2014 IEEE Global Communications Conference 2014
DOI: 10.1109/glocom.2014.7036897
|View full text |Cite
|
Sign up to set email alerts
|

Prospect theoretic analysis of anti-jamming communications in cognitive radio networks

Abstract: An anti-jamming communication game between a cognitive radio enabled secondary user (SU) and a cognitive radio enabled jammer is considered, in which end-user decision making is modeled using prospect theory (PT). More specifically, the interactions between a user and a smart jammer (i.e., their respective choices of transmission probability) are formulated as a game under the assumption that end-user decision making under uncertainty does not follow the traditional objective assumptions stipulated by expected… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
26
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 38 publications
(26 citation statements)
references
References 27 publications
0
26
0
Order By: Relevance
“…Problems related to spectrum scanning have been presented in [31,32], where the objective is to develop spectrum-scanning strategies that support the detection of a user illicitly using spectrum, and [33] for detecting attacks aimed at reducing the size of spectrum opportunities in a dynamic spectrum-sharing problem. [34] studied the interactions between a user and a smart jammer regarding their respective choices of transmit power in a general wireless setting, while [35,36] considered problems related to game theory and network security, While these references are not directly relevant to the spectrum allocation problem explored in this paper, these references help motivate the work that we present in this paper.…”
Section: Introductionmentioning
confidence: 94%
“…Problems related to spectrum scanning have been presented in [31,32], where the objective is to develop spectrum-scanning strategies that support the detection of a user illicitly using spectrum, and [33] for detecting attacks aimed at reducing the size of spectrum opportunities in a dynamic spectrum-sharing problem. [34] studied the interactions between a user and a smart jammer regarding their respective choices of transmit power in a general wireless setting, while [35,36] considered problems related to game theory and network security, While these references are not directly relevant to the spectrum allocation problem explored in this paper, these references help motivate the work that we present in this paper.…”
Section: Introductionmentioning
confidence: 94%
“…From (11), U j (Ps , Pr , P j ) is a concave function with re spect to p.. By setting (10) to 0, we can obtain P j =…”
Section: A Optimal Jamming Strategymentioning
confidence: 99%
“…For example, in [10], the wireless security problem was formulated as an indirect reciprocity game, where nodes applies the indirect reciprocity principle to suppress attacks in wireless networks. Assuming that end-user decision making is under uncertainty, the interactions between a user and a smart jammer were modeled as a game by using prospect theory in [11]. In addition, Yang et al studied power control problem with a smart jammer with a Stackelberg game in [12] and [13].…”
mentioning
confidence: 99%
“…The authors investigate equilibrium points in the form of pure strategies [16]- [20] as well as mixed strategies [21], [22] and examine optimal power allocations that maximize the utility functions defined. Under the assumption of full knowledge of the system, the authors in [16] formulate a zero-sum power allocation game between a transmitter and a jammer and prove the existence of pure strategy Nash Equilibrium (NE) points and characterize them in the form of optimized secrecy capacity in the presence of a passive eavesdropper.…”
Section: A Related Workmentioning
confidence: 99%