Παρακαλώ χρησιμοποιήστε αυτό το αναγνωριστικό για να παραπέμψετε ή να δημιουργήσετε σύνδεσμο προς αυτό το τεκμήριο:
https://ruomo.lib.uom.gr/handle/7000/691
Πλήρης εγγραφή μεταδεδομένων
Πεδίο DC | Τιμή | Γλώσσα |
---|---|---|
dc.contributor.author | Kakalou, Ioanna | - |
dc.contributor.author | Psannis, Kostas E. | - |
dc.date.accessioned | 2020-04-15T14:21:12Z | - |
dc.date.available | 2020-04-15T14:21:12Z | - |
dc.date.issued | 2018-01-08 | - |
dc.identifier | 10.1109/ACCESS.2018.2791519 | en_US |
dc.identifier.issn | 2169-3536 | en_US |
dc.identifier.uri | https://doi.org/10.1109/ACCESS.2018.2791519 | en_US |
dc.identifier.uri | https://ruomo.lib.uom.gr/handle/7000/691 | - |
dc.description.abstract | In cognitive radio networks, an adversary transmits signals with characteristics that emulate those of primary users to prevent secondary users from transmitting. Such an attack is called a primary user emulation (PUE) attack. In this paper, a game theoretical framework is proposed to study the primary user emulation attack (PUEA) on cognitive radio nodes as a game of imperfect information between the secondary users (SUs), who do not exchange game information between them against the adversaries generating the PUEA and to define optimal strategies with minor computational demands. When the SU challenges the PU emulator successfully, updating the information on a cloud-based database enables the rest of the network to know the identity of PUE. As the game evolves, the grand coalition of the secondary users acts as the one without collaboration against the PU emulator playing a winning strategy. The performance of the game for optimal strategies is equal to the performance of the collaborative methods for PUEA detection. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.source | IEEE Access | en_US |
dc.subject | FRASCATI::Engineering and technology | en_US |
dc.subject | FRASCATI::Engineering and technology::Electrical engineering, Electronic engineering, Information engineering | en_US |
dc.subject.other | Cognitive radio technology | en_US |
dc.subject.other | cloud computing. | en_US |
dc.title | Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack Example | en_US |
dc.type | Article | en_US |
dc.contributor.department | Τμήμα Εφαρμοσμένης Πληροφορικής | en_US |
local.identifier.volume | 6 | en_US |
local.identifier.firstpage | 5402 | en_US |
local.identifier.lastpage | 5414 | en_US |
Εμφανίζεται στις Συλλογές: | Τμήμα Εφαρμοσμένης Πληροφορικής |
Αρχεία σε αυτό το Τεκμήριο:
Αρχείο | Περιγραφή | Μέγεθος | Μορφότυπος | |
---|---|---|---|---|
08252692(6).pdf | 4,58 MB | Adobe PDF | Προβολή/Ανοιγμα |
Τα τεκμήρια στο Αποθετήριο προστατεύονται από πνευματικά δικαιώματα, εκτός αν αναφέρεται κάτι διαφορετικό.