Abstract
We address an anti-jamming strategy of channel access for secondary user in a cogntive radio network when some idle channels of the primary user are being jammed in each time slot. Given the secondary does not know what idle bands are under attack, using our method it tries to choose the best possible channel in each time slot to avoid the jammer. We show this problem can be formulated as a multi-armed bandit process and compare the results of different approaches for channel selection including ε-greedy, ε-first, and random. Simulatons verify that our method results in selecting channels with an average of almost 50% improved signal to noise ratio (SNR) over randomly selected channels.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Digham, F.F., Alouini, M.-S., Simon, M.: On the energy detection of unknown signals over fading channels. In: Proceedings of the IEEE International Conference on Communications, vol. 55(1), pp. 21–24 (2003)
Guha, S., Munagala, K., Shi, P.: Approximation algorithms for restless bandit problems, http://arxiv.org/abs/0711.3861 (accessed June 2011)
Gummadi, R., Wetherall, D., Greenstein, B., Seshan, S.: Understanding and mitigating the impact of RF interference on 802.11 networks. ACM SIGCOMM Computer Communication Review 37(4), 385–396 (2007)
Kadhe, S., Chandra, M.G., Janakiram, B.: Random Linear Coding Based Anti-Jamming Coding Techniques for Cognitive Radio Systems. In: Proc. IEEE International Conference on Communications, pp. 1–6 (2010)
Khattab, S., Mosse, D., Melhem, R.: Modeling of the channelhopping anti-jamming defense in multi-radio wireless networks. In: Proc. 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services (MobiQuitous), pp. 1–10 (2008)
Navda, V., Bohra, A., Ganguly, S., Rubenstein, D.: Using channelhopping to increase 802.11 resilience to jamming attacks. In: IEEE 26th Conference on Computer Communications (INFOCOM), pp. 2526–2530 (2007)
Noubir, G.: On connectivity in ad hoc network under jamming using directional antennas and mobility. In: International Conference on Wired Wireless Internet Communications, pp. 186–200 (2004)
Tokic, M.: Adaptive ε-Greedy Exploration in Reinforcement Learning Based on Value Differences. In: Dillmann, R., Beyerer, J., Hanebeck, U.D., Schultz, T. (eds.) KI 2010. LNCS, vol. 6359, pp. 203–210. Springer, Heidelberg (2010)
Vermorel, J., Mohri, M.: Multi-Armed Bandit Algorithms and Empirical Evaluation. In: Gama, J., Camacho, R., Brazdil, P.B., Jorge, A.M., Torgo, L. (eds.) ECML 2005. LNCS (LNAI), vol. 3720, pp. 437–448. Springer, Heidelberg (2005)
Wang, B., Wu, Y., Liu, K.J.R., Clancy, T.C.: An Anti-Jamming Stochastic Game for Cognitive Radio Networks. IEEE Journal on Selected Areas in Communications 29(4), 877–889 (2011)
Whittle, P.: Restless bandits: Activity allocation in a changing world. Appl. Prob. 25(A), 287–298 (1988)
Wood, A.D., Stankovic, J.A., Zhou, G.: DEEJAM: defeating energyefficient jamming in IEEE 802.15.4-based wireless networks. In: Proc. 4th IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp. 60–69 (2007)
Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer 35(10), 54–62 (2002)
Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel surfacing and spatialretreats: defenses against wireless denial of service. In: Proc. 3rd ACM Workshop on Wireless Security (WiSe), pp. 80–89 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sodagari, S., Clancy, T.C. (2011). An Anti-jamming Strategy for Channel Access in Cognitive Radio Networks. In: Baras, J.S., Katz, J., Altman, E. (eds) Decision and Game Theory for Security. GameSec 2011. Lecture Notes in Computer Science, vol 7037. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25280-8_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-25280-8_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25279-2
Online ISBN: 978-3-642-25280-8
eBook Packages: Computer ScienceComputer Science (R0)