DocumentCode
680862
Title
Spectrum Database Poisoning for Operational Security in Policy-Based Spectrum Operations
Author
Robertson, Andrew ; Molnar, Jozsef ; Boksiner, J.
Author_Institution
Networks & Commun. Syst. Branch, Naval Res. Lab., Washington, DC, USA
fYear
2013
fDate
18-20 Nov. 2013
Firstpage
382
Lastpage
387
Abstract
We consider two games played between a spectrum manager and an adversary. The manager attempts to allocate spectrum to primary DoD wireless users and secondary non-DoD users by means of a dynamically updated database. The adversary attempts to detect the presence of DoD users within a cell by querying the database. To prevent this, the manager may add false allocation entries into the database at the cost of possibly excluding legitimate secondary users. We calculate the Nash equilibria of these games and show that they can be surprisingly favorable to the DoD and the secondary network. The manager can ensure that the enemy derives no utility from the database without excluding many secondary users on average.
Keywords
game theory; military communication; military computing; query processing; security of data; Nash equilibria; dynamically updated database; operational security; policy-based spectrum operations; primary DoD wireless users; secondary nonDoD users; spectrum database poisoning; Databases; Games; Mobile communication; Probability distribution; Security; US Department of Defense; Vectors;
fLanguage
English
Publisher
ieee
Conference_Titel
Military Communications Conference, MILCOM 2013 - 2013 IEEE
Conference_Location
San Diego, CA
Type
conf
DOI
10.1109/MILCOM.2013.72
Filename
6735652
Link To Document