Download now Free registration required
Cognitive radio technology has become a promising approach to increase the efficiency of spectrum utilization. Since cognitive radio users are vulnerable to malicious attacks, security countermeasures are crucial to the successful deployment of cognitive radio networks in the future. In this paper, the authors focus on defending against the jamming attack, one of the major threats to cognitive radio networks, where several malicious attackers intend to jam the secondary user's communication link by injecting interference. They model this scenario into a jamming game, and derive the optimal strategy through the Markov decision process approach. Furthermore, a learning scheme is proposed for the secondary user to observe the wireless environment and estimate parameters such as primary users' access pattern and the number of attackers.
- Format: PDF
- Size: 202.62 KB