Skip to main content

Stationary Equilibrium Strategies for Bandwidth Scanning

  • Conference paper
Book cover Multiple Access Communcations (MACOM 2013)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 8310))

Included in the following conference series:

Abstract

In this paper we investigate the problem of designing a spectrum multi-step scanning strategy to detect an intelligent Invader who wants to utilize spectrum undetected for his/her unapproved purposes. To deal with this problem, we model it as a two stage game, along with specifying an algorithm of scanning the spectrum and evaluating the stationary bandwidth of spectrum to scan. The game is solved explicitly and reveal interesting properties. In particular, we have found a discontinuous dependence of the equilibrium strategies on the network parameters, fine and the Invader’s intention for illegal activity, which can lead even to multi-equilibrium situation. To select a proper equilibrium strategy the best response strategy algorithm can be applied which in the multi-equilibria case always converges for a finite number of iteration, meanwhile for mono-equilibria situation it does not converge, circling around the equilibrium. Also, we have shown that the detection probability and payoffs in some situation can be very sensible to fine and the Invader’s intention to intrude into the network longer, what yields that the network provider has to carefully make a value judgement of fine and estimation of the Intruder’s intentions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Haykin, S.: Cognitive radio: brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications 23, 201–220 (2005)

    Article  Google Scholar 

  2. Mitola, J.: Cognitive radio for flexible mobile multimedia communications. In: IEEE International Workshop on Mobile Multimedia Communications, pp. 3–10 (1999)

    Google Scholar 

  3. Akyildiz, I.F., Lee, W.Y., Vuran, M.C., Mohanty, S.: Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Computer Networks 50, 2127–2159 (2006)

    Article  MATH  Google Scholar 

  4. Fette, B.A.: Cognitive radio technology. Academic Press, NY (2009)

    Google Scholar 

  5. Liu, S., Chen, Y., Trappe, W., Greenstein, L.J.: ALDO: An anomaly detection framework for dynamic spectrum access networks. In: INFOCOM 2009, pp. 675–683 (2009)

    Google Scholar 

  6. Verdu, S.: Multiuser detection. Cambridge Univ. Press (1998)

    Google Scholar 

  7. Van Trees, H.L.: Detection, Estimation, and Modulation Theory, Radar-Sonar Signal Processing and Gaussian Signals in Noise. Wiley-Interscience (2004)

    Google Scholar 

  8. Digham, F.F., Alouini, M.S., Simon, M.K.: On the energy detection of unknown signals over fading channels. IEEE Transactions on Communications 55, 21–24 (2007)

    Article  Google Scholar 

  9. Urkowitz, H.: Energy detection of unknown deterministic signals. Proceedings of the IEEE 55, 523–531 (1967)

    Article  Google Scholar 

  10. Garnaev, A., Trappe, W., Kung, C.-T.: Dependence of Optimal Monitoring Strategy on the Application to be Protected. In: IEEE GlobeCom 2012, pp. 1072–1077 (2012)

    Google Scholar 

  11. Garnaev, A., Trappe, W., Kung, C.-T.: Optimizing Scanning Strategies: Selecting Scanning Bandwidth in Adversarial RF Environments. In: Crowncom 2013 (2013)

    Google Scholar 

  12. Liu, Y., Comaniciu, C., Man, H.: A Bayesian game approach for intrusion detection in wireless Ad Hoc networks. In: GameNets 2006 (2006)

    Google Scholar 

  13. Agah, A., Das, S.K., Basu, K., Asadi, M.: Intrusion detection in sensor networks: A non-cooperative game approach. In: NCA 2004, pp. 343–346 (2004)

    Google Scholar 

  14. Garnaev, A.: Remark on the Princess and Monster Search Game. International Journal of Game Theory 20, 269–276 (1992)

    Article  MathSciNet  MATH  Google Scholar 

  15. Garnaev, A., Garnaeva, G., Goutal, P.: On the Infiltration Game. International Journal of Game Theory 26, 215–221 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  16. Manshaei, M.H., Zhu, Q., Alpcan, T., Basar, T., Hubaux, J.-P.: Game theory meets network security and privacy. J. ACM Computing Survey 453 (2013)

    Google Scholar 

  17. Owen, G.: Game Theory. W.B. Sanders, Philadelphia (1982)

    MATH  Google Scholar 

  18. Zhu, Q., Saad, W., Han, Z., Poor, H.V., Basar, T.: Eavesdropping and Jamming in Next-Generation Wireless Networks: A Game-Theoretic Approach. In: MILCOM 2011, pp. 119–124 (2011)

    Google Scholar 

  19. Altman, E., Avrachenkov, K., Garnaev, A.: Taxation for green communication. In: WiOpt 2010, pp. 108–112 (2010)

    Google Scholar 

  20. Sagduyu, Y.E., Ephremides, A.: A Game-Theoretic Analysis of Denial of Service Attacks in Wireless Random Access. Journal of Wireless Networks 15, 651–666 (2009)

    Article  Google Scholar 

  21. Garnaev, A., Hayel, Y., Altman, E., Avrachenkov, K.: Jamming Game in a Dynamic Slotted ALOHA Network. In: Jain, R., Kannan, R. (eds.) GameNets 2011. LNICST, vol. 75, pp. 429–443. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  22. Garnaev, A.: On a Ruckle problem in discrete games of ambush. Naval Research Logistics 44, 353–364 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  23. Altman, E., Avrachenkov, K., Garnaev, A.: Jamming in Wireless Networks: the Case of Several Jammers. In: GameNets 2009, pp. 585–592 (2009)

    Google Scholar 

  24. Altman, E., Avrachenkov, K., Garnaev, A.: Transmission Power Control Game with SINR as Objective Function. In: Altman, E., Chaintreau, A. (eds.) NET-COOP 2008. LNCS, vol. 5425, pp. 112–120. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  25. Kim, S.L., Rosberg, Z., Zander, J.: Combined power control and transmission rate selection in cellular networks. In: IEEE VTC 1999, pp. 1653–1657 (1999)

    Google Scholar 

  26. Koo, I., Ahn, J., Lee, H.A., Kim, K.: Analysis of Erlang capacity for the multimedia DS-CDMA systems. IEICE Trans. Fundamentals E82-A(5), 849–855 (1999)

    Google Scholar 

  27. Altman, E., Avrachenkov, K., Garnaev, A.: Closed Form Solutions for Water-Filling Problem in Optimization and Game Frameworks. Telecommunication Systems Journal 47, 153–164 (2011)

    Article  Google Scholar 

  28. Comaniciu, C., Mandayam, N.B., Poor, H.V.: Wireless Networks Multiuser Detection in Cross-Layer Design. Springer, Heidelberg (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Garnaev, A., Trappe, W. (2013). Stationary Equilibrium Strategies for Bandwidth Scanning. In: Jonsson, M., Vinel, A., Bellalta, B., Marina, N., Dimitrova, D., Fiems, D. (eds) Multiple Access Communcations. MACOM 2013. Lecture Notes in Computer Science, vol 8310. Springer, Cham. https://doi.org/10.1007/978-3-319-03871-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03871-1_15

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03870-4

  • Online ISBN: 978-3-319-03871-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics