2014
DOI: 10.1109/tcomm.2014.2331964
|View full text |Cite
|
Sign up to set email alerts
|

Optimized Spoofing and Jamming a Cognitive Radio

Abstract: We examine the performance of a cognitive radio system in a hostile environment where an intelligent adversary tries to disrupt communications by minimizing the system throughput. We investigate the optimal strategy for spoofing and jamming a cognitive radio network with a Gaussian noise signal over a Rayleigh fading channel. We analyze a cluster-based network of secondary users (SUs). The adversary may attack during the sensing interval to limit access for SUs by transmitting a spoofing signal. By jamming the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
14
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(14 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…As a matter of fact, the authors adopt an online learning perspective to model the reasoning of the attacker as well as the defender in order to develop an explicit form of optimal power control when the user is aware of the type of learning algorithm used by the jammer and when it has no such information and, thus, also tries to learn the jammer's strategies. In [26], the authors investigate the design of an adversary with optimal power allocation for spoofing and jamming under a Rayleigh fading channel. Assuming that the adversary has full knowledge of the SU system, the authors determine a worst-case optimal energy allocation for spoofing and jamming that the SU adopts using classical optimization techniques.…”
Section: A Related Workmentioning
confidence: 99%
“…As a matter of fact, the authors adopt an online learning perspective to model the reasoning of the attacker as well as the defender in order to develop an explicit form of optimal power control when the user is aware of the type of learning algorithm used by the jammer and when it has no such information and, thus, also tries to learn the jammer's strategies. In [26], the authors investigate the design of an adversary with optimal power allocation for spoofing and jamming under a Rayleigh fading channel. Assuming that the adversary has full knowledge of the SU system, the authors determine a worst-case optimal energy allocation for spoofing and jamming that the SU adopts using classical optimization techniques.…”
Section: A Related Workmentioning
confidence: 99%
“…This work was extended in [12] to obtain spoofing performance under Nakagami-m fading. In [5] and [13], the optimal power allocation for spoofing and jamming was investigated under an AWGN channel, and Rayleigh fading, respectively. In [5], [13], a generic communication network was studied, and the adversary was optimized to minimize the network throughput.…”
mentioning
confidence: 99%
“…In [5] and [13], the optimal power allocation for spoofing and jamming was investigated under an AWGN channel, and Rayleigh fading, respectively. In [5], [13], a generic communication network was studied, and the adversary was optimized to minimize the network throughput. In this paper, we investigate H.264 video communication, and use the received video distortion as the performance metric.…”
mentioning
confidence: 99%
See 2 more Smart Citations