A Game Theoretic Analysis of the Security of Secondary Users in the Presence of Active Attackers in a Cognitive Radio Network

Location

Room 2905 B

Session Format

Paper Presentation

Research Area Topic:

Engineering and Material Sciences - Electrical

Abstract

Wireless communication is one of the most booming industries right now. With its expansion all over the world, number of wireless device users is increasing in a seamless way. Due to recent increase in the number of devices in wireless communication network, frequency is becoming more and more scarce day by day. Fortunately Cognitive Radio has emerged as a solution to this crucial problem of spectrum congestion. In the beginning of its initialization resource allocation, spectrum sensing and management were the major focuses of researchers. Security issues are gaining more and more attention with the steep advancement of cognitive radio. Now-a-days security is one of the major issues that garners the heed of the researchers of cognitive radio. Two of the most vital characteristics of cognitive radio, spectrum sensing and sharing it with other secondary users, make it more prone to security attacks. Security issues in cognitive radio network are addressed in many recent papers, but most of them consider the impact of eavesdroppers or jammers separately on the security issues of secondary users. To our best knowledge this is the first study which considers the impact of both eavesdroppers and jammers combinedly on the performance of secondary users in cognitive radio network. We assume the presence of both eavesdroppers and jammers in a single cognitive radio network as active attackers. In this paper we have developed a system model which accommodates sets of secondary users, eavesdroppers and jammers. Based on this system model, utility functions are generated. Number of devices (secondary users, eavesdroppers, and jammers), variation in transmission power, transmission cost per unit power of these devices (secondary users, and jammers) and their relative distances have dire impacts on the utility of these devices. Finally we implement game theory with the help of the utility functions and reach an equilibrium point.

Presentation Type and Release Option

Presentation (Open Access)

Start Date

4-16-2016 4:00 PM

End Date

4-16-2016 5:00 PM

This document is currently not available here.

Share

COinS
 
Apr 16th, 4:00 PM Apr 16th, 5:00 PM

A Game Theoretic Analysis of the Security of Secondary Users in the Presence of Active Attackers in a Cognitive Radio Network

Room 2905 B

Wireless communication is one of the most booming industries right now. With its expansion all over the world, number of wireless device users is increasing in a seamless way. Due to recent increase in the number of devices in wireless communication network, frequency is becoming more and more scarce day by day. Fortunately Cognitive Radio has emerged as a solution to this crucial problem of spectrum congestion. In the beginning of its initialization resource allocation, spectrum sensing and management were the major focuses of researchers. Security issues are gaining more and more attention with the steep advancement of cognitive radio. Now-a-days security is one of the major issues that garners the heed of the researchers of cognitive radio. Two of the most vital characteristics of cognitive radio, spectrum sensing and sharing it with other secondary users, make it more prone to security attacks. Security issues in cognitive radio network are addressed in many recent papers, but most of them consider the impact of eavesdroppers or jammers separately on the security issues of secondary users. To our best knowledge this is the first study which considers the impact of both eavesdroppers and jammers combinedly on the performance of secondary users in cognitive radio network. We assume the presence of both eavesdroppers and jammers in a single cognitive radio network as active attackers. In this paper we have developed a system model which accommodates sets of secondary users, eavesdroppers and jammers. Based on this system model, utility functions are generated. Number of devices (secondary users, eavesdroppers, and jammers), variation in transmission power, transmission cost per unit power of these devices (secondary users, and jammers) and their relative distances have dire impacts on the utility of these devices. Finally we implement game theory with the help of the utility functions and reach an equilibrium point.