TY - GEN
T1 - On jamming models against collaborative spectrum sensing in a simple cognitive radio network
AU - Nadendla, V. Sriram Siddhardh
AU - Chen, Hao
AU - Varshney, Pramod K.
PY - 2010
Y1 - 2010
N2 - We design the optimal jamming attack strategy for a cognitive radio network in the presence of path-loss decaying signal models. We consider a cognitive radio network with K participating cognitive radios and one fusion center in the presence of one primary user and one jammer in the operating region. We assume that the network is not aware of the presence of the jammer and hence employs the optimal decision rules designed for a benign environment. Jammer, on the other hand, tries to take advantage of this ignorance and carries the best possible attack so that it can maximally deteriorate the global performance (error-probability) of the network under a total power-constraint. We consider a two-fold attack - one on the CR (sensor) reception and other on the fusion center reception. We present numerical results depicting near-field and far-field effects over different path-loss exponents to find the optimal jamming attack for a relatively simple example where the network has only one sensor (K = 1). This example serves as an illustration of the basic concepts and will be followed by a more in-depth study.
AB - We design the optimal jamming attack strategy for a cognitive radio network in the presence of path-loss decaying signal models. We consider a cognitive radio network with K participating cognitive radios and one fusion center in the presence of one primary user and one jammer in the operating region. We assume that the network is not aware of the presence of the jammer and hence employs the optimal decision rules designed for a benign environment. Jammer, on the other hand, tries to take advantage of this ignorance and carries the best possible attack so that it can maximally deteriorate the global performance (error-probability) of the network under a total power-constraint. We consider a two-fold attack - one on the CR (sensor) reception and other on the fusion center reception. We present numerical results depicting near-field and far-field effects over different path-loss exponents to find the optimal jamming attack for a relatively simple example where the network has only one sensor (K = 1). This example serves as an illustration of the basic concepts and will be followed by a more in-depth study.
UR - http://www.scopus.com/inward/record.url?scp=79957976822&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79957976822&partnerID=8YFLogxK
U2 - 10.1109/ACSSC.2010.5757710
DO - 10.1109/ACSSC.2010.5757710
M3 - Conference contribution
AN - SCOPUS:79957976822
SN - 9781424497218
T3 - Conference Record - Asilomar Conference on Signals, Systems and Computers
SP - 961
EP - 965
BT - Conference Record of the 44th Asilomar Conference on Signals, Systems and Computers, Asilomar 2010
T2 - 44th Asilomar Conference on Signals, Systems and Computers, Asilomar 2010
Y2 - 7 November 2010 through 10 November 2010
ER -