Evading eavesdroppers in adversarial cognitive radio networks

Ali Houjeij, Walid Saad, Tamer Basar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations


In this paper, we investigate the problem of secure communications between a number of secondary users (SUs) transmitting data to a common base station in the presence of primary users (PUs) and eavesdroppers in a cognitive radio network. The SUs aim at mitigating the effect of eavesdropping by changing their positions using only partial information about the locations of the eavesdroppers. Accordingly, for each SU, we propose an appropriate utility function and then maximize the social welfare of all SUs without interfering with the PUs' radio receivers and taking into account the interference thresholds set by the PUs on each channel. Given these constraints, we formulate the problem so as to optimize the social welfare of all SUs. Depending on the possible communication links and the available information, we propose three different algorithms to solve the proposed constrained optimization: first we solve the problem centrally at the BS, second we propose a decentralized game theoretic approach, and third we consider a Lagrangian-heuristic based algorithm. Simulation results show that the proposed decentralized algorithms can achieve high near-optimal performances.

Original languageEnglish (US)
Title of host publication2013 IEEE Global Communications Conference, GLOBECOM 2013
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages6
ISBN (Print)9781479913534
StatePublished - 2013
Event2013 IEEE Global Communications Conference, GLOBECOM 2013 - Atlanta, GA, United States
Duration: Dec 9 2013Dec 13 2013

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference


Other2013 IEEE Global Communications Conference, GLOBECOM 2013
Country/TerritoryUnited States
CityAtlanta, GA

ASJC Scopus subject areas

  • Electrical and Electronic Engineering


Dive into the research topics of 'Evading eavesdroppers in adversarial cognitive radio networks'. Together they form a unique fingerprint.

Cite this