{"title":"基于虚拟游戏的认知无线电系统中二次用户与未知干扰者交互分析","authors":"E. Meamari, Khadijeh Afhamisisi, H. Shahhoseini","doi":"10.1109/ISCISC.2013.6767327","DOIUrl":null,"url":null,"abstract":"With the advancement of communication, the spectrum shortage problem becomes a serious problem for future generations. The cognitive radio technology is proposed for this problem. In cognitive radio networks, the secondary users can access spectrum that allocated to the primary users without interference to the operation of primary users. There are a lot of attacks for this technology that one of them is jamming attacks. The best strategy for countering the jamming attack is to switch other bands. This attack is very hard to detect when the malicious user is unknown and there are no information about the payoffs of attacker. In this paper, we propose to use fictitious game for analysis the defense against this unknown jamming attacker.","PeriodicalId":265985,"journal":{"name":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"An analysis on interactions among secondary user and unknown jammer in cognitive radio systems by fictitious play\",\"authors\":\"E. Meamari, Khadijeh Afhamisisi, H. Shahhoseini\",\"doi\":\"10.1109/ISCISC.2013.6767327\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the advancement of communication, the spectrum shortage problem becomes a serious problem for future generations. The cognitive radio technology is proposed for this problem. In cognitive radio networks, the secondary users can access spectrum that allocated to the primary users without interference to the operation of primary users. There are a lot of attacks for this technology that one of them is jamming attacks. The best strategy for countering the jamming attack is to switch other bands. This attack is very hard to detect when the malicious user is unknown and there are no information about the payoffs of attacker. In this paper, we propose to use fictitious game for analysis the defense against this unknown jamming attacker.\",\"PeriodicalId\":265985,\"journal\":{\"name\":\"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCISC.2013.6767327\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCISC.2013.6767327","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An analysis on interactions among secondary user and unknown jammer in cognitive radio systems by fictitious play
With the advancement of communication, the spectrum shortage problem becomes a serious problem for future generations. The cognitive radio technology is proposed for this problem. In cognitive radio networks, the secondary users can access spectrum that allocated to the primary users without interference to the operation of primary users. There are a lot of attacks for this technology that one of them is jamming attacks. The best strategy for countering the jamming attack is to switch other bands. This attack is very hard to detect when the malicious user is unknown and there are no information about the payoffs of attacker. In this paper, we propose to use fictitious game for analysis the defense against this unknown jamming attacker.