Game-theory-based analysis on interactions among secondary and malicious users in coordinated jamming attack in cognitive radio systems

12/20/2019
by   Ehsan Meamari, et al.
0

IEEE 802.22 standard utilizes cognitive radio (CR) techniques to allow sharing unused spectrum band. The cognitive radio is vulnerable to various attacks such as jamming attacks. This paper has focused on coordinated jamming attacks. A simple strategy for secondary users is to change their bands and switch to other appropriate bands when the jamming attack is occurred. Also, the malicious users should switch to other bands in order to jam the secondary users. To address this problem, a game theoretical method is proposed to analyze coordinated jamming attacks in CR. Then, using Nash equilibrium on the proposed game, the most appropriate bands have been found to switch as well as the optimal switching probabilities for both secondary and malicious users. Meanwhile, effects of different parameters like the number of malicious users are investigated in changing the optimal switching probabilities by analysis on the model.

READ FULL TEXT
research
12/20/2019

An Analysis on Interactions among Secondary User and Unknown Jammer in Cognitive Radio Systems by Fictitious Play

With the advancement of communication, the spectrum shortage problem bec...
research
03/08/2019

Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter

Cognitive radio technology addresses the problem of spectrum scarcity by...
research
06/21/2021

Detection Of Primary User Emulation Attack (PUEA) In Cognitive Radio Networks Using One-Class Classification

Opportunistic usage of spectrum owned by licensed (or primary) users is ...
research
12/20/2019

Defense against Lion Attack in Cognitive Radio Systems using the Markov Decision Process Approach

Cognitive Radio (CR) technology is a solution to solve the lack of spect...
research
04/08/2018

Stackelberg Game for Distributed Time Scheduling in RF-Powered Backscatter Cognitive Radio Networks

In this paper, we study the transmission strategy adaptation problem in ...
research
04/24/2018

An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks

The proliferation of advanced information technologies (IT), especially ...
research
12/19/2020

A Game Theoretic Perspective into the Coexistence of WiFi and NR-U at the 6GHz Unlicensed Bands

We study the behaviour of WiFi and 5G cellular networks as they exploit ...

Please sign up or login with your details

Forgot password? Click here to reset