Game-Theoretic Approach to Detect Selfish Attacker in Cognitive Radio Ad-Hoc Networks

被引:0
|
作者
Muthukkumar, R. [1 ]
Manimegalai, D. [1 ]
Santhiya, A. Siva [2 ]
机构
[1] Natl Engn Coll, Dept IT, Kovilpatti, Tamil Nadu, India
[2] Natl Engn Coll, Commun & Networking, Kovilpatti, Tamil Nadu, India
关键词
Cognitive Radio; Security; Game theoretical model; Channel state information;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In wireless communication, spectrum resources are utilized by authorities in particular fields. Most of the elements in spectrum are idle. Cognitive radio is a promising technique for allocating the idle spectrum into unlicensed users. Security shortage is a major challenging issue in cognitive radio ad-hoc networks (CRAHNs) that makes performance degradation on spectrum sensing and sharing. A selfish user preoccupies the accessible bandwidth for their prospect usage and prohibits the progress secondary users whose makes the requirement for spectrum utility. Game theoretic model is proposed to detect the selfish attacker in CRAHNs. Channel state information (CSI) is considered to inform each user's channel handing information. The two strategy of Nash Equilibrium game model such as pure and mixed strategy for secondary users (SUs) and selfish secondary users (SSUs) are investigated and the selfish attacker is detected. Moreover a novel belief updating system is also proposed to the secondary users for knowing the CSI of the primary user. A simulation result shows that, game theoretic model is achieved to increase the detection rate of selfish attackers.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Game Theoretic Approach to Cognitive Radio Ad hoc Networks
    Minhas, Qurratul-Ain
    Mahmood, Hasan
    [J]. 2012 15TH INTERNATIONAL MULTITOPIC CONFERENCE (INMIC), 2012, : 305 - 310
  • [2] Some game-theoretic problems in wireless Ad-hoc networks
    Altman, E
    Borkar, VS
    Kherani, AA
    Michiardi, P
    Molva, R
    [J]. WIRELESS SYSTEMS AND MOBILITY IN NEXT GENERATION INTERNET, 2005, 3427 : 82 - 104
  • [3] Identification of Selfish Attack in Cognitive Radio Ad-Hoc Networks
    Wagh, Sharad
    More, Avinash
    Khavnekar, Aditya
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2015, : 666 - 669
  • [4] Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks
    Jo, Minho
    Han, Longzhe
    Kim, Dohoon
    In, Hoh Peter
    [J]. IEEE NETWORK, 2013, 27 (03): : 46 - 50
  • [5] Game-Theoretic Analysis of Selfish Secondary Users in Cognitive Radio Networks
    Kahsay, Halefom
    Jembre, Yalew Zelalem
    Choi, Young-June
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2015, 17 (04) : 440 - 448
  • [6] Game-Theoretic Analysis of Selfish Secondary Users in Cognitive Radio Networks
    Kahsay, Halefom
    Choi, Young-June
    [J]. 2013 FIFTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2013, : 547 - 552
  • [7] Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game-theoretic approach
    Szott, Szymon
    Natkaniec, Marek
    Pach, Andrzej R.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (04) : 509 - 522
  • [8] Power management in MIMO ad hoc networks: A game-theoretic approach
    Liang, Chao
    Dandekar, Kapil R.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (04) : 1164 - 1170
  • [9] Channel Allocation in Cognitive Radio Networks: A Game-Theoretic Approach
    Kumar, Vinesh
    Dhurandher, Sanjay Kumar
    Woungang, Isaac
    Gupta, Shashank
    Singh, Surajpratap
    [J]. ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2022, 2022, 526 : 182 - 192
  • [10] Game Theoretic Approach to Resolve Energy Conflicts in Ad-Hoc Networks
    Gupta, Juhi
    Kumar, Ishan
    Kacholiya, Anil
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 205 - 210