dc.contributor.author |
Okegbile, S.D. (Samuel)
|
|
dc.contributor.author |
Maharaj, Bodhaswar Tikanath Jugpershad
|
|
dc.contributor.author |
Alfa, Attahiru Sule
|
|
dc.date.accessioned |
2021-09-28T13:03:44Z |
|
dc.date.available |
2021-09-28T13:03:44Z |
|
dc.date.issued |
2020-11 |
|
dc.description.abstract |
Malicious users (MUs) have the tendency to disrupt the activities of honest users in the network if not properly controlled. In a massive cognitive radio network (CRN) with priority queues, malicious secondary users (SUs) can manipulate their priority queue requirements and mislead legitimate SUs to vacate the channels. In this paper, a game theoretic based signal detection approach is proposed to control the presence of MUs in CRN. If the received signal strength is less than the predefined threshold for primary transmissions in the presence of interference and noise, such a user is marked to be malicious and its payoff table is updated. Through the mixed strategy Nash equilibrium method, the payoff table of each user can be updated to aid removal of MUs from the network. The outcome of the simulation results shows that such an approach can reduce the impact of malicious activities in the massive CRN where SUs are expected to be low-power energy-efficient devices. |
en_ZA |
dc.description.department |
Electrical, Electronic and Computer Engineering |
en_ZA |
dc.description.librarian |
hj2021 |
en_ZA |
dc.description.uri |
https://ieeexplore.ieee.org/xpl/conhome/8738891/proceeding |
en_ZA |
dc.identifier.citation |
S. D. Okegbile, B. T. Maharaj and A. S. Alfa, "Malicious users control and management in cognitive radio networks with priority queues," 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), 2020, pp. 1-7, doi: 10.1109/VTC2020-Fall49728.2020.9348761. |
en_ZA |
dc.identifier.issn |
0098-3551 |
|
dc.identifier.other |
10.1109/VTC2020-Fall49728.2020.9348761 |
|
dc.identifier.uri |
http://hdl.handle.net/2263/81975 |
|
dc.language.iso |
en |
en_ZA |
dc.publisher |
Institute of Electrical and Electronics Engineers |
en_ZA |
dc.rights |
© 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. |
en_ZA |
dc.subject |
Malicious users (MUs) |
en_ZA |
dc.subject |
Cognitive radio (CR) |
en_ZA |
dc.subject |
Game theory |
en_ZA |
dc.subject |
Payoffs |
en_ZA |
dc.subject |
Point process |
en_ZA |
dc.subject |
Queuing |
en_ZA |
dc.subject |
Signal to noise ratio |
en_ZA |
dc.subject |
Queueing analysis |
en_ZA |
dc.subject |
Vehicular and wireless technologies |
en_ZA |
dc.subject |
Interference |
en_ZA |
dc.title |
Malicious users control and management in cognitive radio networks with priority queues |
en_ZA |
dc.type |
Postprint Article |
en_ZA |