A game-theoretic view on the physical layer security of cognitive radio networks

Ali Houjeij, Walid Saad, Tamer Bascar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Abstract

In this paper, we investigate the problem of secure communication between secondary users (SUs) and their serving base station in the presence of multiple eavesdroppers and multiple primary users. We analyze the interactions between the SUs and eavesdroppers using the framework of noncooperative game theory. To solve the formulated game, we propose a novel secure channel selection algorithm that enables the SUs and eavesdroppers to take distributed decisions so as to reach a Nash equilibrium point. We study and analyze several properties of the equilibrium resulting from the proposed algorithm. Simulation results show that the proposed approach yields significant improvements of at least 32.7%, in terms of the average secrecy rate per SU, relative to a classical spectrum sharing scheme. Moreover, the results show that the proposed scheme enables the SUs to reach Nash equilibrium with up to 86.5% less computation than standard learning algorithms.

Original languageEnglish (US)
Title of host publication2013 IEEE International Conference on Communications, ICC 2013
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2095-2099
Number of pages5
ISBN (Print)9781467331227
DOIs
StatePublished - Jan 1 2013
Event2013 IEEE International Conference on Communications, ICC 2013 - Budapest, Hungary
Duration: Jun 9 2013Jun 13 2013

Publication series

NameIEEE International Conference on Communications
ISSN (Print)1550-3607

Other

Other2013 IEEE International Conference on Communications, ICC 2013
CountryHungary
CityBudapest
Period6/9/136/13/13

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'A game-theoretic view on the physical layer security of cognitive radio networks'. Together they form a unique fingerprint.

  • Cite this

    Houjeij, A., Saad, W., & Bascar, T. (2013). A game-theoretic view on the physical layer security of cognitive radio networks. In 2013 IEEE International Conference on Communications, ICC 2013 (pp. 2095-2099). [6654835] (IEEE International Conference on Communications). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICC.2013.6654835