Papers
Topics
Authors
Recent
Search
2000 character limit reached

An Analysis on Interactions among Secondary User and Unknown Jammer in Cognitive Radio Systems by Fictitious Play

Published 20 Dec 2019 in cs.CR | (1912.12174v1)

Abstract: With the advancement of communication, the spectrum shortage problem becomes a serious problem for future generations. The cognitive radio technology is proposed to address this concern. In cognitive radio networks, the secondary users can access spectrum that allocated to the primary users without interference to the operation of primary users. Using cognitive radio network raises security issues such as jamming attack. A straightforward strategy to counter the jamming attack is to switch other bands. Finding the best strategy for switching is complicated when the malicious user is unknown to the primary users. This paper uses fictitious game for analysis the defense against such an unknown jammer.

Citations (5)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.