2015 IEEE Global Communications Conference (GLOBECOM) 2014
DOI: 10.1109/glocom.2014.7417279
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Secondary Users in the Presence of Attackers in Cognitive Radio Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Game theory recently emerged as a framework for addressing jamming in CR networks. Amin et al, in [13], investigated a game theoretical model that aimed to maximize the utility of CR nodes in the presence of intruders and jammers. In the analysis, CR nodes are assumed to know the positions of the jammers and each others, which is an assumption that can be troublesome in practical deployment.…”
Section: A Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Game theory recently emerged as a framework for addressing jamming in CR networks. Amin et al, in [13], investigated a game theoretical model that aimed to maximize the utility of CR nodes in the presence of intruders and jammers. In the analysis, CR nodes are assumed to know the positions of the jammers and each others, which is an assumption that can be troublesome in practical deployment.…”
Section: A Background and Related Workmentioning
confidence: 99%
“…In the analysis, CR nodes are assumed to know the positions of the jammers and each others, which is an assumption that can be troublesome in practical deployment. Rawat et al extended the work done in [13] to include primary user emulation (PUE) attacks in [14]. Similarly, the location of the PU and CR nodes were shared among the nodes and a spectrum sensor was utilized.…”
Section: A Background and Related Workmentioning
confidence: 99%
“…The concepts of eavesdropping channel and confidentiality have promoted the research of physical layer security of wireless communication systems [10,11]. There have been a number of phased progress in the study of wireless system security performance [12][13][14][15][16]. Literature [17] and [18] gave a general representation method for the channel security capability of multi-antenna eavesdropping under the constraint of the input matrix.…”
Section: Introductionmentioning
confidence: 99%