Security

Optimal Power Allocation Strategy Against Jamming Attacks Using the Colonel Blotto Game

Free registration required

Executive Summary

Cognitive radio technologies have become a promising approach to increase the efficiency of spectrum utilization. Although cognitive radio has been intensively studied in recent years, only a few works have discussed security aspects. In this paper, the authors focus on the jamming attack, one of major threats to cognitive radio networks, where a malicious user wants to jam the communications of secondary users by injecting interference. Aware of the absence of several primary users and the presence of a malicious user, a secondary user can allocate power to those fallow bands with a randomized strategy, in hope of alleviating the damage caused by the malicious user.

  • Format: PDF
  • Size: 186.49 KB