An Anti-Jamming Stochastic Game for Cognitive Radio Networks

被引:226
作者
Wang, Beibei [1 ]
Wu, Yongle
Liu, K. J. Ray [2 ]
Clancy, T. Charles [3 ]
机构
[1] Qualcomm Inc, Corp Res & Dev, San Diego, CA 92121 USA
[2] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[3] Virginia Tech Hume Ctr Natl Secur & Technol, Alexandria, VA 22314 USA
关键词
Security mechanism; spectrum management; cognitive radio networks; game theory; reinforcement learning; SPECTRUM ACCESS; INTERFERENCE; SERVICE;
D O I
10.1109/JSAC.2011.110418
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Various spectrum management schemes have been proposed in recent years to improve the spectrum utilization in cognitive radio networks. However, few of them have considered the existence of cognitive attackers who can adapt their attacking strategy to the time-varying spectrum environment and the secondary users' strategy. In this paper, we investigate the security mechanism when secondary users are facing the jamming attack, and propose a stochastic game framework for anti-jamming defense. At each stage of the game, secondary users observe the spectrum availability, the channel quality, and the attackers' strategy from the status of jammed channels. According to this observation, they will decide how many channels they should reserve for transmitting control and data messages and how to switch between the different channels. Using the minimax-Q learning, secondary users can gradually learn the optimal policy, which maximizes the expected sum of discounted payoffs defined as the spectrum-efficient throughput. The proposed stationary policy in the anti-jamming game is shown to achieve much better performance than the policy obtained from myopic learning, which only maximizes each stage's payoff, and a random defense strategy, since it successfully accommodates the environment dynamics and the strategic behavior of the cognitive attackers.
引用
收藏
页码:877 / 889
页数:13
相关论文
共 39 条
[1]  
[Anonymous], 2004, Proceedings of the 23rd annual ACM symposium on Principles of distributed computing, PODC '04, DOI [10.1145/1011767.1011783., DOI 10.1145/1011767.1011783]
[2]  
[Anonymous], 2002, Wireless Communications: Principles and Practice
[3]  
[Anonymous], P IEEE SECON 06 SEP
[4]  
[Anonymous], 2008, 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications. CrownCom 2008
[5]  
[Anonymous], 2000, PhD thesis,
[6]   Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: a multi-dimensional analysis and assessment [J].
Brown, Timothy X. ;
Sethi, Amita .
MOBILE NETWORKS & APPLICATIONS, 2008, 13 (05) :516-532
[7]  
Chan Agnes., 2007, P ISIT
[8]  
Chen RL, 2008, IEEE INFOCOM SER, P31
[9]   Defense against primary user emulation attacks in cognitive radio networks [J].
Chen, Ruiliang ;
Park, Jung-Min ;
Reed, Jeffrey H. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) :25-37
[10]  
Filar J., 1997, Competitive Markov Decision Processes