全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2016 

采用博弈论的认知无线网络主用户和不可信任次用户的协作策略
Cooperation Schemes Between the Primary Transmitter and Untrusted Secondary Transmitters in Cognitive Radio Networks Using Game Theory

DOI: 10.7652/xjtuxb201602011

Keywords: 认知无线网络,博弈论,合作,安全
security
,game theory,cooperation,cognitive radio networks

Full-Text   Cite this paper   Add to My Lib

Abstract:

针对认知无线网络中不可信任的次用户发送者(ST)会对主链路进行窃听的问题,以将主用户发送者(PT)和ST之间的敌对关系转化为协作关系为目的,提出2种采用博弈论的协作策略:斯塔伯格策略及其改进策略――双层博弈策略。在斯塔伯格策略中,ST工作于半双工模式,和窃听相比,它更希望传送数据,因此PT轮流和每个ST进行斯塔伯格博弈,选择对未被选中的ST(即潜在的窃听者)产生更多干扰的ST一起使用授权频段发送数据。为促进ST之间的竞争,将斯塔伯格策略扩展为双层博弈策略,外层仍是斯塔伯格策略,PT将所有的ST看作一个整体进行博弈;内层拍卖博弈中,每个ST尽可能提高安全速率来赢得接入授权频段的机会,PT则选择能提供最高安全速率的ST进行合作,因此它能够获得更高的收益。仿真结果表明,在这2种策略作用下,主链路的安全速率分别提高了63%和68%,ST接入授权频段的概率分别为56%和71%。
Two cooperation schemes using game theory are proposed to solve the problem that the untrusted secondary transmitters(STs) will eavesdrop on the primary link in cognitive radio networks and to covert the hostile relation between the primary transmitter(PT) and STs into a cooperative one, and they are a Stackelberg scheme and an improved two??layer game.The STs work in half??duplex and prefer to transmit than to eavesdrop in the Stackelberg scheme. Hence, the PT plays the Stackelberg game with each ST, and then selects the ST who creates more interference to the unselected STs(i??e. the potential eavesdroppers) to transmit simultaneously. The Stackelberg scheme is then extended into a two??layer game to facilitate the competition among the STs. The outer framework is still a Stackelberg model and the PT plays game with all the STs as an entity, while the inner has an auction framework in which each ST improves its security rate as much as possible for the access opportunity. The PT will conduct cooperation with the ST having the highest security rate, so that more profit can be obtained. Numerical results show that application of these two proposed schemes results in a significant improvement: the security rate of the two schemes increases by 63% and 68% respectively, and the access opportunity of STs is 56% and 71% respectively

References

[1]  [2]裴庆祺, 李红宁, 赵弘洋, 等. 认知无线电网络安全综述 [J]. 通信学报, 2012, 34(1): 144??158.
[2]  PEI Qingqi, LI Hongning, ZHAO Hongyang, et al. Security in cognitive radio networks [J]. Journal on Communications, 2012, 34(1): 144??158.
[3]  [6]HYOUNGSUK J, STEVEN W M, IL??MIN K, et al. Secure communications with untrusted secondary nodes in cognitive radio networks [J]. IEEE Transactions on Wireless Communications, 2014, 13(4): 1790??1805.
[4]  [8]OSBORNE M J, RUBENSTEIN A. A course in game theory [M]. Cambridge, MA, USA: MIT Press, 1994: 18??30.
[5]  [9]宋婧, 丛犁, 葛建华, 等. 双层网络中一种协作博弈的动态资源分配方法 [J]. 西安交通大学学报, 2012, 46(10): 89??94.
[6]  [14]CHEN H, LI Y, JIANG Y, et al. Distributed power splitting for swipt in relay interference channels using game theory [J]. IEEE Transactions on Wireless Communications, 2015, 14 (1): 410??420.
[7]  [1]GOLDSMITH A, JAFAR S A, MARIC I, et al. Breaking spectrum gridlock with cognitive radios: an information theoretic perspective [J]. Proceedings of the IEEE Cognitive Radio, 2009, 97(5): 894??914.
[8]  [3]KARIM K, EYLEM E. Achieving physical??layer secrecy via friendly jamming with dynamic role assignment for coordinating transmitters [C]∥IEEE Wireless Communications and Networking Conference. Piscataway, NJ, USA: IEEE, 2014: 434??439.
[9]  [4]PHAM S, HAR D, KONG H. Smart power allocation for secrecy transmission in reciprocally cooperative spectrum sharing [J]. IEEE Transactions on Vehicular Technology, 2015, 58(5): 1875??1888.
[10]  [5]ZHANG N, LU N, CHENG N, et al. Cooperative spectrum access towards secure information transfer for CRNS [J]. IEEE Journal on Selected Areas in Communications, 2013, 31(11): 2453??2464.
[11]  [7]KARIM K, EYLEM E. Secrecy in cognitive radio networks: turning foes to allies [C]∥IEEE International Symposium on Modeling & Optimization in Mobile, Ad Hoc & Wireless Networks. Piscataway, NJ, USA: IEEE, 2013: 194??200.
[12]  SONG Jing, CONG Li, GE Jianhua, et al. A dynamic resource allocation approach using cooperative game theory for two??tie networks [J]. Journal of Xi’an Jiaotong University, 2012, 46(10): 89??94.
[13]  [10]XIAO L, CHEN T H, LIU J L, et al. Anti??jamming transmission Stackelberg game with observation errors [J]. IEEE Communications Letters, 2015, 99(4): 1790??1805.
[14]  [11]ZHANG R, CUI S, LIANG Y C. On ergodic sum capacity of fading cognitive multiple??access and broadcast channels [J]. IEEE Transactions on Wireless Communications, 2010, 9(6): 2066??2075.
[15]  [12]GABRY F, ZAPPONE A, THOBABEN R, et al. Energy efficiency analysis of cooperative jamming in cognitive radio networks with secrecy constraints [J]. IEEE Wireless Communications Letters, 2015, 4(4): 437??440.
[16]  [13]STEPHEN B, LIEVEN V. Convex optimization [M]. Cambridge, UK: Cambridge University Press, 2004: 95??103.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133