A Game Theoretic Analysis of the Security of Secondary Users in the Presence of Active Attackers in a Cognitive Radio Network
Location
Room 2905 B
Session Format
Paper Presentation
Research Area Topic:
Engineering and Material Sciences - Electrical
Abstract
Wireless communication is one of the most booming industries right now. With its expansion all over the world, number of wireless device users is increasing in a seamless way. Due to recent increase in the number of devices in wireless communication network, frequency is becoming more and more scarce day by day. Fortunately Cognitive Radio has emerged as a solution to this crucial problem of spectrum congestion. In the beginning of its initialization resource allocation, spectrum sensing and management were the major focuses of researchers. Security issues are gaining more and more attention with the steep advancement of cognitive radio. Now-a-days security is one of the major issues that garners the heed of the researchers of cognitive radio. Two of the most vital characteristics of cognitive radio, spectrum sensing and sharing it with other secondary users, make it more prone to security attacks. Security issues in cognitive radio network are addressed in many recent papers, but most of them consider the impact of eavesdroppers or jammers separately on the security issues of secondary users. To our best knowledge this is the first study which considers the impact of both eavesdroppers and jammers combinedly on the performance of secondary users in cognitive radio network. We assume the presence of both eavesdroppers and jammers in a single cognitive radio network as active attackers. In this paper we have developed a system model which accommodates sets of secondary users, eavesdroppers and jammers. Based on this system model, utility functions are generated. Number of devices (secondary users, eavesdroppers, and jammers), variation in transmission power, transmission cost per unit power of these devices (secondary users, and jammers) and their relative distances have dire impacts on the utility of these devices. Finally we implement game theory with the help of the utility functions and reach an equilibrium point.
Presentation Type and Release Option
Presentation (Open Access)
Start Date
4-16-2016 4:00 PM
End Date
4-16-2016 5:00 PM
Recommended Citation
Amin, tanjil, "A Game Theoretic Analysis of the Security of Secondary Users in the Presence of Active Attackers in a Cognitive Radio Network" (2016). GS4 Georgia Southern Student Scholars Symposium. 81.
https://digitalcommons.georgiasouthern.edu/research_symposium/2016/2016/81
A Game Theoretic Analysis of the Security of Secondary Users in the Presence of Active Attackers in a Cognitive Radio Network
Room 2905 B
Wireless communication is one of the most booming industries right now. With its expansion all over the world, number of wireless device users is increasing in a seamless way. Due to recent increase in the number of devices in wireless communication network, frequency is becoming more and more scarce day by day. Fortunately Cognitive Radio has emerged as a solution to this crucial problem of spectrum congestion. In the beginning of its initialization resource allocation, spectrum sensing and management were the major focuses of researchers. Security issues are gaining more and more attention with the steep advancement of cognitive radio. Now-a-days security is one of the major issues that garners the heed of the researchers of cognitive radio. Two of the most vital characteristics of cognitive radio, spectrum sensing and sharing it with other secondary users, make it more prone to security attacks. Security issues in cognitive radio network are addressed in many recent papers, but most of them consider the impact of eavesdroppers or jammers separately on the security issues of secondary users. To our best knowledge this is the first study which considers the impact of both eavesdroppers and jammers combinedly on the performance of secondary users in cognitive radio network. We assume the presence of both eavesdroppers and jammers in a single cognitive radio network as active attackers. In this paper we have developed a system model which accommodates sets of secondary users, eavesdroppers and jammers. Based on this system model, utility functions are generated. Number of devices (secondary users, eavesdroppers, and jammers), variation in transmission power, transmission cost per unit power of these devices (secondary users, and jammers) and their relative distances have dire impacts on the utility of these devices. Finally we implement game theory with the help of the utility functions and reach an equilibrium point.