Download now Free registration required
Cognitive radio technologies have become a promising approach to increase the efficiency of spectrum utilization. Although cognitive radio has been intensively studied in recent years, only a few works have discussed security aspects. In this paper, the authors focus on the jamming attack, one of major threats to cognitive radio networks, where a malicious user wants to jam the communications of secondary users by injecting interference. Aware of the absence of several primary users and the presence of a malicious user, a secondary user can allocate power to those fallow bands with a randomized strategy, in hope of alleviating the damage caused by the malicious user.
- Format: PDF
- Size: 186.49 KB