Evading eavesdroppers in adversarial cognitive radio networks

Ali Houjeij, Walid Saad, Tamer Basar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In this paper, we investigate the problem of secure communications between a number of secondary users (SUs) transmitting data to a common base station in the presence of primary users (PUs) and eavesdroppers in a cognitive radio network. The SUs aim at mitigating the effect of eavesdropping by changing their positions using only partial information about the locations of the eavesdroppers. Accordingly, for each SU, we propose an appropriate utility function and then maximize the social welfare of all SUs without interfering with the PUs' radio receivers and taking into account the interference thresholds set by the PUs on each channel. Given these constraints, we formulate the problem so as to optimize the social welfare of all SUs. Depending on the possible communication links and the available information, we propose three different algorithms to solve the proposed constrained optimization: first we solve the problem centrally at the BS, second we propose a decentralized game theoretic approach, and third we consider a Lagrangian-heuristic based algorithm. Simulation results show that the proposed decentralized algorithms can achieve high near-optimal performances.

Original languageEnglish
Title of host publicationGLOBECOM - IEEE Global Telecommunications Conference
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages611-616
Number of pages6
ISBN (Print)9781479913534
DOIs
StatePublished - Jan 1 2013
Event2013 IEEE Global Communications Conference, GLOBECOM 2013 - Atlanta, GA, United States
Duration: Dec 9 2013Dec 13 2013

Other

Other2013 IEEE Global Communications Conference, GLOBECOM 2013
CountryUnited States
CityAtlanta, GA
Period12/9/1312/13/13

Fingerprint

Cognitive radio
Radio receivers
Constrained optimization
Base stations
Telecommunication links

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

Houjeij, A., Saad, W., & Basar, T. (2013). Evading eavesdroppers in adversarial cognitive radio networks. In GLOBECOM - IEEE Global Telecommunications Conference (pp. 611-616). [6831139] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/GLOCOM.2013.6831139

Evading eavesdroppers in adversarial cognitive radio networks. / Houjeij, Ali; Saad, Walid; Basar, Tamer.

GLOBECOM - IEEE Global Telecommunications Conference. Institute of Electrical and Electronics Engineers Inc., 2013. p. 611-616 6831139.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Houjeij, A, Saad, W & Basar, T 2013, Evading eavesdroppers in adversarial cognitive radio networks. in GLOBECOM - IEEE Global Telecommunications Conference., 6831139, Institute of Electrical and Electronics Engineers Inc., pp. 611-616, 2013 IEEE Global Communications Conference, GLOBECOM 2013, Atlanta, GA, United States, 12/9/13. https://doi.org/10.1109/GLOCOM.2013.6831139
Houjeij A, Saad W, Basar T. Evading eavesdroppers in adversarial cognitive radio networks. In GLOBECOM - IEEE Global Telecommunications Conference. Institute of Electrical and Electronics Engineers Inc. 2013. p. 611-616. 6831139 https://doi.org/10.1109/GLOCOM.2013.6831139
Houjeij, Ali ; Saad, Walid ; Basar, Tamer. / Evading eavesdroppers in adversarial cognitive radio networks. GLOBECOM - IEEE Global Telecommunications Conference. Institute of Electrical and Electronics Engineers Inc., 2013. pp. 611-616
@inproceedings{244de5b7dfab4369aa766c6ac4d5ef10,
title = "Evading eavesdroppers in adversarial cognitive radio networks",
abstract = "In this paper, we investigate the problem of secure communications between a number of secondary users (SUs) transmitting data to a common base station in the presence of primary users (PUs) and eavesdroppers in a cognitive radio network. The SUs aim at mitigating the effect of eavesdropping by changing their positions using only partial information about the locations of the eavesdroppers. Accordingly, for each SU, we propose an appropriate utility function and then maximize the social welfare of all SUs without interfering with the PUs' radio receivers and taking into account the interference thresholds set by the PUs on each channel. Given these constraints, we formulate the problem so as to optimize the social welfare of all SUs. Depending on the possible communication links and the available information, we propose three different algorithms to solve the proposed constrained optimization: first we solve the problem centrally at the BS, second we propose a decentralized game theoretic approach, and third we consider a Lagrangian-heuristic based algorithm. Simulation results show that the proposed decentralized algorithms can achieve high near-optimal performances.",
author = "Ali Houjeij and Walid Saad and Tamer Basar",
year = "2013",
month = "1",
day = "1",
doi = "10.1109/GLOCOM.2013.6831139",
language = "English",
isbn = "9781479913534",
pages = "611--616",
booktitle = "GLOBECOM - IEEE Global Telecommunications Conference",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Evading eavesdroppers in adversarial cognitive radio networks

AU - Houjeij, Ali

AU - Saad, Walid

AU - Basar, Tamer

PY - 2013/1/1

Y1 - 2013/1/1

N2 - In this paper, we investigate the problem of secure communications between a number of secondary users (SUs) transmitting data to a common base station in the presence of primary users (PUs) and eavesdroppers in a cognitive radio network. The SUs aim at mitigating the effect of eavesdropping by changing their positions using only partial information about the locations of the eavesdroppers. Accordingly, for each SU, we propose an appropriate utility function and then maximize the social welfare of all SUs without interfering with the PUs' radio receivers and taking into account the interference thresholds set by the PUs on each channel. Given these constraints, we formulate the problem so as to optimize the social welfare of all SUs. Depending on the possible communication links and the available information, we propose three different algorithms to solve the proposed constrained optimization: first we solve the problem centrally at the BS, second we propose a decentralized game theoretic approach, and third we consider a Lagrangian-heuristic based algorithm. Simulation results show that the proposed decentralized algorithms can achieve high near-optimal performances.

AB - In this paper, we investigate the problem of secure communications between a number of secondary users (SUs) transmitting data to a common base station in the presence of primary users (PUs) and eavesdroppers in a cognitive radio network. The SUs aim at mitigating the effect of eavesdropping by changing their positions using only partial information about the locations of the eavesdroppers. Accordingly, for each SU, we propose an appropriate utility function and then maximize the social welfare of all SUs without interfering with the PUs' radio receivers and taking into account the interference thresholds set by the PUs on each channel. Given these constraints, we formulate the problem so as to optimize the social welfare of all SUs. Depending on the possible communication links and the available information, we propose three different algorithms to solve the proposed constrained optimization: first we solve the problem centrally at the BS, second we propose a decentralized game theoretic approach, and third we consider a Lagrangian-heuristic based algorithm. Simulation results show that the proposed decentralized algorithms can achieve high near-optimal performances.

UR - http://www.scopus.com/inward/record.url?scp=84904136158&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84904136158&partnerID=8YFLogxK

U2 - 10.1109/GLOCOM.2013.6831139

DO - 10.1109/GLOCOM.2013.6831139

M3 - Conference contribution

SN - 9781479913534

SP - 611

EP - 616

BT - GLOBECOM - IEEE Global Telecommunications Conference

PB - Institute of Electrical and Electronics Engineers Inc.

ER -