/13/$ IEEE

Size: px
Start display at page:

Download "/13/$ IEEE"

Transcription

1 A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract Cognitive radio networks are a promising solution to the spectrum scarcity issue. However, cognitive radio networks are vulnerable to various kinds of security attacks, among which the jamming attack has attracted great attention as it can significantly degrade spectrum utilization. In this article we model the jamming and anti-jamming process as a Markov decision process. With this approach, secondary users are able to avoid the jamming attack launched by external attackers and therefore maximize the payoff function. We first use a policy iteration method to solve the problem. However, this approach is computationally intensive. To decrease the computation complexity, Q-function is used as an alternate method. Furthermore, we propose an algorithm to solve the Q-function. The simulation results indicate that our approach can achieve better performance than existing approaches to defend against the jamming attack. C ognitive Radio (CR) has received increasing attention due to its potential to solve the conflict between limited spectrum supply and spectrum demand from ever-increasing wireless applications and services []. Being capable of utilizing the spectrum in an opportunistic manner, cognitive radio enables secondary users (SU) to sense the portion of the spectrum that is available, select the appropriate channel for access, and vacate from the channel when the primary user (PU) returns. Cognitive radio networks (CRNs) are subject to various kinds of security attacks, among which the denial of service (DoS) attack is one of the most serious threats. By launching a DoS attack over communication channels, the attacker can severely degrade network performance. The channel jamming attack is one of the DoS attacks that are simple to launch, and difficult to be countermeasured. The jamming attack is a security threat where the attacker interferes a set of communication channels by injecting a continuous jamming signal or non-continuous short jamming pulses. As a result, the communication channels either cannot be accessed or the signal to noise ratio (SNR) in these channels is heavily deteriorated. In traditional wireless networks, the jamming attack has been studied extensively and there is a rich literature of antijamming approaches []. For example, spread spectrum [3] and channel hopping [4] are two defense schemes that are widely used in the physical layer and link layer, respectively. The research of Min Song is supported in part by NSF CAREER Award CNS-489 and NSF IPA Independent Research and Development (IR/D) Program. However, any opinion, finding, and conclusions or recommendations expressed in this material; are those of the author and do not necessarily reflect the views of the National Science Foundation. The research of Chunsheng Xin is supported in part by NSF under grants CNS- 77, CNS-7668, and ECCS However, these approaches cannot be directly applied to cognitive radio networks since spectrum availability is dynamic in cognitive radio networks. Recently, several anti-jamming approaches for cognitive radio networks have been proposed, e.g. the stochastic game framework by Wang et al. [5], and the decentralized anti-jamming multi-channel spectrum access protocol by Wang et al. [6]. In this article we focus on jamming attacks in cognitive radio networks and propose a game-theoretical anti-jamming scheme () scheme to countermeasure this attack. Compared with the previous work, the anti-jamming scheme we develop has a low computation complexity, while achieving very good throughput. To avoid jamming, SUs proactively hop among accessible channels. We formulate the jamming-hopping process as a Markov Decision Process and propose a Policy Iteration scheme, with a complexity analysis of Policy Iteration scheme. Although this scheme is effective, it may be computationally prohibitive. To reduce the computation complexity, we further propose a Q-function based approach. Through extensive simulations, we demonstrate that our proposed scheme can achieve a high payoff. In addition, our scheme has a low probability of being jammed by an attacker. The remainder of the article is organized as follows. We review the related work. We describe the system model. We discuss the proposed anti-jamming scheme. We present simulation results. Finally we conclude the article. Related Work In this section, we discuss the state-of-the-art work on antijamming schemes for cognitive radio networks and traditional wireless systems. In [7] Li and Han applied game theory and Markov decision process theory to study the jamming and anti-jamming problem in cognitive radio networks. For the one-stage case, the jamming and anti-jamming are modeled as /3/$5. 3 IEEE IEEE Network May/June 3

2 a zero-sum game, and the Nash Equilibrium strategy was calculated. For the multi-stage case, the problem was modeled as a stochastic game. The game was analyzed based on the framework of partially observable Markov Decision Process. However, several assumptions of this article are strong. For example, the channel availability was assumed perfectly known to both benign and malicious users, the attacker was assumed always rational, i.e. always following the best strategy, and the attacker was assumed to know the benign user s strategy. In [5] the authors also used game theory to formulate channel hopping. The problem was formulated as a zerosum problem. At each time slot, the SUs observe spectrum availability, the quality of the channel, and the attacker s strategy. Using the minimax-q learning method, an SU can learn the optimal policy and maximizes throughput. In [6] Wang et al. proposed an anti-jamming protocol, where the sender and the receiver hop to the same set of channels for communication with a high probability. The network is time-slotted. In each time slot, the sender chooses a set of channels with high weights to sense, transmits on the detected idle channels, and waits for ACK. The receiver also chooses a set of channels to receive packets based on the weights of channels. The weight of a channel is adjusted based on the channel reward, i.e. whether the sender successfully receives an ACK. In [8] the authors studied the vulnerability of rate adaptation algorithms (RAA) to the jamming attack, and the weakness of IEEE8.. Several algorithms were proposed to determine optimal jamming strategies against RAA for a given jamming budget. System Model Channel Model In this article, we consider a cognitive radio network with a number of PUs, where each PU is on a different channel. The spectrum is divided into N channels. The statistics of each channel are independent of each other. The channel activity is modeled as a discrete-time Markov process. Each channel has two states: State (idle), indicating that the PU is inactive on this channel. State (busy), indicating that the PU is active on the channel. The transition probability from state to state is denoted as p, while the transition probability from state to state is denoted as p. We assume that initially all N channels are idle. The probability that the PU is idle/busy on each channel at different time slots can be calculated recursively. Secondary User Model Let H denote the number of SUs in the network. We assume that all SUs operate in a time-slotted mode. To avoid jamming, SUs periodically change their operation channels. Each SU uses a small interval at the beginning of each time slot for spectrum sensing. During this sensing interval, each SU detects the presence of the PU in all of the N channels and chooses up to L accessible channels for communication based on our anti-jamming scheme. We assume that all SUs can detect whether the channels they have accessed are jammed by the attacker at the end of each time slot, and every SU keeps a history of spectrum sensing and successful/jammed communication. Due to space limitations, we will not discuss details on how to detect that a channel is jammed, as this itself is a large topic. The interested reader is referred to [9]. In each time slot, SUs decide whether to transmit on each channel. For each SU, its activity on a channel is one of the following three possibilities: A successful transmission. An unsuccessful transmission, i.e. being jammed. No transmission. Since these three activities yield different payoffs, SUs need to choose an action in each channel that maximizes the system s expected payoff. This payoff is based on the history of the channel. A successful packet transmission pays U to SUs for each channel, where U is the utility for a single channel, while when jamming occurs in a channel, it costs C to SUs. The payoff for no transmission is always zero. We assume that the value of the utility and the cost of each channel are constant and the same for every channel. Attacker Model Without loss of generality, we consider one external malicious attacker. This attacker is not authenticated by and associated with the cognitive radio network. The attacker can launch a jamming attack to degrade spectrum utilization. Due to the jamming attack, a channel either cannot be accessed, or the SNR on this channel is heavily deteriorated. There are other possible reasons for reducing SNR. However, we focus on the jamming attack in this article. How to distinguish other factors for the reduced SNR from the jamming attack will be one of our future directions. Both SUs and the attacker are assumed to follow a time-slotted access scheme. The attacker s scheme is characterized as follows. First it chooses a set of channels to perform spectrum sensing for a certain duration, called spectrum sensing duration in this article. If it has detected that the PU is active in the channel, or the SUs do not occupy the channel (no signal on the channel) after the spectrum sensing duration, the attacker hops to a new set of channels and performs sensing again, until the attacker finds some channel(s) that are occupied by one or several SUs, and launches the jamming attack on these channels. Note that while the attacker tries to find the channels of SU(s) through spectrum sensing and hopping, the SU is also dynamically hopping channels. Therefore, the attacker may not be able to find the channels occupied by SU(s) within a certain time to launch the jamming attack. In each time slot, the attacker can jam up to J channels. Game-Theoretical Anti-jamming Scheme Game Formulation We formulate the jamming and anti-jamming between the attacker and the SUs as a game. There are two types of players in this game: SUs and the attacker. The strategy set of this game denotes the set of channels for access, which is finite. Therefore, according to [], this game has a Nash equilibrium. Moreover, in our model the two-player game is a zerosum game, since the gain of one player results in a corresponding loss of the other player. Let s denote the state of all channels in a time slot k, indicating whether each channel is accessible by the SUs. Let S denote the set of all possible states. Both the SUs and the attacker have the knowledge of the state information since they all sense the channels at the beginning of each time slot. The SUs have a finite action set A(s), which depends on the state s of the channels. At time slot, each SU randomly chooses L accessible channels for communication. After that, in each time slot, the SU selects an action from A(s) based on the state s of the channels, e.g. stay on certain channels or hop to other channels. At a given time slot, let M denote the number of channels being occupied by the PUs. Each SU selects L (L N M) channels for communication from the N M accessible channels. Therefore, there are C L N M possible selections in total, and for each selection, there is an action. IEEE Network May/June 3 3

3 Hence, A(s) = {a,, a i,, ac L N M}, where a i indicates the action for the ith selection of L channels. At a given time slot, the SUs select an action a based on state s of the channels, and at the next slot, the SUs select another action a based on state s of the channels in this slot. The probability of transiting from action a in state s to action a at state s is denoted as Pr(s, a Ís, a). The SU s transition probability depends on the state s at a time slot. For example, when L =, in time slot k, an SU accesses channel l. In time slot k +, if channel l is occupied by PU, the SU must hop to one of the N M accessible channels. In this situation, the transition probability of the SU is Pr ( s, a s, a) =. N M On the other hand, if channel l is still accessible in slot k +, we set the transition probability to stay in channel l in slot k + as p stay, i.e. the SU stays in this channel with Pr(s, a Ís, a) = p stay, which means that the SU hops to another accessible channel with probability Pr( s, a s, a) = ( pstay ) N M. As described earlier, each SU selects L channels for communication. The utility earned by the SUs successful communication subtracting the cost due to jammed communication in L channels is the gain for the SUs in a time slot, denoted as G(s, a i ) based on the state s of the channels and the action a i. Hence we have G(s, a i ) = S L l=(x l (s, a) U y l (s, a) C), where x l (s, a) and y l (s, a) are switching functions, which depend on the state s and the corresponding action a of the SUs: x l (s, a) = when communication in channel l is successful under action a at state s, while x l (s, a) = when communication in channel l is jammed under action a at state s. Similarly, y l (s, a) = when communication in channel l is jammed under action a at state s, while y l (s, a) = when communication in channel l is successful under action a at state s. For example, we consider a special condition when there is only one SU in the network and during each time slot, the SU accesses only one channel. The SU s communication can either be successful or jammed. Therefore, G(s, a) = U if the communication is successful, and G(s, a) = C otherwise. Policy Iteration Scheme We use Markov Decision Process (MDP) to formulate the anti-jamming process. An MDP has four components: Finite state set S. Finite action set A. Transition probability. Gain. Since the anti-jamming process discussed above contains these four components, it can be formulated as an MDP. We can solve the MDP to obtain the optimal strategy. We define the stationary policy: p i : s Æ a i, where p i ŒP(s) = {p, p,, p C L N M }. P(s) corresponds to the action set A(s) at state s. For example, given two PUs, four channels, and two SUs, in the first time slot, suppose that the first channel is accessed by an SU, the second channel is idle, the third channel is occupied by the PU, and the fourth channel is jammed by the attacker. Then the state s for the four channels is {SU access, Idle, PU occupy, Attacker jamming}, the action set A(s) = {stay, hop}, the policy set P(s) = {channel Æstay, channel Æhop, }. Since the communication is successful for the SU at this slot, G(s, a) = U. Let V p (s) denote the value function for p, which is the ly choose a policy p ŒP(s) at time slot Calculate V p (s) using Eq. while time slot k π final time slot do for all policy p Œ P(s ) do {traverse all actions} Calculate V p (s ) using Eq. if V p (s) < V p (s ) then V p (s) = V p (s ) p = p end if end for policy update: calculate p(s) with updated p using Eq. end while Algorithm. Policy iteration algorithm. expected total reward, i.e. k k Vπ () s = E G( s, a ) a = π ( s ), s= s i k= = E Gsa (, ) s, a + Pr s, a sa, V ( s ) s ( ) where G(s k, a k ) is the total gain of SU to choose action a k at state s k since the beginning slot, a is a specific action at the current state s, G(s, a) is the immediate gain, and S s Pr(s, a Ís, a) V p (s ) is the expected future gain. The optimal value function has an additional property, i.e. satisfying the Bellman optimality equation. Hence we have V* () s = max G(, s a) + Pr( s, a s, a) V* ( s ), π s π* ( s) = arg max Gsa (, ) + Pr( s, a sa, ) V* ( s ). π s We can use a Policy Iteration algorithm, described in Algorithm, to solve the Bellman optimality equation to obtain the optimal policy. Complexity Analysis We now briefly analyze the computation complexity of Algorithm. Inside the while loop of Algorithm, line 5 is the value determination phase and line is the policy improvement phase. In each iteration, for the value determination phase, the complexity is O(ÍSÍ 3 ) from solving the linear equations. On the other hand, the policy improvement can be performed in O(ÍAÍÍSÍ ) steps. Therefore, in each iteration of Algorithm, the cost is O(ÍAÍ ÍSÍ + ÍSÍ 3 ). Algorithm will run T time slots. Based on the above analysis, the computation complexity of Algorithm is O(ÍTÍ (ÍAÍ ÍSÍ + ÍSÍ 3 )). Q-Function Scheme The policy iteration algorithm may be computationally intensive. Hence, we propose a Q-learning algorithm as an alternative approach to solve the problem. We adopt the Q function from [], and it can be approximated as follows, Qk+ (, s a) = G(, s a) + Pr ( s, a s, a) max { Qk ( s, a )} k k = ( ) α + α k+ k+ Qs, a ( ) Gs (, a ) k+ k+ + max { Qs (, a )}, π (3) 4 IEEE Network May/June 3

4 Initialize: Q(s, a) =, G(s, a) =, ly choose a start action for k = to final time slot do Calculate the learning rate a for all actions a i Œ A(s) do Calculate Q(s, a i ) using Eq. 3 if Q(s, a i ) > Q(s, a) then Q(s, a) = Q(s, a i ) a = a i end if end for SU s action is a end for Algorithm. Q-learning algorithm. where a Œ [, ] is the learning rate. In this article, we use a linear learning rate defined as a = /k+. We describe how to calculate the Q function in Algorithm. Simulation Results Figure. Jamming probability under static attack, scenario Figure. Jamming probability under random attack, scenario. In this section, we evaluate the performance of the proposed through simulations. We compare the performance of to two existing schemes under three different types of jamming attacks. The first existing scheme is called the random scheme, where the SU has no idea of the history of each channel and randomly chooses one accessible channel at the beginning of each time slot. When choosing the channel, the SU would not consider the channel condition or the attacker s strategy. The second existing scheme is called the intelligent scheme, where the SU keeps a history of accessing/jamming states for all channels, and chooses the channel that is least jammed. We consider three types of jamming attacks. The first one is called static attack, where the jammer chooses J accessible channels at the beginning of each time slot. The second type of attack is called random attack, where the jammer chooses J accessible channels at the beginning of each time slot. These two types of attacks do not have the information of the state history of each channel. The third type of attack is called intelligent attack. The attacker keeps a history of the channel state, i.e. jammed or not, and picks the channels that have the highest probabilities of being jammed. The performance metric we use is the jamming probability, i.e. the probability that the SU is jammed. The presented results are the average values from dozens of simulations using different seeds. We consider two scenarios. We first examine the performance of under scenario. In this scenario we assume one PU in the network. We assume that the transition probabilities of each channel from busy to idle and from idle to busy, i.e. p and p, are both equal to.5. There are channels in the licensed band, i.e. N =. We first assume that there is one SU in the network, i.e. H =. During each time slot, the SU accesses one channel, i.e. L =. We set p stay =.37. We assume that the PU is occupying its channel all the time, i.e. M =. The SU stays in a channel with p stay when the channel is accessible in the next time slot, while it hops to each of the other accessible channels with Pr(s, a Ís, a) =.63 /N M. As we assumed earlier, there is one attacker and the attacker can jam up to three channels at each time, i.e. J = 3. Figure plots the jamming probabilities of the random scheme, intelligent scheme, and under the static attack in scenario. At the beginning time slots, these three schemes have similar jamming probabilities. However, when the time progresses, the jamming probabilities of both the intelligent scheme and decrease. In particular, the jamming probability of becomes negligible after time slot 8, while the jamming probability of the random scheme does not change much. This is because the random scheme does not take any feedback into consideration from previous actions. The jamming probabilities of the three schemes under the random attack are plotted in Fig.. Similar to the case under the static attack, the jamming probabilities of the three schemes are around the same at the beginning. As time elapses, both the intelligent scheme and have lower jamming probabilities. However, the performance of is better than that of the intelligent scheme. Figure 3 illustrates the jamming probabilities of the three schemes under the intelligent attack. Comparing the results in Fig. 3 with the results in Fig. and Fig., we can see that the performance of the intelligent scheme under intelligent attack is worse than the performance under the static attack or random attack. The reason is that the attacker is also intelligent, i.e. it also learns from the accessing/jamming history of each channel. Hence the performance of the intelligent scheme degrades. However, the performance of is still very good even under the intelligent attack. Next we examine the performance of in the second scenario. In this scenario, the transition probabilities of each channel from busy to idle and from idle to busy are both assumed as.5. There are 5 channels in the licensed band, IEEE Network May/June 3 5

5 Figure 3. Jamming probability under intelligent attack, scenario Figure 5. Jamming probability under random attack, scenario Figure 4. Jamming probability under static attack, scenario. Figure 6. Jamming probability under intelligent attack, scenario. i.e. N = 5, and three SUs in the network, i.e. H = 3. During each time slot, each SU accesses three channels, i.e. L = 3. p stay is still set as.37. There are two attackers in the network and each attacker can jam up to three channels at a time, i.e. J = 3. Figure 4 plots the jamming probabilities of the three schemes in scenario. We can see that the jamming probabilities are higher than the ones in the first scenario shown in Fig.. For example, the jamming probability of the random scheme is around.385, while in Fig. it is around.3. The reason is that there are more jammers in the network. Therefore, it is more difficult for the SUs to defend the jamming attack. However, still achieves the best performance. Figure 5 and Fig. 6 illustrate the simulation results under the random attack and the intelligent attack. achieves better performance than the other two anti-jamming strategies under these two attacks too. Conclusion and Future Directions In this article, we have discussed the challenges in defending jamming attacks in cognitive radio networks. During the antijamming process, the SUs proactively hop among accessible channels to defend against jamming attacks. This jamminghopping process is formulated as a Markov Decision Process. We have presented a game-theoretical anti-jamming scheme, called. The probability of jamming is chosen as the performance metric to evaluate our proposed scheme. Performance evaluations demonstrate that can achieve higher payoff than existing approaches and lower the jamming probability. As one possible future direction, we will study how to distinguish other factors for the reduced SNR from the jamming attack, to design a more robust anti-jamming scheme. References [] M. Song et al., Dynamic Spectrum Access: From Cognitive Radio to Network Radio, IEEE Wireless Commun., vol. 9, no.,, pp [] W. Xu et al., The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks, Proc. 6th ACM Int l. Symp. Mobile Ad Hoc Networking and Computing, 5, pp [3] R. Pickholtz, D. Schilling, and L. Milstein, Theory of Spread-Spectrum Communications A Tutorial, IEEE Trans. Commun., vol. 3, no. 5, 98, pp [4] V. Navda et al., Using Channel Hopping to Increase 8. Resilience to Jamming Attacks, Proc. IEEE Infocom, 7, pp [5] B. Wang et al., An Anti-Jamming Stochastic Game for Cognitive Radio Networks, IEEE JSAC, vol. 9, no. 4,, pp [6] Q. Wang, K. Ren, and P. Ning, Anti-Jamming Communication in Cognitive Radio Networks with Unknown Channel Statistics, Proc. IEEE Int l. Conf. Network Protocols,, pp IEEE Network May/June 3

6 [7] H. Li and Z. Han, Dogfight in Spectrum: Jamming and Anti-Jamming in Multichannel Cognitive Radio Systems, Proc. IEEE Globecom, 9. [8] G. Noubir et al., On the Robustness of IEEE 8. Rate Adaptation Algorithms Against Smart Jamming, Proc. 4th ACM Conf. Wireless Network Security,, pp [9] W. Xu et al., The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks, Proc. ACM MobiHoc, 5. [] J. Nash, Non-Cooperative Games, Annals of Mathematics, vol. 54, no., 95, pp [] M. Lagoudakis and R. Parr, Value Function Approximation in zero- Sum Markov Games, Proc. 8th Conf. Uncertainty in Artificial Intelligence,, pp Biographies CHANGLONG CHEN received his BS degree and MS degree in Telecommunication Engineering from Jilin University, Changchun, China, in 5, and in 9, respectively. He is currently a Ph.D. candidate in Electrical Engineering and Computer Science at the University of Toledo, Toledo, OH. His research interests include network security, cognitive radio networks, and performance analysis. MIN SONG [SM] (min.song@utoledo.edu) is a Professor in the Electrical Engineering and Computer Science Department at the University of Toledo. Professor Song is currently serving the NSF as a Program Director. He received his Ph.D. in Computer Science from the University of Toledo in. Over the years, he has secured more than $ million research funding from NSF, DOE, and NASA. Dr. Song is the recipient of CAREER Award. CHUNSHENG XIN [M] (cxin@ieee.org) is an Associate Professor in Electrical and Computer Engineering Department of Old Dominion University. He received his Ph.D. in Computer Science and Engineering from the State University of New York at Buffalo in. His research interests include cognitive radio networks and network security. His research is supported by several NSF grants and published in leading technical journals and conferences. JONATHAN BACKENS (jback6@odu.edu) received his B.S. degree in Computer Engineering and Computer Science from Christopher Newport University in 4. He is currently a Ph.D. candidate in Electrical and Computer Engineering at Old Dominion University in Norfolk, Virginia. His research interest include rural wireless mesh networking, game theory in communication systems, cognitive radio networks and performance analysis. IEEE Network May/June 3 7

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Chunxiao Jiang, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College

More information

Optimal Defense Against Jamming Attacks in Cognitive Radio Networks using the Markov Decision Process Approach

Optimal Defense Against Jamming Attacks in Cognitive Radio Networks using the Markov Decision Process Approach Optimal Defense Against Jamming Attacks in Cognitive Radio Networks using the Markov Decision Process Approach Yongle Wu, Beibei Wang, and K. J. Ray Liu Department of Electrical and Computer Engineering,

More information

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio Tradeoff between Spoofing and Jamming a Cognitive Radio Qihang Peng, Pamela C. Cosman, and Laurence B. Milstein School of Comm. and Info. Engineering, University of Electronic Science and Technology of

More information

Imperfect Monitoring in Multi-agent Opportunistic Channel Access

Imperfect Monitoring in Multi-agent Opportunistic Channel Access Imperfect Monitoring in Multi-agent Opportunistic Channel Access Ji Wang Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements

More information

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Jamming mitigation in cognitive radio networks using a modified Q-learning algorithm

Jamming mitigation in cognitive radio networks using a modified Q-learning algorithm Jamming mitigation in cognitive radio networks using a modified Q-learning algorithm Feten Slimeni, Bart Scheers, Zied Chtourou and Vincent Le Nir VRIT Lab - Military Academy of Tunisia, Nabeul, Tunisia

More information

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory Suchita S. Potdar 1, Dr. Mallikarjun M. Math 1 Department of Compute Science & Engineering, KLS, Gogte

More information

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955

More information

A Two-Layer Coalitional Game among Rational Cognitive Radio Users

A Two-Layer Coalitional Game among Rational Cognitive Radio Users A Two-Layer Coalitional Game among Rational Cognitive Radio Users This research was supported by the NSF grant CNS-1018447. Yuan Lu ylu8@ncsu.edu Alexandra Duel-Hallen sasha@ncsu.edu Department of Electrical

More information

Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks

Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks 1 Qian Wang, Hai Su, Kui Ren, and Kai Xing Department of ECE, Illinois Institute of Technology, Email:

More information

Dynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009

Dynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009 Dynamic Spectrum Access in Cognitive Radio Networks Xiaoying Gan xgan@ucsd.edu 09/17/2009 Outline Introduction Cognitive Radio Framework MAC sensing Spectrum Occupancy Model Sensing policy Access policy

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information

DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song

DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS by Yi Song A dissertation submitted to the faculty of The University of North Carolina at Charlotte in partial fulfillment

More information

A Secure Transmission of Cognitive Radio Networks through Markov Chain Model

A Secure Transmission of Cognitive Radio Networks through Markov Chain Model A Secure Transmission of Cognitive Radio Networks through Markov Chain Model Mrs. R. Dayana, J.S. Arjun regional area network (WRAN), which will operate on unused television channels. Assistant Professor,

More information

Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks

Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks Yang Gao 1, Zhaoquan Gu 1, Qiang-Sheng Hua 2, Hai Jin 2 1 Institute for Interdisciplinary

More information

INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. A Dissertation by. Dan Wang

INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. A Dissertation by. Dan Wang INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS A Dissertation by Dan Wang Master of Science, Harbin Institute of Technology, 2011 Bachelor of Engineering, China

More information

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Y.Li, X.Wang, X.Tian and X.Liu Shanghai Jiaotong University Scaling Laws for Cognitive Radio Network with Heterogeneous

More information

Multi-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction

Multi-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 1 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0008 Multi-Band Spectrum Allocation

More information

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Nadia Adem and Bechir Hamdaoui School of Electrical Engineering and Computer Science Oregon State University, Corvallis, Oregon

More information

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,

More information

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute

More information

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment Detection and Prevention of Physical Jamming Attacks in Vehicular Environment M-Tech Student 1 Mahendri 1, Neha Sawal 2 Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal,

More information

Application of combined TOPSIS and AHP method for Spectrum Selection in Cognitive Radio by Channel Characteristic Evaluation

Application of combined TOPSIS and AHP method for Spectrum Selection in Cognitive Radio by Channel Characteristic Evaluation International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 10, Number 2 (2017), pp. 71 79 International Research Publication House http://www.irphouse.com Application of

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #8 Interference and Jamming Announcements Homework #1 is due today Questions? Not everyone has signed up for a Survey These are required,

More information

Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling

Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling ABSTRACT Sasikumar.J.T 1, Rathika.P.D 2, Sophia.S 3 PG Scholar 1, Assistant Professor 2, Professor 3 Department of ECE, Sri

More information

DS3: A Dynamic and Smart Spectrum Sensing Technique for Cognitive Radio Networks Under Denial of Service Attack

DS3: A Dynamic and Smart Spectrum Sensing Technique for Cognitive Radio Networks Under Denial of Service Attack DS3: A Dynamic and Smart Spectrum Sensing Technique for Cognitive Radio Networks Under Denial of Service Attack Muhammad Faisal Amjad, Baber Aslam, Cliff C. Zou Department of Electrical Engineering and

More information

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Haobing Wang, Lin Gao, Xiaoying Gan, Xinbing Wang, Ekram Hossain 2. Department of Electronic Engineering, Shanghai Jiao

More information

Learning via Delayed Knowledge A Case of Jamming. SaiDhiraj Amuru and R. Michael Buehrer

Learning via Delayed Knowledge A Case of Jamming. SaiDhiraj Amuru and R. Michael Buehrer Learning via Delayed Knowledge A Case of Jamming SaiDhiraj Amuru and R. Michael Buehrer 1 Why do we need an Intelligent Jammer? Dynamic environment conditions in electronic warfare scenarios failure of

More information

Efficient Anti-Jamming Technique Based on Detecting a Hopping Sequence of a Smart Jammer

Efficient Anti-Jamming Technique Based on Detecting a Hopping Sequence of a Smart Jammer IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 12, Issue 3 Ver. II (May June 2017), PP 118-123 www.iosrjournals.org Efficient Anti-Jamming

More information

Learning and Decision Making with Negative Externality for Opportunistic Spectrum Access

Learning and Decision Making with Negative Externality for Opportunistic Spectrum Access Globecom - Cognitive Radio and Networks Symposium Learning and Decision Making with Negative Externality for Opportunistic Spectrum Access Biling Zhang,, Yan Chen, Chih-Yu Wang, 3, and K. J. Ray Liu Department

More information

SPECTRUM resources are scarce and fixed spectrum allocation

SPECTRUM resources are scarce and fixed spectrum allocation Hedonic Coalition Formation Game for Cooperative Spectrum Sensing and Channel Access in Cognitive Radio Networks Xiaolei Hao, Man Hon Cheung, Vincent W.S. Wong, Senior Member, IEEE, and Victor C.M. Leung,

More information

Cognitive Radios Games: Overview and Perspectives

Cognitive Radios Games: Overview and Perspectives Cognitive Radios Games: Overview and Yezekael Hayel University of Avignon, France Supélec 06/18/07 1 / 39 Summary 1 Introduction 2 3 4 5 2 / 39 Summary Introduction Cognitive Radio Technologies Game Theory

More information

Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework

Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Qing Zhao, Lang Tong, Anathram Swami, and Yunxia Chen EE360 Presentation: Kun Yi Stanford University

More information

Channel Sensing Order in Multi-user Cognitive Radio Networks

Channel Sensing Order in Multi-user Cognitive Radio Networks 2012 IEEE International Symposium on Dynamic Spectrum Access Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering

More information

Chapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel

Chapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel Chapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel Yi Song and Jiang Xie Abstract Cognitive radio (CR) technology is a promising solution to enhance the

More information

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

Interleaving And Channel Encoding Of Data Packets In Wireless Communications Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218

More information

Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks

Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks Min Song, Trent Allison Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529, USA Abstract

More information

Chapter 3 Learning in Two-Player Matrix Games

Chapter 3 Learning in Two-Player Matrix Games Chapter 3 Learning in Two-Player Matrix Games 3.1 Matrix Games In this chapter, we will examine the two-player stage game or the matrix game problem. Now, we have two players each learning how to play

More information

Full-Duplex Machine-to-Machine Communication for Wireless-Powered Internet-of-Things

Full-Duplex Machine-to-Machine Communication for Wireless-Powered Internet-of-Things 1 Full-Duplex Machine-to-Machine Communication for Wireless-Powered Internet-of-Things Yong Xiao, Zixiang Xiong, Dusit Niyato, Zhu Han and Luiz A. DaSilva Department of Electrical and Computer Engineering,

More information

Pseudorandom Time-Hopping Anti-Jamming Technique for Mobile Cognitive Users

Pseudorandom Time-Hopping Anti-Jamming Technique for Mobile Cognitive Users Pseudorandom Time-Hopping Anti-Jamming Technique for Mobile Cognitive Users Nadia Adem, Bechir Hamdaoui, and Attila Yavuz School of Electrical Engineering and Computer Science Oregon State University,

More information

Jamming Games for Power Controlled Medium Access with Dynamic Traffic

Jamming Games for Power Controlled Medium Access with Dynamic Traffic Jamming Games for Power Controlled Medium Access with Dynamic Traffic Yalin Evren Sagduyu Intelligent Automation Inc. Rockville, MD 855, USA, and Institute for Systems Research University of Maryland College

More information

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University

More information

Channel Sensing Order in Multi-user Cognitive Radio Networks

Channel Sensing Order in Multi-user Cognitive Radio Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering State University of New York at Stony Brook Stony Brook, New York 11794

More information

arxiv: v1 [cs.ni] 30 Jan 2016

arxiv: v1 [cs.ni] 30 Jan 2016 Skolem Sequence Based Self-adaptive Broadcast Protocol in Cognitive Radio Networks arxiv:1602.00066v1 [cs.ni] 30 Jan 2016 Lin Chen 1,2, Zhiping Xiao 2, Kaigui Bian 2, Shuyu Shi 3, Rui Li 1, and Yusheng

More information

Journal of Asian Scientific Research DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE

Journal of Asian Scientific Research DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE Journal of Asian Scientific Research ISSN(e): 2223-1331/ISSN(p): 2226-5724 URL: www.aessweb.com DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE

More information

Opportunistic Communications under Energy & Delay Constraints

Opportunistic Communications under Energy & Delay Constraints Opportunistic Communications under Energy & Delay Constraints Narayan Mandayam (joint work with Henry Wang) Opportunistic Communications Wireless Data on the Move Intermittent Connectivity Opportunities

More information

Cognitive Radio: Brain-Empowered Wireless Communcations

Cognitive Radio: Brain-Empowered Wireless Communcations Cognitive Radio: Brain-Empowered Wireless Communcations Simon Haykin, Life Fellow, IEEE Matt Yu, EE360 Presentation, February 15 th 2012 Overview Motivation Background Introduction Radio-scene analysis

More information

A Framework for Energy-efficient Adaptive Jamming of Adversarial Communications

A Framework for Energy-efficient Adaptive Jamming of Adversarial Communications A Framework for Energy-efficient Adaptive Jamming of Adversarial Communications Jiasi Chen, Soumya Sen, Mung Chiang Princeton University Princeton, NJ, USA David J. Dorsey Lockheed Martin ATL Cherry Hill,

More information

4 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 30, NO. 1, JANUARY 2012

4 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 30, NO. 1, JANUARY 2012 4 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 3, NO. 1, JANUARY 212 Anti-Jamming Games in Multi-Channel Cognitive Radio Networks Yongle Wu, Beibei Wang, Member, IEEE, K.J.RayLiu,Fellow, IEEE,

More information

Population Adaptation for Genetic Algorithm-based Cognitive Radios

Population Adaptation for Genetic Algorithm-based Cognitive Radios Population Adaptation for Genetic Algorithm-based Cognitive Radios Timothy R. Newman, Rakesh Rajbanshi, Alexander M. Wyglinski, Joseph B. Evans, and Gary J. Minden Information Technology and Telecommunications

More information

Multi-agent Reinforcement Learning Based Cognitive Anti-jamming

Multi-agent Reinforcement Learning Based Cognitive Anti-jamming Multi-agent Reinforcement Learning Based Cognitive Anti-jamming Mohamed A. Aref, Sudharman K. Jayaweera and Stephen Machuzak Communications and Information Sciences Laboratory (CISL) Department of Electrical

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

Accessing the Hidden Available Spectrum in Cognitive Radio Networks under GSM-based Primary Networks

Accessing the Hidden Available Spectrum in Cognitive Radio Networks under GSM-based Primary Networks Accessing the Hidden Available Spectrum in Cognitive Radio Networks under GSM-based Primary Networks Antara Hom Chowdhury, Yi Song, and Chengzong Pang Department of Electrical Engineering and Computer

More information

Spectrum accessing optimization in congestion times in radio cognitive networks based on chaotic neural networks

Spectrum accessing optimization in congestion times in radio cognitive networks based on chaotic neural networks Manuscript Spectrum accessing optimization in congestion times in radio cognitive networks based on chaotic neural networks Mahdi Mir, Department of Electrical Engineering, Ferdowsi University of Mashhad,

More information

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks A new Opportunistic MAC Layer Protocol for Cognitive IEEE 8.11-based Wireless Networks Abderrahim Benslimane,ArshadAli, Abdellatif Kobbane and Tarik Taleb LIA/CERI, University of Avignon, Agroparc BP 18,

More information

Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach

Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach 2010 IEEE 26-th Convention of Electrical and Electronics Engineers in Israel Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach Amir Leshem and

More information

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Xiuying Chen, Tao Jing, Yan Huo, Wei Li 2, Xiuzhen Cheng 2, Tao Chen 3 School of Electronics and Information Engineering,

More information

Performance Analysis of Self-Scheduling Multi-channel Cognitive MAC Protocols under Imperfect Sensing Environment

Performance Analysis of Self-Scheduling Multi-channel Cognitive MAC Protocols under Imperfect Sensing Environment Performance Analysis of Self-Seduling Multi-annel Cognitive MAC Protocols under Imperfect Sensing Environment Mingyu Lee 1, Seyoun Lim 2, Tae-Jin Lee 1 * 1 College of Information and Communication Engineering,

More information

Fast Online Learning of Antijamming and Jamming Strategies

Fast Online Learning of Antijamming and Jamming Strategies Fast Online Learning of Antijamming and Jamming Strategies Y. Gwon, S. Dastangoo, C. Fossa, H. T. Kung December 9, 2015 Presented at the 58 th IEEE Global Communications Conference, San Diego, CA This

More information

Effect of Time Bandwidth Product on Cooperative Communication

Effect of Time Bandwidth Product on Cooperative Communication Surendra Kumar Singh & Rekha Gupta Department of Electronics and communication Engineering, MITS Gwalior E-mail : surendra886@gmail.com, rekha652003@yahoo.com Abstract Cognitive radios are proposed to

More information

Detection of Multiple Selfish Attack Nodes in Cognitive Radio : a Review

Detection of Multiple Selfish Attack Nodes in Cognitive Radio : a Review Detection of Multiple Selfish Attack Nodes in Cognitive Radio : a Review Khyati Patel 1, Aslam Durvesh 2 1 Research Scholar, Electronics & Communication Department, Parul Institute of Engineering & Technology,

More information

Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks

Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks Yee Ming Chen Department of Industrial Engineering and Management Yuan Ze University, Taoyuan Taiwan, Republic of China

More information

Using Channel Hopping to Increase Resilience to Jamming Attacks

Using Channel Hopping to Increase Resilience to Jamming Attacks Using Channel Hopping to Increase 82.11 Resilience to Jamming Attacks Vishnu Navda, Aniruddha Bohra, Samrat Ganguly NEC Laboratories America {vnavda,bohra,samrat}@nec-labs.com Dan Rubenstein Columbia University

More information

A Quality of Service aware Spectrum Decision for Cognitive Radio Networks

A Quality of Service aware Spectrum Decision for Cognitive Radio Networks A Quality of Service aware Spectrum Decision for Cognitive Radio Networks 1 Gagandeep Singh, 2 Kishore V. Krishnan Corresponding author* Kishore V. Krishnan, Assistant Professor (Senior) School of Electronics

More information

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 AN ATTEMPT TO FIND A SOLUTION FOR DESTRUCTING JAMMING PROBLEMS USING GAME THERORITIC ANALYSIS Abstract Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 1 P. G Scholar, E-mail: ghowsegk2326@gmail.com 2 Assistant

More information

FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL

FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL Abhinav Lall 1, O. P. Singh 2, Ashish Dixit 3 1,2,3 Department of Electronics and Communication Engineering, ASET. Amity University Lucknow Campus.(India)

More information

Some Cross-Layer Design and Performance Issues in Cognitive Radio Networks

Some Cross-Layer Design and Performance Issues in Cognitive Radio Networks Some Cross-Layer Design and Performance Issues in Cognitive Radio Networks S.M. Shahrear Tanzil M.A.Sc. Student School of Engineering The University of British Columbia Okanagan Supervisor: Dr. Md. Jahangir

More information

Jamming-Resistant Rate Adaptation in Wi-Fi Networks

Jamming-Resistant Rate Adaptation in Wi-Fi Networks Jamming-Resistant Rate Adaptation in Wi-Fi Networks Cankut Orakcal a,, David Starobinski a a Boston University, Dept. of Electrical and Computer Eng., Boston, MA, USA 02215 Abstract We introduce a theoretical

More information

Learning, prediction and selection algorithms for opportunistic spectrum access

Learning, prediction and selection algorithms for opportunistic spectrum access Learning, prediction and selection algorithms for opportunistic spectrum access TRINITY COLLEGE DUBLIN Hamed Ahmadi Research Fellow, CTVR, Trinity College Dublin Future Cellular, Wireless, Next Generation

More information

An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks

An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks 1 An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University {b989117,

More information

Cooperative Spectrum Sensing in Cognitive Radio

Cooperative Spectrum Sensing in Cognitive Radio Cooperative Spectrum Sensing in Cognitive Radio Project of the Course : Software Defined Radio Isfahan University of Technology Spring 2010 Paria Rezaeinia Zahra Ashouri 1/54 OUTLINE Introduction Cognitive

More information

A Multi-Agent Q-Learning Based Rendezvous Strategy for Cognitive Radios

A Multi-Agent Q-Learning Based Rendezvous Strategy for Cognitive Radios A Multi-Agent Q-Learning Based Rendezvous Strategy for Cognitive Radios 27 Jun 2017 Integrity Service Excellence Clifton Watson Air Force Research Laboratory 1 Outline Introduction Blind Rendezvous Problem

More information

ENERGY EFFICIENT CHANNEL SELECTION FRAMEWORK FOR COGNITIVE RADIO WIRELESS SENSOR NETWORKS

ENERGY EFFICIENT CHANNEL SELECTION FRAMEWORK FOR COGNITIVE RADIO WIRELESS SENSOR NETWORKS ENERGY EFFICIENT CHANNEL SELECTION FRAMEWORK FOR COGNITIVE RADIO WIRELESS SENSOR NETWORKS Joshua Abolarinwa, Nurul Mu azzah Abdul Latiff, Sharifah Kamilah Syed Yusof and Norsheila Fisal Faculty of Electrical

More information

MIMO-aware Cooperative Cognitive Radio Networks. Hang Liu

MIMO-aware Cooperative Cognitive Radio Networks. Hang Liu MIMO-aware Cooperative Cognitive Radio Networks Hang Liu Outline Motivation and Industrial Relevance Project Objectives Approach and Previous Results Future Work Outcome and Impact [2] Motivation & Relevance

More information

Short Paper: On Optimal Sensing and Transmission Strategies for Dynamic Spectrum Access

Short Paper: On Optimal Sensing and Transmission Strategies for Dynamic Spectrum Access Short Paper: On Optimal Sensing and Transmission Strategies for Dynamic Spectrum Access Senhua Huang, Xin Liu, and Zhi Ding University of California Davis Davis, CA 95616, USA Email: senhua@ece.ucdavis.edu

More information

Randomized Channel Hopping Scheme for Anti-Jamming Communication

Randomized Channel Hopping Scheme for Anti-Jamming Communication Randomized Channel Hopping Scheme for Anti-Jamming Communication Eun-Kyu Lee, Soon Y. Oh, and Mario Gerla Computer Science Department University of California at Los Angeles, Los Angeles, CA, USA {eklee,

More information

A Multi Armed Bandit Formulation of Cognitive Spectrum Access

A Multi Armed Bandit Formulation of Cognitive Spectrum Access 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (TO APPEAR) Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks SubodhaGunawardena, Student Member, IEEE, and Weihua Zhuang,

More information

SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE

SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE Int. J. Chem. Sci.: 14(S3), 2016, 794-800 ISSN 0972-768X www.sadgurupublications.com SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE ADITYA SAI *, ARSHEYA AFRAN and PRIYANKA Information

More information

Cognitive Radio Spectrum Access with Prioritized Secondary Users

Cognitive Radio Spectrum Access with Prioritized Secondary Users Appl. Math. Inf. Sci. Vol. 6 No. 2S pp. 595S-601S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. Cognitive Radio Spectrum Access

More information

Adaptive Quorum-based Channel-hopping Distributed Coordination Scheme for Cognitive Radio Networks

Adaptive Quorum-based Channel-hopping Distributed Coordination Scheme for Cognitive Radio Networks Adaptive Quorum-based Channel-hopping Distributed Coordination Scheme for Cognitive Radio Networks Esraa Al Jarrah, Haythem Bany Salameh, Ali Eyadeh Dept. of Telecommunication Engineering, Yarmouk University,

More information

Cognitive Radio Network Setup without a Common Control Channel

Cognitive Radio Network Setup without a Common Control Channel Cognitive Radio Network Setup without a Common Control Channel Yogesh R Kondareddy*, Prathima Agrawal* and Krishna Sivalingam *Electrical and Computer Engineering, Auburn University, E-mail: {kondayr,

More information

Cognitive Ultra Wideband Radio

Cognitive Ultra Wideband Radio Cognitive Ultra Wideband Radio Soodeh Amiri M.S student of the communication engineering The Electrical & Computer Department of Isfahan University of Technology, IUT E-Mail : s.amiridoomari@ec.iut.ac.ir

More information

Power Allocation with Random Removal Scheme in Cognitive Radio System

Power Allocation with Random Removal Scheme in Cognitive Radio System , July 6-8, 2011, London, U.K. Power Allocation with Random Removal Scheme in Cognitive Radio System Deepti Kakkar, Arun khosla and Moin Uddin Abstract--Wireless communication services have been increasing

More information

Distributed and Coordinated Spectrum Access Methods for Heterogeneous Channel Bonding

Distributed and Coordinated Spectrum Access Methods for Heterogeneous Channel Bonding Distributed and Coordinated Spectrum Access Methods for Heterogeneous Channel Bonding 1 Zaheer Khan, Janne Lehtomäki, Simon Scott, Zhu Han, Marwan Krunz, and Alan Marshall Abstract Channel bonding (CB)

More information

ANTI-JAMMING BROADCAST COMMUNICATION USING UNCOORDINATED FREQUENCY HOPPING

ANTI-JAMMING BROADCAST COMMUNICATION USING UNCOORDINATED FREQUENCY HOPPING ANTI-JAMMING BROADCAST COMMUNICATION USING UNCOORDINATED FREQUENCY HOPPING P.MANJULA 1, S.SHARMILA 2 1&2 Assistant Professor, Veltech Multitech Engg College ABSTRACT This paper proposes a technique called

More information

Innovative Science and Technology Publications

Innovative Science and Technology Publications Innovative Science and Technology Publications International Journal of Future Innovative Science and Technology, ISSN: 2454-194X Volume-4, Issue-2, May - 2018 RESOURCE ALLOCATION AND SCHEDULING IN COGNITIVE

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 ISSN Md. Delwar Hossain

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 ISSN Md. Delwar Hossain International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 732 A Neighbor Discovery Approach for Cognitive Radio Network Using intersect Sequence Based Channel Rendezvous

More information

Dynamic Energy Trading for Energy Harvesting Communication Networks: A Stochastic Energy Trading Game

Dynamic Energy Trading for Energy Harvesting Communication Networks: A Stochastic Energy Trading Game 1 Dynamic Energy Trading for Energy Harvesting Communication Networks: A Stochastic Energy Trading Game Yong Xiao, Senior Member, IEEE, Dusit Niyato, Senior Member, IEEE, Zhu Han, Fellow, IEEE, and Luiz

More information

Joint Spectrum and Power Allocation for Inter-Cell Spectrum Sharing in Cognitive Radio Networks

Joint Spectrum and Power Allocation for Inter-Cell Spectrum Sharing in Cognitive Radio Networks Joint Spectrum and Power Allocation for Inter-Cell Spectrum Sharing in Cognitive Radio Networks Won-Yeol Lee and Ian F. Akyildiz Broadband Wireless Networking Laboratory School of Electrical and Computer

More information

Deep Learning for Launching and Mitigating Wireless Jamming Attacks

Deep Learning for Launching and Mitigating Wireless Jamming Attacks Deep Learning for Launching and Mitigating Wireless Jamming Attacks Tugba Erpek, Yalin E. Sagduyu, and Yi Shi arxiv:1807.02567v2 [cs.ni] 13 Dec 2018 Abstract An adversarial machine learning approach is

More information

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE. Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18

More information

Defending DSSS-based Broadcast Communication against Insider Jammers via Delayed Seed-Disclosure

Defending DSSS-based Broadcast Communication against Insider Jammers via Delayed Seed-Disclosure Defending DSSS-based Broadcast Communication against Insider Jammers via Delayed Seed-Disclosure Abstract Spread spectrum techniques such as Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping

More information

Coalition Formation of Vehicular Users for Bandwidth Sharing in Vehicle-to-Roadside Communications

Coalition Formation of Vehicular Users for Bandwidth Sharing in Vehicle-to-Roadside Communications Coalition Formation of Vehicular Users for Bandwidth Sharing in Vehicle-to-Roadside Communications Dusit Niyato, Ping Wang, Walid Saad, and Are Hørungnes School of Computer Engineering, Nanyang Technological

More information

Strategic Surveillance Against Primary User Emulation Attacks in Cognitive Radio Networks

Strategic Surveillance Against Primary User Emulation Attacks in Cognitive Radio Networks Strategic Surveillance Against Primary User Emulation Attacks in Cognitive Radio Networks Duc-Tuyen Ta, Nhan Nguyen-Thanh, Patrick Maillé, Van-Tam Nguyen To cite this version: Duc-Tuyen Ta, Nhan Nguyen-Thanh,

More information

Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks

Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks A. P. Azad and A. Chockalingam Department of ECE, Indian Institute of Science, Bangalore 5612, India Abstract Increasing

More information

Aadptive Subcarrier Allocation for Multiple Cognitive Users over Fading Channels

Aadptive Subcarrier Allocation for Multiple Cognitive Users over Fading Channels Proceedings of the nd International Conference On Systems Engineering and Modeling (ICSEM-3) Aadptive Subcarrier Allocation for Multiple Cognitive Users over Fading Channels XU Xiaorong a HUAG Aiping b

More information

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Walid Saad, Zhu Han, Tamer Basar, Me rouane Debbah, and Are Hjørungnes. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10,

More information