: Juan Li, et al.
Published: (2025-06-01) -
Fiber Eavesdropping Detection and Location in Optical Communication System
by: Yuang Li, et al.
Published: (2025-05-01)