29 research outputs found
Generalized Colonel Blotto Game
Competitive resource allocation between adversarial decision makers arises in
a wide spectrum of real-world applications such as in communication systems,
cyber-physical systems security, as well as financial, political, and electoral
competition. As such, developing analytical tools to model and analyze
competitive resource allocation is crucial for devising optimal allocation
strategies and anticipating the potential outcomes of the competition. To this
end, the Colonel Blotto game is one of the most popular game-theoretic
frameworks for modeling and analyzing such competitive resource allocation
problems. However, in many real-world competitive situations, the Colonel
Blotto game does not admit solutions in deterministic strategies and, hence,
one must rely on analytically complex mixed-strategies with their associated
tractability, applicability, and practicality challenges. In this paper, a
generalization of the Colonel Blotto game which enables the derivation of
deterministic, practical, and implementable equilibrium strategies is proposed
while accounting for the heterogeneity of the battlefields. In addition, the
proposed generalized game enables accounting for the consumed resources in each
battlefield, a feature that is not considered in the classical Blotto game. For
the generalized game, the existence of a Nash equilibrium in pure-strategies is
shown. Then, closed-form analytical expressions of the equilibrium strategies,
are derived and the outcome of the game is characterized; based on the number
of resources of each player as well as the valuation of each battlefield. The
generated results provide invaluable insights on the outcome of the
competition. For example, the results show that, when both players are fully
rational, the more resourceful player can achieve a better total payoff at the
Nash equilibrium, a result that is not mimicked in the classical Blotto game.Comment: 8 pages, 5 figure
Reinforcement learning-based trust and reputation model for spectrum leasing in cognitive radio networks
Cognitive Radio (CR), which is the next generation
wireless communication system, enables unlicensed users or
Secondary Users (SUs) to exploit underutilized spectrum (called white spaces) owned by the licensed users or Primary Users(PUs) so that bandwidth availability improves at the SUs, which helps to improve the overall spectrum utilization. Collaboration, which has been adopted in various schemes such distributed channel sensing and channel access, is an intrinsic characteristic of CR to improve network performance. However, the requirement to collaborate has inevitably open doors to various forms of attacks by malicious SUs, and this can be addressed
using Trust and Reputation Management (TRM). Generally
speaking, TRM detects malicious SUs including honest SUs that turn malicious. To achieve a more efficient detection, we advocate the use of Reinforcement Learning (RL), which is
known to be flexible and adaptable to the changes in operating environment in order to achieve optimal network performance. Its ability to learn and re-learn throughout the duration of its existence provides intelligence to the proposed TRM model, and so the focus on RL-based TRM model in this paper. Our preliminary results show that the detection performance of RLbased TRM model has an improvement of 15% over the traditional TRM in a centralized cognitive radio network. The investigation in the paper serves as an important foundation for future work in this research field
Spectrum sharing security and attacks in CRNs: a review
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of
the common control channel, more attention is paid to the
security of the common control channel by looking into its
security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges
Wideband Anti-Jamming Based on Free Space Optical Communication and Photonic Signal Processing
We propose and demonstrate an anti-jamming system to defend against wideband jamming attack. Free space optical communication is deployed to provide a reference for jamming cancellation. The mixed signal is processed and separated with photonic signal processing method to achieve large bandwidth. As an analog signal processing method, the cancellation system introduces zero latency. The radio frequency signals are modulated on optical carriers to achieve wideband and unanimous frequency response. With wideband and zero latency, the system meets the key requirements of high speed and real-time communications in transportation systems