Security vulnerabilities in IEEE 802.22
Proceedings of the 4th Annual International Conference on Wireless Internet
A jamming game in wireless networks with transmission cost
NET-COOP'07 Proceedings of the 1st EuroFGI international conference on Network control and optimization
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
IEEE Journal on Selected Areas in Communications
Multi-Stage Pricing Game for Collusion-Resistant Dynamic Spectrum Allocation
IEEE Journal on Selected Areas in Communications
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.00 |
Cognitive radio technologies have become a promising approach to increase the efficiency of spectrum utilization. Although cognitive radio has been intensively studied in recent years, only a few works have discussed security aspects. In this paper, we focus on the jamming attack, one of major threats to cognitive radio networks, where a malicious user wants to jam the communications of secondary users by injecting interference. Aware of the absence of several primary users and the presence of a malicious user, a secondary user can allocate power to those fallow bands with a randomized strategy, in hope of alleviating the damage caused by the malicious user. We model this scenario into a two-player zero-sum game, and derive its unique Nash Equilibrium under certain conditions using the Colonel Blotto game approach, which provides a minimax strategy that the secondary user should adopt in order to minimize the worst-case damage caused by the malicious user. Simulation results are presented to verify the performance.