DocumentCode
628951
Title
Secrecy in cognitive radio networks: Turning foes to allies
Author
Khalil, Kamal ; Ekici, Eylem
Author_Institution
Dept. of Electr. & Comput. Eng., Ohio State Univ., Columbus, OH, USA
fYear
2013
fDate
13-17 May 2013
Firstpage
194
Lastpage
200
Abstract
We study a class of security problems in cognitive radio networks in which multiple half-duplex unlicensed (secondary) users independently eavesdrop the communications of licensed (primary) users unless granted access to communicate over the same spectrum band. The problem is to characterize the optimal rule for the primary system that grants spectrum access to selected secondary users and the optimal resource allocation for the secondary users. When granted access, the transmission of secondary users interferes with the eavesdropped primary signal at other eavesdropping users, possibly leading to improved primary secure rate. First, we formulate a simple game with only one secondary user and study its equilibria. The outcome presents optimality conditions to grant access to the secondary user as a function of channel conditions. Then, we study the game when multiple eavesdropping secondary users exist and show that it is not always optimal to grant access to the strongest eavesdropper. Interestingly, the outcome also reveals a recruiting process that turns selected eavesdroppers into helping jammers under certain conditions.
Keywords
cognitive radio; radio spectrum management; resource allocation; telecommunication security; wireless channels; cognitive radio network security; eavesdropping user; jammer; licensed user; multiple half-duplex unlicensed user; primary user; resource allocation; secondary user; spectrum access; spectrum band; Cryptography; Lead; Silicon;
fLanguage
English
Publisher
ieee
Conference_Titel
Modeling & Optimization in Mobile, Ad Hoc & Wireless Networks (WiOpt), 2013 11th International Symposium on
Conference_Location
Tsukuba Science City
Print_ISBN
978-1-61284-824-2
Type
conf
Filename
6576434
Link To Document