Performance Analysis of Wireless Energy Harvesting Cognitive Radio Networks under Smart Jamming Attacks

被引:37
作者
Hoang, Dinh Thai [1 ]
Niyato, Dusit [1 ]
Wang, Ping [1 ]
Kim, Dong In [2 ]
机构
[1] School of Computer Engineering, Nanyang Technological University
[2] School of Information and Communication Engineering, Sungkyunkwan University, Suwon
关键词
Cognitive radio; deception strategy; jamming attack; wireless energy harvesting;
D O I
10.1109/TCCN.2015.2488620
中图分类号
学科分类号
摘要
In cognitive radio networks with wireless energy harvesting, secondary users are able to harvest energy from a wireless power source and then use the harvested energy to transmit data opportunistically on an idle channel allocated to primary users. Such networks have become more common due to pervasiveness of wireless charging, improving the performance of the secondary users. However, in such networks, the secondary users can be vulnerable to jamming attacks by malicious users who can also harvest wireless energy to launch the attacks. In this paper, we first formulate the throughput optimization problem for a secondary user under the attacks by jammers as a Markov decision process (MDP). We then introduce a new solution based on the deception tactic to deal with smart jamming attacks. Furthermore, we propose a learning algorithm for the secondary user to find an optimal transmission policy and extend to the case with multiple secondary users in the same environment. Through the simulations, we demonstrate that the proposed learning algorithms can effectively reduce adverse effects from smart jammers even when they use different attack strategies. © 2015 IEEE.
引用
收藏
页码:200 / 216
页数:16
相关论文
共 37 条
[1]  
Hossain E., Niyato D., Han Z., Dynamic Spectrum Access and Management in Cognitive Radio Networks, (2009)
[2]  
Liu Y., Ning P., Dai H., Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures, Proc. IEEE Symp. Secur. Privacy, pp. 286-301, (2010)
[3]  
Pu D., Primary User Emulation Detection in Cognitive Radio Networks, (2013)
[4]  
Chen R., Park J.-M., Reed J.H., Defense against primary users emulation attacks in cognitive radio networks, IEEE J. Sel. Areas Commun., 26, 1, pp. 25-37, (2008)
[5]  
Sultan A., Sensing and transmit energy optimization for an energy harvesting cognitive radio, IEEE Wireless Commun. Lett., 1, 5, pp. 500-503, (2012)
[6]  
Gao X., Xu W., Li S., Lin J., An online energy allocation strategy for energy harvesting cognitive radio systems, Proc. Int. Conf. Wireless Commun. Signal Process., pp. 1-5, (2013)
[7]  
Park S., Kim H., Hong D., Cognitive radio networks with energy harvesting, IEEE Trans. Wireless Commun., 12, 3, pp. 1386-1397, (2013)
[8]  
Zhang Q., Cao B., Wang Y., Zhang N., Lin X., Sun L., On exploiting polarization for energy-harvesting enabled cooperative cognitive radio networking, IEEE Wireless Commun., 20, 4, pp. 116-124, (2013)
[9]  
Park S., Heo J., Kim B., Chung W., Optimal mode selection for cognitive radio sensor networks with RF energy harvesting, Proc. IEEE Int. Symp. Pers. Indoor Mobile Radio Commun., pp. 2155-2159, (2012)
[10]  
Park S., Hong D., Optimal spectrum access for energy harvesting cognitive radio networks, IEEE Trans. Wireless Commun., 12, 12, pp. 6166-6179, (2013)