An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks

被引:12
作者
Fang, He [1 ]
Xu, Li [1 ]
Li, Jie [2 ]
Choo, Kim-Kwang Raymond [3 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[2] Univ Tsukuba, Fac Engn Informat & Syst, Tsukuba, Ibaraki 3058573, Japan
[3] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
关键词
Dynamic cooperative cognitive radio networks; Secure Relay Selection; Power control; Stackelberg game; Reinforce learning; POWER-CONTROL;
D O I
10.1016/j.comcom.2016.11.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the potential of cooperative cognitive radio networks (CCRNs) in addressing the spectrum scarcity problem in wireless communication networks, CCRN has become a subject of active research. For example, security and energy efficiency are two salient areas of research in CCRNs. In this paper, we propose a novel adaptive trust-Stackelberg game model designed to (a) improve the energy efficiency and (b) defend against insider attacks in CCRNs. More specifically, the distributed learning algorithm (DLA) for the relays in our model, inspired by the stochastic learning automata, allows the system to achieve Stackelberg equilibrium in the proposed game; and the trust evolution based on evolutionary stable strategy algorithm (TEEA) allows the primary user to defend against insider attacks efficiently and adaptively adjust the trust evolution in dynamic CCRNs. We demonstrate the utility of the proposed model comparing with other models using a numerical investigation. The numerical results show that the proposed model can improve the performance in energy efficiency and defending against insider attacks with an appropriate cooperation between primary users and relays. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:124 / 132
页数:9
相关论文
共 33 条
[1]  
[Anonymous], 2011, Phys. Commun.
[2]   A novel protocol for transparent and simultaneous spectrum access between the secondary user and the primary user in cognitive radio networks [J].
Backens, Jonathan ;
Xin, Chunsheng ;
Song, Min .
COMPUTER COMMUNICATIONS, 2015, 69 :98-106
[3]   Security Games for Node Localization through Verifiable Multilateration [J].
Basilico, Nicola ;
Gatti, Nicola ;
Monga, Mattia ;
Sicari, Sabrina .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (01) :72-85
[4]   Vulnerabilities in cognitive radio networks: A survey [J].
Bhattacharjee, Shameek ;
Sengupta, Shamik ;
Chatterjee, Mainak .
COMPUTER COMMUNICATIONS, 2013, 36 (13) :1387-1398
[5]   Power Allocation and Pricing in Multiuser Relay Networks Using Stackelberg and Bargaining Games [J].
Cao, Qian ;
Zhao, H. Vicky ;
Jing, Yindi .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2012, 61 (07) :3177-3190
[6]   Modeling online social network users' profile attribute disclosure behavior from a game theoretic perspective [J].
Chen, Jundong ;
Kiremire, Ankunda R. ;
Brust, Matthias R. ;
Phoha, Vir V. .
COMPUTER COMMUNICATIONS, 2014, 49 :18-32
[7]   Evolutionarily Stable Spectrum Access [J].
Chen, Xu ;
Huang, Jianwei .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (07) :1281-1293
[8]   Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs [J].
Eiza, Mahmoud Hashem ;
Owens, Thomas ;
Ni, Qiang .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (01) :32-45
[9]   A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks [J].
Guo, Linke ;
Zhang, Chi ;
Fang, Yuguang .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (04) :413-427
[10]   Efficient certificateless web-of-trust model for public-key authentication in MANET [J].
Hamouid, Khaled ;
Adi, Kamel .
COMPUTER COMMUNICATIONS, 2015, 63 :24-39