DocumentCode :
1583424
Title :
An analysis on interactions among secondary user and unknown jammer in cognitive radio systems by fictitious play
Author :
Meamari, E. ; Afhamisisi, Kh ; Shahhoseini, Hadi Shahriar
Author_Institution :
Iran Univ. of Sci. & Technol., Tehran, Iran
fYear :
2013
Firstpage :
1
Lastpage :
6
Abstract :
With the advancement of communication, the spectrum shortage problem becomes a serious problem for future generations. The cognitive radio technology is proposed for this problem. In cognitive radio networks, the secondary users can access spectrum that allocated to the primary users without interference to the operation of primary users. There are a lot of attacks for this technology that one of them is jamming attacks. The best strategy for countering the jamming attack is to switch other bands. This attack is very hard to detect when the malicious user is unknown and there are no information about the payoffs of attacker. In this paper, we propose to use fictitious game for analysis the defense against this unknown jamming attacker.
Keywords :
cognitive radio; game theory; jamming; telecommunication security; cognitive radio; fictitious game; fictitious play; jamming attacks; secondary user; spectrum shortage problem; unknown jammer; Cognitive radio; Convergence; Games; History; Jamming; Nash equilibrium; Switches; Cognitive Radio; Fictitious Play; Game Theory; Jamming Attack; Security; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security and Cryptology (ISCISC), 2013 10th International ISC Conference on
Conference_Location :
Yazd
Type :
conf
DOI :
10.1109/ISCISC.2013.6767327
Filename :
6767327
Link To Document :
بازگشت