2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR) 2012
DOI: 10.1109/acssc.2012.6489252
|View full text |Cite
|
Sign up to set email alerts
|

Multiple access game with a cognitive jammer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…This has motivated extensive research on jamming in CNRs [1]- [5]. Further, as both the cognitive radio enabled secondary users and jammers have autonomy and flexible control over their unlicensed band transmissions, game theory has emerged as a powerful tool to investigate anti-jamming radio communications [6]- [8].…”
Section: Introductionmentioning
confidence: 99%
“…This has motivated extensive research on jamming in CNRs [1]- [5]. Further, as both the cognitive radio enabled secondary users and jammers have autonomy and flexible control over their unlicensed band transmissions, game theory has emerged as a powerful tool to investigate anti-jamming radio communications [6]- [8].…”
Section: Introductionmentioning
confidence: 99%
“…This has motivated extensive research studies on jamming [1]- [5]. Further, as both secondary users and jammers have autonomy and flexible control over their unlicensed band transmissions, game theory has emerged as a powerful tool to investigate anti-jamming radio communications [6]- [8].…”
Section: Introductionmentioning
confidence: 99%
“…The eavesdropper secondary users (ESUs) threaten the primary system by eavesdropping primary traffic when it is not granted spectrum access to communicate with the primary station (PS). A unique type of security attack, Threaten to access in CRN was recently introduced in [4].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, helps the PS to characterize the optimal ESU spectrum access rule to improve secure rate of the PU. The use of reverse Stackelberg game improves the interaction between PUs and ESUs, so it acts as a bridge between coordination model considered in [4] and conventional CRN models [8]. This method changes in the process to authenticate ESU and selection criteria for ESU at the PS.…”
Section: Introductionmentioning
confidence: 99%