An Information Secrecy Game in Cognitive Radio Networks

Although cognitive radio technology improves efficiency of spectrum utilization, primary users usually do not gain from opening up the spectrum in the opportunistic spectrum access, and sometimes even suffer from collisions due to secondary users' imperfect spectrum sensing. However, in this paper, we show that if information secrecy is a concern, primary users could actually be better off by allowing secondary users to cooperatively share the spectrum. Specifically, we propose a new cooperation paradigm in cognitive radio networks that primary users improve secrecy with the help of trustworthy secondary users, in the presence of an intelligent and passive eavesdropper attempting to decode primary users' messages. After deriving the achievable pair of primary users' secrecy rate and secondary users' transmission rate under various circumstances, we model the interaction between primary users and secondary users as a Stackelberg game in which transmission power levels are the key to maximize data rates. Moreover, based on a 2-D representation of how achievable rates depend on power-level regions, we apply equilibrium analysis to understand the optimal strategy of primary and secondary users. Finally, simulation results are presented to verify the performance.

[1]  Te Sun Han,et al.  A new achievable rate region for the interference channel , 1981, IEEE Trans. Inf. Theory.

[2]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[3]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .

[4]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[5]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[6]  Zhu Han,et al.  Physical layer security game: How to date a girl with her boyfriend on the same table , 2009, 2009 International Conference on Game Theory for Networks.

[7]  Suhas N. Diggavi,et al.  On Cooperative Wireless Network Secrecy , 2009, IEEE INFOCOM 2009.

[8]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[9]  K. J. Ray Liu,et al.  An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.

[10]  H. Vincent Poor,et al.  Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.

[11]  Wade Trappe,et al.  Achieving Secret Communication for Fast Rayleigh Fading Channels , 2010, IEEE Transactions on Wireless Communications.

[12]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[13]  Nan Liu,et al.  Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.

[14]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[15]  Andrea J. Goldsmith,et al.  Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.

[16]  K. J. Ray Liu,et al.  A scalable collusion-resistant multi-winner cognitive spectrum auction game , 2009, IEEE Transactions on Communications.

[17]  Dusit Niyato,et al.  Competitive spectrum sharing in cognitive radio networks: a dynamic game approach , 2008, IEEE Transactions on Wireless Communications.

[18]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[19]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[20]  David Tse,et al.  Information theoretic games on interference channels , 2008, 2008 IEEE International Symposium on Information Theory.

[21]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..

[22]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[23]  K. J. Ray Liu,et al.  Game theory for cognitive radio networks: An overview , 2010, Comput. Networks.

[24]  Zhi Ding,et al.  Opportunistic spectrum access in cognitive radio networks , 2008, IJCNN.

[25]  Andrey Garnaev,et al.  An Eavesdropping Game with SINR as an Objective Function , 2009, SecureComm.