Multiple Jammer Attacks on Cognitive Radio Networks over Noisy Channels: A Strategic Game with Incomplete Information

被引:0
作者
Deepak, B. R. [1 ]
Kumar, Dhananjay [1 ]
机构
[1] Anna Univ, Madras Inst Technol, Dept Informat Technol, Chennai 600044, India
关键词
Anti-jamming; Cognitive radio; Game theory; Multiple jammer; Perfect bayesian equilibrium; Perfect hidden markov-viterbi equilibrium; WIRELESS NETWORKS;
D O I
10.14429/dsj.74.19808
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
We model the anti-jamming system for cognitive radio networks under multiple jammer attacks using game theory as incomplete information games. The game model has three players: nature (representing channel impairment), jammer, and cognitive radio with sequential moves. Typically, sequential games with incomplete information use the Perfect Bayesian equilibrium solution concept, where beliefs are determined by Bayes' rule to identify the player type. In the proposed Perfect Hidden Markov -Viterbi equilibrium solution concept, beliefs are determined by the Hidden Markov Model - Viterbi decoding instead of Bayes' rule to identify the jammer type. A general form of expression is derived to compute players' payoff for probability-based belief systems to find equilibrium in anti-jamming games with incomplete information under multiple jammer attacks.The simulation results show that over time, with a gradual reduction in the bit error rate at the receiver without any channel coding for Binary Phase Shift Keying (BPSK) modulation and in the noisy Rayleigh fading environment, the proposed Perfect Hidden Markov - Viterbi equilibrium solution concept performs better than Perfect Bayesian equilibriumby 0.8 % and the traditional pseudorandom-based frequency hopping technique by 1 % in terms of the average uncoded bit error rate.
引用
收藏
页码:911 / 920
页数:10
相关论文
共 21 条
[1]  
Bengio Y., 1999, Neural Computing Surveys, V2
[2]  
Biglieri E., 2013, Principles of Cognitive Radio
[3]  
Deepak BR, 2017, 2017 FOURTH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN)
[4]   Implementation and Evaluation of a Smart Uplink Jamming Attack in a Public 5G Network [J].
Flores, Maya E. ;
Poisson, Devon D. ;
Stevens, Colin J. ;
Nieves, Adriyel V. ;
Wyglinski, Alexander M. .
IEEE ACCESS, 2023, 11 :75993-76007
[5]   PERFECT BAYESIAN EQUILIBRIUM AND SEQUENTIAL EQUILIBRIUM [J].
FUDENBERG, D ;
TIROLE, J .
JOURNAL OF ECONOMIC THEORY, 1991, 53 (02) :236-260
[6]   A Multi-Jammer Power Control Game [J].
Garnaev, Andrey ;
Petropulu, Athina ;
Trappe, Wade ;
Poor, H. Vincent .
IEEE COMMUNICATIONS LETTERS, 2021, 25 (09) :3031-3035
[7]   A Multi-Jammer Game With Latency as the User's Communication Utility [J].
Garnaev, Andrey ;
Petropulu, Athina ;
Trappe, Wade ;
Poor, H. Vincent .
IEEE COMMUNICATIONS LETTERS, 2020, 24 (09) :1899-1903
[8]  
Garnaev A, 2019, INT CONF ACOUST SPEE, P2447, DOI 10.1109/ICASSP.2019.8682457
[9]   Jamming and anti-jamming techniques in wireless networks: a survey [J].
Grover, Kanika ;
Lim, Alvin ;
Yang, Qing .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2014, 17 (04) :197-215
[10]  
Gupta S.C., 2002, Fundamentals of mathematical statistics: A modern approach, V4