An Information Secrecy Game in Cognitive Radio Networks

被引:81
作者
Wu, Yongle [1 ]
Liu, K. J. Ray [2 ]
机构
[1] Qualcomm Inc, San Diego, CA 92121 USA
[2] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
关键词
Cognitive radio; equilibrium analysis; information-theoretic secrecy; protection against eavesdropping; Stackelberg game; BROADCAST CHANNELS; INTERFERENCE; CAPACITY;
D O I
10.1109/TIFS.2011.2144585
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Although cognitive radio technology improves efficiency of spectrum utilization, primary users usually do not gain from opening up the spectrum in the opportunistic spectrum access, and sometimes even suffer from collisions due to secondary users' imperfect spectrum sensing. However, in this paper, we show that if information secrecy is a concern, primary users could actually be better off by allowing secondary users to cooperatively share the spectrum. Specifically, we propose a new cooperation paradigm in cognitive radio networks that primary users improve secrecy with the help of trustworthy secondary users, in the presence of an intelligent and passive eavesdropper attempting to decode primary users' messages. After deriving the achievable pair of primary users' secrecy rate and secondary users' transmission rate under various circumstances, we model the interaction between primary users and secondary users as a Stackelberg game in which transmission power levels are the key to maximize data rates. Moreover, based on a 2-D representation of how achievable rates depend on power-level regions, we apply equilibrium analysis to understand the optimal strategy of primary and secondary users. Finally, simulation results are presented to verify the performance.
引用
收藏
页码:831 / 842
页数:12
相关论文
共 26 条
  • [1] [Anonymous], 2006, Elements of Information Theory
  • [2] [Anonymous], 2000, PhD thesis,
  • [3] BERRY R, 2008, P 2008 IEEE ISIT JUL, P2518
  • [4] Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: a multi-dimensional analysis and assessment
    Brown, Timothy X.
    Sethi, Amita
    [J]. MOBILE NETWORKS & APPLICATIONS, 2008, 13 (05) : 516 - 532
  • [5] Defense against primary user emulation attacks in cognitive radio networks
    Chen, Ruiliang
    Park, Jung-Min
    Reed, Jeffrey H.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) : 25 - 37
  • [6] CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
  • [7] Fudenberg D., 1993, GAME THEORY
  • [8] GARNAEV A, 2009, P SEC PRIV COMM NETW, V19, P142
  • [9] Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective
    Goldsmith, Andrea
    Jafar, Syed Ali
    Maric, Ivana
    Srinivasa, Sudhir
    [J]. PROCEEDINGS OF THE IEEE, 2009, 97 (05) : 894 - 914
  • [10] On the secrecy capacity of fading channels
    Gopala, Praveen Kumar
    Lai, Lifeng
    El Gamal, Hesham
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (10) : 4687 - 4698