Information-dispersal games for security in cognitive-radio networks

V. Sriram Siddhardh Nadendla, Yunghsiang S. Han, Pramod K. Varshney

Research output: Chapter in Book/Entry/PoemConference contribution

2 Scopus citations


Rabin's information dispersal algorithm (IDA) simultaneously addresses secrecy and fault-tolerance by encoding a data file and parsing it into unrecognizable data-packets before transmitting or storing them in a network. In this paper, we redesign Rabin's IDA for cognitive-radio networks where the routing paths are available with uncertainty. In addition, we also assume the presence of an attacker in the network which attempts to simultaneously compromise the confidentiality and data-integrity of the source message. Due to the presence of two rational entities with conflicting motives, we model the problem as a zero-sum game between the source and the attacker and investigate the mixed-strategy Nash Equilibrium by decoupling the game into two linear programs which have a primal-dual relationship.

Original languageEnglish (US)
Title of host publicationProceedings - 2015 IEEE International Symposium on Information Theory, ISIT 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages5
ISBN (Electronic)9781467377041
StatePublished - Sep 28 2015
EventIEEE International Symposium on Information Theory, ISIT 2015 - Hong Kong, Hong Kong
Duration: Jun 14 2015Jun 19 2015

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
ISSN (Print)2157-8095


OtherIEEE International Symposium on Information Theory, ISIT 2015
Country/TerritoryHong Kong
CityHong Kong


  • Byzantine Attacks
  • Cognitive-Radio Networks
  • File-Sharing Networks
  • Information Dispersal Games
  • Reed-Solomon Codes

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Information Systems
  • Applied Mathematics
  • Modeling and Simulation


Dive into the research topics of 'Information-dispersal games for security in cognitive-radio networks'. Together they form a unique fingerprint.

Cite this