2011
DOI: 10.1109/tifs.2011.2144585
|View full text |Cite
|
Sign up to set email alerts
|

An Information Secrecy Game in Cognitive Radio Networks

Abstract: Abstract-Although cognitive radio technology improves efficiency of spectrum utilization, primary users usually do not gain from opening up the spectrum in the opportunistic spectrum access, and sometimes even suffer from collisions due to secondary users' imperfect spectrum sensing. However, in this paper, we show that if information secrecy is a concern, primary users could actually be better off by allowing secondary users to cooperatively share the spectrum. Specifically, we propose a new cooperation parad… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 91 publications
(12 citation statements)
references
References 24 publications
0
12
0
Order By: Relevance
“…However, it appears that we only need N = 3 CJs in our case, when the SNR used is 10 dBm. We can also see from Figure 6 that our proposed algorithms outperform the baseline Stackelberg in [46] and the power control algorithm in [48]. The optimized α * and β * chosen by the source, as well as the average optimized CJ power of all N CJs given by P * CJ = 1 N ∑ N i P * CJ i , are shown in Figures 6 and 7.…”
Section: Resultsmentioning
confidence: 76%
See 3 more Smart Citations
“…However, it appears that we only need N = 3 CJs in our case, when the SNR used is 10 dBm. We can also see from Figure 6 that our proposed algorithms outperform the baseline Stackelberg in [46] and the power control algorithm in [48]. The optimized α * and β * chosen by the source, as well as the average optimized CJ power of all N CJs given by P * CJ = 1 N ∑ N i P * CJ i , are shown in Figures 6 and 7.…”
Section: Resultsmentioning
confidence: 76%
“…Our second set of simulations explores the effect of increasing the number of CJs, i.e., N, when both the Stackelberg game and power control game were invoked for optimal performance. We compare our results with the baseline Stackelberg and the power-controlbased algorithms in [46,48]. The optimum values of α and β are determined by the source, while the optimum jammer power values are determined by the jammer, as seen in the Stackelberg leader-follower game in Figure 3.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…A Stackelberg game is investigated to reflect interactions between the source that pays jammers for their interference and jammers who charge the source with a certain price for the jamming. Different from [21], a Stackelberg game [18] between primary users and secondary users in cognitive radio networks is modeled to maximize transmission rates of secondary users. Consequently, primary users’ secrecy rates are improved with the help of trustworthy secondary users.…”
Section: Introductionmentioning
confidence: 99%