Cognitive radio networks are more susceptible to jamming attacks due to the nature of unlicensed users accessing the spectrum by performing dynamic spectrum access. In such a context, a natural concern for operators is the resilience of the system. We model such a scenario as one of adversity in the system consisting of a single legitimate (LU) pair and malicious user (MU). The aim of the LU is to maximize throughput of transmissions, while the MU is to minimize the throughput of the LU completely. We present the achievable transmission rate of the LU pair under jamming attacks taking into account mainly on the transmission power per channel. Furthermore, we embed our utility function in a zero-sum matrix game and extend this by employing a...
We examine the performance of a cognitive radio system in a hostile environment where an intelligent...
We examine the performance of a cognitive radio system in a hostile environment where an intelligent...
In this thesis, we consider three different problems related to control using communication channel ...
Cognitive radio networks are more susceptible to jamming attacks due to the nature of unlicensed use...
Ongoing developments of the LTE standard will allow for device-to-device (D2D) communications, which...
Ongoing developments of the LTE standard will allow for device-to-device (D2D) communications, which...
On-the-fly reconfigurability capabilities and learning prospectives of Cognitive Radios inherently b...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
Cognitive radio (CR) promises to be a solution for the spectrum underutilization problems. However, ...
AbstractThe Cognitive radio technology is a promising solution to the imbalance between scarcity and...
In this paper, we address the issue of malicious intrusion in the communication network present in a...
Abstract — Cognitive radio is an efficient technique for realization of dynamic spectrum access. Sin...
The Cognitive radio technology is a promising solution to the imbalance between scarcity and under u...
\u3cp\u3eCognitive radio (CR) promises to be a solution for the spectrum underutilization problems. ...
We examine the performance of a cognitive radio system in a hostile environment where an intelligent...
We examine the performance of a cognitive radio system in a hostile environment where an intelligent...
In this thesis, we consider three different problems related to control using communication channel ...
Cognitive radio networks are more susceptible to jamming attacks due to the nature of unlicensed use...
Ongoing developments of the LTE standard will allow for device-to-device (D2D) communications, which...
Ongoing developments of the LTE standard will allow for device-to-device (D2D) communications, which...
On-the-fly reconfigurability capabilities and learning prospectives of Cognitive Radios inherently b...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
Cognitive radio (CR) promises to be a solution for the spectrum underutilization problems. However, ...
AbstractThe Cognitive radio technology is a promising solution to the imbalance between scarcity and...
In this paper, we address the issue of malicious intrusion in the communication network present in a...
Abstract — Cognitive radio is an efficient technique for realization of dynamic spectrum access. Sin...
The Cognitive radio technology is a promising solution to the imbalance between scarcity and under u...
\u3cp\u3eCognitive radio (CR) promises to be a solution for the spectrum underutilization problems. ...
We examine the performance of a cognitive radio system in a hostile environment where an intelligent...
We examine the performance of a cognitive radio system in a hostile environment where an intelligent...
In this thesis, we consider three different problems related to control using communication channel ...