Security Analysis of Cognitive Radio Netwoks Using Game Theory

International Journal of Electronics and Communication Engineering
© 2018 by SSRG - IJECE Journal
Volume 5 Issue 2
Year of Publication : 2018
Authors : Ajay Singh and Ritu Rana
pdf
How to Cite?

Ajay Singh and Ritu Rana, "Security Analysis of Cognitive Radio Netwoks Using Game Theory," SSRG International Journal of Electronics and Communication Engineering, vol. 5,  no. 2, pp. 7-9, 2018. Crossref, https://doi.org/10.14445/23488549/IJECE-V5I2P102

Abstract:

In this paper, a cognitive radio network is considered where Alice wants to send confidential information to the Bob in the presence of primary user and eavesdropper. Effect of number of antennas in Bob and eavesdropper is discussed using the game theory. It is observed that number of antennas in Bob improves the security of the system.

Keywords:

cognitive radio, security, game theory, Nash equilibrium.

References:

[1] “Security focus,” security focus bugtraq vulnerability notification database, 2009. Available: http://www.securityfocus.com/archive. 
[2] “US-CERT,” United States Computer Emergency Readiness Team, 2009. Available: http://www.us-cert.gov. 
[3] Y. Zhang, Y. Xiao, K. Ghaboosi, J. Zhang, and H. Deng, “A Survey of Cyber Crimes,” (Wiley Journal of) Security and Communication Networks, Vol. 5, No. 4, pp. 422-437, Apr. 2012. 
[4] R. Bace and P. Mell. Intrusion detection systems. NIST Special Publication on Intrusion Detection Systems. Available:http://www.snort.org/docs/nist-ids.pdf. 
[5] T. Alpcan and T. Baser, “A game theoretic analysis of intrusion detection in access control systems,” Proc. 43rd IEEE Conference on Decision and Control, Vol. 2, pp. 1568-1573,2004. 
[6] M. Bloem, T. Alpcan, and T. Basar, “Intrusion response as a resource allocation problem,”. IEEE Conference on Descision and Control, pp. 6283-6288, 2006. 
[7] M. Li, I. Koutsopoulos, and R. Poovendran, “Optimal jamming attacks and network defense policies in wireless sensor networks,” In Proc. IEEE International Conference on Computer Communications (INFOCOM), pp. 1307 - 1315, 2007. 
[8] T. Alpcan and T. Baser, “An intrusion detection game with limited observations,” Proc. 12th Int. Symp. on Dynamic Games and Applications, 2006. Available: http://www.tansu.alpcan.org/papers/isdg06.pdf. 
[9] S. N. Hamilton, W. L. Miller, A. Ott, and O. S. Saydjari, “The role of game theory in information warfare,” Proc. 4th information survivability workshop (ISW-2001/2002), 2002. Available:http://www.cert.org/research/isw/isw2001/papers/index.html. 
[10] Security measurement- white paper, http://www.psmsc.com/Downloads/TechnologyPapers/SecurityWhitePaperv3.0.pdf. 
[11] W. He, C. Xia, H. Wang, C. Zheng, and Y. Ji, “A game theoretical attack-defense model oriented to network security risk assessment,” 2008 International Conference on Computer Science and Software Engineering, pp. 498 - 504, 2008. 
[12] K. J. Ray Liu and B. Wang, “Cognitive Radio Networking and Security: A Game-Theoretic View,”Cambridge University Press, pp.47, 2010. 
[13] X. Liang and Y. Xiao, “Game Theory for Network Security,” IEEE Communications Surveys & Tutorials, Vol. 15 (1), pp. 472-486, 2013.