Prospect theoretic analysis of anti-jamming communications in cognitive radio networks

An anti-jamming communication game between a cognitive radio enabled secondary user (SU) and a cognitive radio enabled jammer is considered, in which end-user decision making is modeled using prospect theory (PT). More specifically, the interactions between a user and a smart jammer (i.e., their respective choices of transmission probability) are formulated as a game under the assumption that end-user decision making under uncertainty does not follow the traditional objective assumptions stipulated by expected utility theory (EUT), but rather follows the subjective deviations specified by PT. Under the assumption that the capacity of the system is governed by the primary user activity, the Nash equilibria of the game are characterized under various conditions and the impact of the players' subjectivity (deviation from EUT behavior) on the SU's throughput is measured. Simulation results show that the subjective view of an SU tends to exaggerate the jamming probabilities and decreases its transmission probability, thus reducing the average throughput. On the other hand, the subjectivity of a jammer tends to reduce its jamming probability and thus increases the SU throughput.

[1]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[2]  G. Harrison,et al.  Expected utility theory and prospect theory: one wedding and a decent funeral , 2009 .

[3]  Takashi Okuda,et al.  A Design Method of Local Community Network Service Systems with Ad-Hoc Network Technology , 2009, 2009 IEEE 70th Vehicular Technology Conference Fall.

[4]  Narayan B. Mandayam,et al.  When Users Interfere with Protocols: Prospect Theory in Wireless Networks using Random Access and Data Pricing as an Example , 2014, IEEE Transactions on Wireless Communications.

[5]  K. J. Ray Liu,et al.  Indirect Reciprocity Security Game for Large-Scale Wireless Networks , 2012, IEEE Transactions on Information Forensics and Security.

[6]  D. Prelec The Probability Weighting Function , 1998 .

[7]  K. J. Ray Liu,et al.  An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.

[8]  Jianhua Ma,et al.  On Studying Relationship between Altruism and the Psychological Phenomenon of Self-Deception in Rational and Autonomous Networks , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[9]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[10]  Man Hon Cheung,et al.  Spectrum investment with uncertainty based on prospect theory , 2014, 2014 IEEE International Conference on Communications (ICC).

[11]  Walid Saad,et al.  Integrating energy storage into the smart grid: A prospect theoretic approach , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[12]  David D. Clark,et al.  Tussle in cyberspace: defining tomorrow's internet , 2005, TNET.

[13]  Quanyan Zhu,et al.  A Stochastic Game Model for Jamming in Multi-Channel Cognitive Radio Systems , 2010, 2010 IEEE International Conference on Communications.

[14]  Anthony Ephremides,et al.  Jamming games in wireless networks with incomplete information , 2011, IEEE Communications Magazine.

[15]  K. J. Ray Liu,et al.  Anti-Jamming Games in Multi-Channel Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[16]  Rajgopal Kannan,et al.  CSI Usage over Parallel Fading Channels under Jamming Attacks: A Game Theory Study , 2012, IEEE Transactions on Communications.

[17]  Lin Chen,et al.  Fight jamming with jamming - A game theoretic analysis of jamming attack in wireless networks and defense strategy , 2011, Comput. Networks.

[18]  Tamer Basar,et al.  A dynamic transmitter-jammer game with asymmetric information , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[19]  Eylem Ekici,et al.  Multiple access game with a cognitive jammer , 2012, 2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[20]  Narayan B. Mandayam,et al.  Prospects in a wireless random access game , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).

[21]  Ian F. Akyildiz,et al.  Multiagent jamming-resilient control channel game for cognitive radio ad hoc networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[22]  Xi Fang,et al.  Coping with a Smart Jammer in Wireless Networks: A Stackelberg Game Approach , 2013, IEEE Transactions on Wireless Communications.

[23]  Eitan Altman,et al.  A Bayesian jamming game in an OFDM wireless network , 2012, 2012 10th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).

[24]  Peng Ning,et al.  Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping , 2012, IEEE Transactions on Information Forensics and Security.

[25]  H. Vincent Poor,et al.  Prospect Theoretic Analysis of Energy Exchange Among Microgrids , 2015, IEEE Transactions on Smart Grid.

[26]  Moshe Ben-Akiva,et al.  Adaptive route choices in risky traffic networks: A prospect theory approach , 2010 .

[27]  A. Tversky,et al.  Advances in prospect theory: Cumulative representation of uncertainty , 1992 .