An Analysis on Interactions among Secondary User and Unknown Jammer in Cognitive Radio Systems by Fictitious Play
Autor: | Khadijeh Afhamisisi, Ehsan Meamari, Hadi Shahriar Shahhoseini |
---|---|
Rok vydání: | 2019 |
Předmět: |
Fictitious play
FOS: Computer and information sciences Cognitive radio Computer Science - Cryptography and Security Computer science business.industry ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS Economic shortage business Interference (wave propagation) Cryptography and Security (cs.CR) Computer network |
DOI: | 10.48550/arxiv.1912.12174 |
Popis: | With the advancement of communication, the spectrum shortage problem becomes a serious problem for future generations. The cognitive radio technology is proposed to address this concern. In cognitive radio networks, the secondary users can access spectrum that allocated to the primary users without interference to the operation of primary users. Using cognitive radio network raises security issues such as jamming attack. A straightforward strategy to counter the jamming attack is to switch other bands. Finding the best strategy for switching is complicated when the malicious user is unknown to the primary users. This paper uses fictitious game for analysis the defense against such an unknown jammer. Comment: 6 pages, 5 figures |
Databáze: | OpenAIRE |
Externí odkaz: |