Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack Example
In cognitive radio networks, an adversary transmits signals with characteristics that emulate those of primary users to prevent secondary users from transmitting. Such an attack is called a primary user emulation (PUE) attack. In this paper, a game theoretical framework is proposed to study the prim...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8252692/ |
id |
doaj-b381202a9ac94cbf83f56c4b82c1b01c |
---|---|
record_format |
Article |
spelling |
doaj-b381202a9ac94cbf83f56c4b82c1b01c2021-03-29T20:29:20ZengIEEEIEEE Access2169-35362018-01-0165402541410.1109/ACCESS.2018.27915198252692Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack ExampleIoanna Kakalou0https://orcid.org/0000-0002-9807-8759Kostas E. Psannis1https://orcid.org/0000-0003-0020-6394Department of Applied Informatics, University of Macedonia, Thessaloniki, GreeceDepartment of Applied Informatics, University of Macedonia, Thessaloniki, GreeceIn cognitive radio networks, an adversary transmits signals with characteristics that emulate those of primary users to prevent secondary users from transmitting. Such an attack is called a primary user emulation (PUE) attack. In this paper, a game theoretical framework is proposed to study the primary user emulation attack (PUEA) on cognitive radio nodes as a game of imperfect information between the secondary users (SUs), who do not exchange game information between them against the adversaries generating the PUEA and to define optimal strategies with minor computational demands. When the SU challenges the PU emulator successfully, updating the information on a cloud-based database enables the rest of the network to know the identity of PUE. As the game evolves, the grand coalition of the secondary users acts as the one without collaboration against the PU emulator playing a winning strategy. The performance of the game for optimal strategies is equal to the performance of the collaborative methods for PUEA detection.https://ieeexplore.ieee.org/document/8252692/PUE attackimperfect gamecognitive radiocloud computing |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ioanna Kakalou Kostas E. Psannis |
spellingShingle |
Ioanna Kakalou Kostas E. Psannis Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack Example IEEE Access PUE attack imperfect game cognitive radio cloud computing |
author_facet |
Ioanna Kakalou Kostas E. Psannis |
author_sort |
Ioanna Kakalou |
title |
Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack Example |
title_short |
Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack Example |
title_full |
Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack Example |
title_fullStr |
Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack Example |
title_full_unstemmed |
Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack Example |
title_sort |
coordination without collaboration in imperfect games: the primary user emulation attack example |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2018-01-01 |
description |
In cognitive radio networks, an adversary transmits signals with characteristics that emulate those of primary users to prevent secondary users from transmitting. Such an attack is called a primary user emulation (PUE) attack. In this paper, a game theoretical framework is proposed to study the primary user emulation attack (PUEA) on cognitive radio nodes as a game of imperfect information between the secondary users (SUs), who do not exchange game information between them against the adversaries generating the PUEA and to define optimal strategies with minor computational demands. When the SU challenges the PU emulator successfully, updating the information on a cloud-based database enables the rest of the network to know the identity of PUE. As the game evolves, the grand coalition of the secondary users acts as the one without collaboration against the PU emulator playing a winning strategy. The performance of the game for optimal strategies is equal to the performance of the collaborative methods for PUEA detection. |
topic |
PUE attack imperfect game cognitive radio cloud computing |
url |
https://ieeexplore.ieee.org/document/8252692/ |
work_keys_str_mv |
AT ioannakakalou coordinationwithoutcollaborationinimperfectgamestheprimaryuseremulationattackexample AT kostasepsannis coordinationwithoutcollaborationinimperfectgamestheprimaryuseremulationattackexample |
_version_ |
1724194744327733248 |