{"title":"IEEE 802.22认知无线网络中欺骗策略的纳什均衡","authors":"Ismail K. Ahmed, A. Fapojuwo","doi":"10.1109/CCECE.2017.7946837","DOIUrl":null,"url":null,"abstract":"This paper investigates the use of deception in combating the deceiving attack in IEEE 802.22 cognitive radio networks. The deceiving attack is a coordinated combination of diverse jamming attacks sourced by the same malicious platform. In this paper, a deception-based defense scheme is proposed to counteract the deceiving attack. The non-existence of the pure strategy Nash equilibrium was proven in closed-form when the defender/attacker have the incentive to defend/attack the frequency channel. Numerical results show that irrespective of the imposed penalty on the detected attacker, the proposed defense strategies can reduce the probability of success of the deceiving attack to nearly 0%.","PeriodicalId":238720,"journal":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Nash equilibria of deception strategies in the IEEE 802.22 cognitive radio networks\",\"authors\":\"Ismail K. Ahmed, A. Fapojuwo\",\"doi\":\"10.1109/CCECE.2017.7946837\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper investigates the use of deception in combating the deceiving attack in IEEE 802.22 cognitive radio networks. The deceiving attack is a coordinated combination of diverse jamming attacks sourced by the same malicious platform. In this paper, a deception-based defense scheme is proposed to counteract the deceiving attack. The non-existence of the pure strategy Nash equilibrium was proven in closed-form when the defender/attacker have the incentive to defend/attack the frequency channel. Numerical results show that irrespective of the imposed penalty on the detected attacker, the proposed defense strategies can reduce the probability of success of the deceiving attack to nearly 0%.\",\"PeriodicalId\":238720,\"journal\":{\"name\":\"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)\",\"volume\":\"58 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCECE.2017.7946837\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCECE.2017.7946837","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Nash equilibria of deception strategies in the IEEE 802.22 cognitive radio networks
This paper investigates the use of deception in combating the deceiving attack in IEEE 802.22 cognitive radio networks. The deceiving attack is a coordinated combination of diverse jamming attacks sourced by the same malicious platform. In this paper, a deception-based defense scheme is proposed to counteract the deceiving attack. The non-existence of the pure strategy Nash equilibrium was proven in closed-form when the defender/attacker have the incentive to defend/attack the frequency channel. Numerical results show that irrespective of the imposed penalty on the detected attacker, the proposed defense strategies can reduce the probability of success of the deceiving attack to nearly 0%.