메뉴 건너뛰기




Volumn 29, Issue 4, 2011, Pages 877-889

An anti-jamming stochastic game for cognitive radio networks

Author keywords

cognitive radio networks; game theory; reinforcement learning; Security mechanism; spectrum management

Indexed keywords

ANTI-JAMMING; ATTACKING STRATEGY; CHANNEL QUALITY; COGNITIVE RADIO NETWORK; DATA MESSAGES; DEFENSE STRATEGY; ENVIRONMENT DYNAMICS; MINIMAX-Q LEARNING; OPTIMAL POLICIES; SECURITY MECHANISM; SPECTRUM AVAILABILITY; SPECTRUM MANAGEMENT; SPECTRUM UTILIZATION; STATIONARY POLICY; STOCHASTIC GAME; STRATEGIC BEHAVIOR; TIME VARYING;

EID: 79953200186     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2011.110418     Document Type: Article
Times cited : (289)

References (39)
  • 2
    • 13844296408 scopus 로고    scopus 로고
    • Cognitive radio: Brain-empowered wireless communications
    • DOI 10.1109/JSAC.2004.839380
    • S. Haykin, "Cognitive radio: Brain-empowered wireless communications," IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201-220, Feb. 2005. (Pubitemid 40245487)
    • (2005) IEEE Journal on Selected Areas in Communications , vol.23 , Issue.2 , pp. 201-220
    • Haykin, S.1
  • 3
    • 78951495035 scopus 로고    scopus 로고
    • Advances in cognitive radio networks: A survey
    • Feb.
    • B. Wang and K. J. Ray Liu, "Advances in cognitive radio networks: A survey," IEEE J. Sel. Topics Signal Process., vol. 5, no. 1, pp. 5-23, Feb. 2011.
    • (2011) IEEE J. Sel. Topics Signal Process. , vol.5 , Issue.1 , pp. 5-23
    • Wang, B.1    Ray Liu, K.J.2
  • 7
    • 33646597275 scopus 로고    scopus 로고
    • Auction-based spectrum sharing
    • DOI 10.1007/s11036-006-5192-y, Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks
    • J. Huang, R. Berry, and M. L. Honig, "Auction-based spectrum sharing," ACM/Springer Mobile Networks and Apps., vol. 11, no. 3, pp. 405-418, June 2006. (Pubitemid 43724282)
    • (2006) Mobile Networks and Applications , vol.11 , Issue.3 , pp. 405-418
    • Huang, J.1    Berry, R.A.2    Honig, M.L.3
  • 11
    • 38149105953 scopus 로고    scopus 로고
    • Multi-stage pricing game for collusion-resistant dynamic spectrum allocation
    • Jan.
    • Z. Ji and K. J. R. Liu, "Multi-stage pricing game for collusion-resistant dynamic spectrum allocation," IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 182-191, Jan. 2008.
    • (2008) IEEE J. Sel. Areas Commun. , vol.26 , Issue.1 , pp. 182-191
    • Ji, Z.1    Liu, K.J.R.2
  • 12
    • 72949090674 scopus 로고    scopus 로고
    • A scalable collusion- resistant multi-winner cognitive spectrum auction game
    • Dec.
    • Y. Wu, B. Wang, K. J. R. Liu, and T. C. Clancy, "A Scalable Collusion- Resistant Multi-Winner Cognitive Spectrum Auction Game," IEEE Trans. Commun., vol. 57, no. 12, pp. 3805-3816, Dec. 2009.
    • (2009) IEEE Trans. Commun. , vol.57 , Issue.12 , pp. 3805-3816
    • Wu, Y.1    Wang, B.2    Liu, K.J.R.3    Clancy, T.C.4
  • 13
    • 77956266464 scopus 로고    scopus 로고
    • Game theory for cognitive radio networks: An overview
    • Oct.
    • B. Wang, Y. Wu, and K. J. R. Liu, "Game theory for cognitive radio networks: An overview," Computer Networks, vol. 54, no. 14, pp. 2537- 2561, Oct. 2010.
    • (2010) Computer Networks , vol.54 , Issue.14 , pp. 2537-2561
    • Wang, B.1    Wu, Y.2    Liu, K.J.R.3
  • 14
    • 33644993164 scopus 로고    scopus 로고
    • Dynamic spectrum access in open spectrum wireless networks
    • Mar.
    • Y. Xing, R. Chandramouli, S. Mangold, and S. Shankar, "Dynamic spectrum access in open spectrum wireless networks," IEEE J. Sel. Areas Commun., vol. 24, no. 3, pp. 626-637, Mar. 2006.
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , Issue.3 , pp. 626-637
    • Xing, Y.1    Chandramouli, R.2    Mangold, S.3    Shankar, S.4
  • 15
    • 34247229185 scopus 로고    scopus 로고
    • Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework
    • Apr.
    • Q. Zhao, L. Tong, A. Swami, and Y. Chen, "Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework," IEEE J. Sel. Areas Commun., vol. 25, no. 3, pp. 589-600, Apr. 2007.
    • (2007) IEEE J. Sel. Areas Commun. , vol.25 , Issue.3 , pp. 589-600
    • Zhao, Q.1    Tong, L.2    Swami, A.3    Chen, Y.4
  • 16
    • 67349182123 scopus 로고    scopus 로고
    • Primary-prioritized Markov approach for efficient and fair dynamic spectrum allocation
    • Apr.
    • B. Wang, Z. Ji, K. J. R. Liu, and C. Clancy, "Primary-prioritized Markov approach for efficient and fair dynamic spectrum allocation," IEEE Trans. Wireless Commun., vol. 8, no. 4, pp. 1854-1865, Apr. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.4 , pp. 1854-1865
    • Wang, B.1    Ji, Z.2    Liu, K.J.R.3    Clancy, C.4
  • 17
    • 38149046958 scopus 로고    scopus 로고
    • Defense against primary user emulation attacks in cognitive radio networks
    • Jan.
    • R. Chen, J. Park, and J. H. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 25-37, Jan. 2008.
    • (2008) IEEE J. Sel. Areas Commun. , vol.26 , Issue.1 , pp. 25-37
    • Chen, R.1    Park, J.2    Reed, J.H.3
  • 19
    • 52549109488 scopus 로고    scopus 로고
    • Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment
    • Oct.
    • T. X. Brown and A. Sethi, "Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment," Mobile Networks and Applications, vol. 13, no. 5, pp. 516-532, Oct. 2008.
    • (2008) Mobile Networks and Applications , vol.13 , Issue.5 , pp. 516-532
    • Brown, T.X.1    Sethi, A.2
  • 21
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • DOI 10.1109/MC.2002.1039518
    • A. Wood and J. Stankovic, "Denial of service in sensor networks," IEEE Computer, 35(10):54-62, Oct. 2002. (Pubitemid 35186161)
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 22
  • 23
    • 0020128340 scopus 로고
    • Theory of spread spectrum communications-A tutorial
    • May
    • R. L. Pickholtz, D. L. Schilling, and L. B. Milstein, "Theory of spread spectrum communications-a tutorial," IEEE Trans. Commun., vol. 20, no. 5, pp. 855-884, May 1982.
    • (1982) IEEE Trans. Commun. , vol.20 , Issue.5 , pp. 855-884
    • Pickholtz, R.L.1    Schilling, D.L.2    Milstein, L.B.3
  • 24
    • 0033220981 scopus 로고    scopus 로고
    • Finite-state Markov model for Rayleigh fading channels
    • DOI 10.1109/26.803503
    • Q. Zhang and S. A. Kassam, "Finite-state Markov model for Rayleigh fading channels," IEEE Trans. Commun., vol. 47, no. 11, pp. 1688-1692, Nov. 1999. (Pubitemid 32210755)
    • (1999) IEEE Transactions on Communications , vol.47 , Issue.11 , pp. 1688-1692
    • Zhang, Q.1    Kassam, S.A.2
  • 25
    • 34548307187 scopus 로고    scopus 로고
    • Using channel hopping to increase 802.11 resilience to jamming attacks
    • DOI 10.1109/INFCOM.2007.314, 4215896, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • V. Navda, A. Bohra, S. Ganguly, and D. Rubenstein, "Using channel hopping to increase 802.11 resilience to jamming attacks," IEEE 26th Conference on Computer Communications (INFOCOM), pp. 2526-2530, Anchorage, AK, Apr. 2007. (Pubitemid 47334514)
    • (2007) Proceedings - IEEE INFOCOM , pp. 2526-2530
    • Navda, V.1    Bohra, A.2    Ganguly, S.3    Rubenstein, D.4
  • 26
    • 36949015142 scopus 로고    scopus 로고
    • Understanding and mitigating the impact of RF interference on 802.11 networks
    • DOI 10.1145/1282380.1282424, ACM SIGCOMM 2007: Conference on Computer Communications
    • R. Gummadi, D. Wetherall, B. Greenstein, and S. Seshan, "Understanding and mitigating the impact of RF interference on 802.11 networks," ACM SIGCOMM Computer Communication Review, vol. 37, no. 4, pp. 385-396, 2007. (Pubitemid 350239800)
    • (2007) ACM SIGCOMM 2007: Conference on Computer Communications , pp. 385-396
    • Gummadi, R.1    Wetherall, D.2    Greenstein, B.3    Seshan, S.4
  • 29
    • 11244260535 scopus 로고    scopus 로고
    • Channel surfing and spatial retreats: Defenses against wireless denial of service
    • Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
    • W. Xu, T. Wood, W. Trappe, and Y. Zhang, "Channel surfing and spatial retreats: Defenses against wireless denial of service," in Proc. 3rd ACM Workshop on Wireless Security (WiSe), pp. 80-89, Philadelphia, PA, Oct. 2004. (Pubitemid 40062798)
    • (2004) Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe , pp. 80-89
    • Xu, W.1    Wood, T.2    Trappe, W.3    Zhang, Y.4
  • 30
    • 38149010624 scopus 로고    scopus 로고
    • Cognitive medium access: Constraining interference based on experimental models
    • Jan.
    • S. Geirhofer, L. Tong, and B. M. Sadler, "Cognitive medium access: Constraining interference based on experimental models," IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 95-105, Jan. 2008.
    • (2008) IEEE J. Sel. Areas Commun. , vol.26 , Issue.1 , pp. 95-105
    • Geirhofer, S.1    Tong, L.2    Sadler, B.M.3
  • 31
    • 0000392613 scopus 로고
    • Stochastic games
    • L.S. Shapley, "Stochastic games," Proc. Nat. Acad. Sci. USA, vol. 39, no. 10, pp. 1095-1100, 1953.
    • (1953) Proc. Nat. Acad. Sci. USA , vol.39 , Issue.10 , pp. 1095-1100
    • Shapley, L.S.1
  • 39
    • 70349132728 scopus 로고    scopus 로고
    • Control channel jamming: Resilience and identification of traitors
    • A. Chan, X. Liu, G. Noubir, and B. Thapa, "Control channel jamming: Resilience and identification of traitors," Proc. ISIT, 2007.
    • (2007) Proc. ISIT
    • Chan, A.1    Liu, X.2    Noubir, G.3    Thapa, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.