DocumentCode :
265047
Title :
Securing cognitive radio networks during cooperative spectrum access using game theory
Author :
Kumar, Priyesh ; Trivedi, Aditya
Author_Institution :
Dept. of Inf. Technol., ABV - Indian Inst. of Inf. Technol. & Manage., Gwalior, India
fYear :
2014
fDate :
15-17 Dec. 2014
Firstpage :
1
Lastpage :
6
Abstract :
Cognitive radio has become one of the most promising technology and probable solution for the shortage of spectrum. This paper deals with a different class of security problem, where multiple half-duplex secondary users independently eavesdrop the communication of primary users, unless given access to communicate over the same spectrum band. Primary Station (PS) needs to characterize the optimal rule to grant spectrum access to selected secondary users. Granting spectrum access to selected Eavesdropping Secondary User (ESU) helps in improving the rate of uneavesdropped messages to the PS, i.e., primary secure rate, as transmission from secondary user interferes with the eavesdropping signal from other ESUs. The proposed method uses reverse Stackelberg game theory for the selection of an ESU by the PS to increase the utility when multiple ESUs exist. This method emphasizes on the utility as well as security of the PS. Channel gains provided by the ESUs are authenticated. PS can grant access to any authentic ESU even if its the strongest eavesdropper. The main criteria for selection of ESU is based on the utility and net secure rate of primary user (PU). Results show improved utility and net secure rate of the PU.
Keywords :
cognitive radio; cooperative communication; game theory; radio spectrum management; telecommunication security; ESU selection; channel gains; cognitive radio network security; cooperative spectrum access; eavesdropping secondary user; game theory; multiple half-duplex secondary users; primary secure rate; primary station; primary user communication; spectrum shortage; uneavesdropped message rate improvement; Base stations; Cognitive radio; Game theory; Games; Noise; Receivers; Security; Cognitive Radio; Cognitive Radio Networks; Eavesdropping Secondary Users; Primary Station; Primary users; Reverse Stackelberg game; Secondary users;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Industrial and Information Systems (ICIIS), 2014 9th International Conference on
Conference_Location :
Gwalior
Print_ISBN :
978-1-4799-6499-4
Type :
conf
DOI :
10.1109/ICIINFS.2014.7036616
Filename :
7036616
Link To Document :
بازگشت