Evading eavesdroppers in adversarial cognitive radio networks

Ali Houjeij, Walid Saad, Tamer Basar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

In this paper, we investigate the problem of secure communications between a number of secondary users (SUs) transmitting data to a common base station in the presence of primary users (PUs) and eavesdroppers in a cognitive radio network. The SUs aim at mitigating the effect of eavesdropping by changing their positions using only partial information about the locations of the eavesdroppers. Accordingly, for each SU, we propose an appropriate utility function and then maximize the social welfare of all SUs without interfering with the PUs' radio receivers and taking into account the interference thresholds set by the PUs on each channel. Given these constraints, we formulate the problem so as to optimize the social welfare of all SUs. Depending on the possible communication links and the available information, we propose three different algorithms to solve the proposed constrained optimization: first we solve the problem centrally at the BS, second we propose a decentralized game theoretic approach, and third we consider a Lagrangian-heuristic based algorithm. Simulation results show that the proposed decentralized algorithms can achieve high near-optimal performances.

Original languageEnglish (US)
Title of host publication2013 IEEE Global Communications Conference, GLOBECOM 2013
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages611-616
Number of pages6
ISBN (Print)9781479913534
DOIs
StatePublished - Jan 1 2013
Event2013 IEEE Global Communications Conference, GLOBECOM 2013 - Atlanta, GA, United States
Duration: Dec 9 2013Dec 13 2013

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Other

Other2013 IEEE Global Communications Conference, GLOBECOM 2013
CountryUnited States
CityAtlanta, GA
Period12/9/1312/13/13

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Evading eavesdroppers in adversarial cognitive radio networks'. Together they form a unique fingerprint.

  • Cite this

    Houjeij, A., Saad, W., & Basar, T. (2013). Evading eavesdroppers in adversarial cognitive radio networks. In 2013 IEEE Global Communications Conference, GLOBECOM 2013 (pp. 611-616). [6831139] (GLOBECOM - IEEE Global Telecommunications Conference). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/GLOCOM.2013.6831139