Withdraw
Loading…
A game-theoretic approach to the security of emerging cognitive radio and small cell networks
Houjeij, Ali
Loading…
Permalink
https://hdl.handle.net/2142/44131
Description
- Title
- A game-theoretic approach to the security of emerging cognitive radio and small cell networks
- Author(s)
- Houjeij, Ali
- Issue Date
- 2013-05-24T21:51:40Z
- Director of Research (if dissertation) or Advisor (if thesis)
- Basar, Tamer
- Department of Study
- Electrical & Computer Eng
- Discipline
- Electrical & Computer Engr
- Degree Granting Institution
- University of Illinois at Urbana-Champaign
- Degree Name
- M.S.
- Degree Level
- Thesis
- Keyword(s)
- Game Theory
- Security
- Cognitive Radio Networks
- Small Cell Networks.
- Abstract
- In this thesis, we provide mathematical formulations for and investigate a number of problems that arise in the security of some emerging wireless technologies. First, we address the problem of secure communication between secondary users (SUs) and their serving base station in the presence of multiple eavesdroppers and multiple primary users (PUs) in cognitive radio networks. We analyze the interactions between the SUs and eavesdroppers using the framework of noncooperative game theory. Assuming that the SUs have full knowledge of the eavesdroppers, we propose a novel secure channel selection algorithm that enables the SUs and eavesdroppers to take distributed decisions so as to reach a Nash equilibrium point. Then, we solve the same problem using a different approach and under a different set of assumptions. Here, the SUs aim at mitigating the effect of eavesdropping by changing their positions using only partial information about the locations of the eavesdroppers. Accordingly, for each SU, we propose an appropriate utility function and then maximize the social welfare of all SUs without interfering with the PUs' radio receivers and taking into account the interference thresholds set by the PUs on each channel. Given these constraints, we formulate the problem so as to optimize the social welfare of all SUs and we present three different algorithms to solve the emerging constrained optimization problem, depending on the possible communication links and the available information. Finally, we investigate the problem of placing small cell base stations (SCBSs) in adversarial heterogeneous wireless networks. We consider a continuum of wireless users facing three types of attacks: eavesdropping, jamming and a combination of both. For each attack, we propose a suitable utility function for the wireless users. Then, we propose a novel optimal placement algorithm for finding the optimal locations of the SCBSs given the underlying security considerations. Simulations were carried out for all the proposed algorithms
- Graduation Semester
- 2013-05
- Permalink
- http://hdl.handle.net/2142/44131
- Copyright and License Information
- Copyright 2013 Ali Houjeij
Owning Collections
Graduate Dissertations and Theses at Illinois PRIMARY
Graduate Theses and Dissertations at IllinoisDissertations and Theses - Electrical and Computer Engineering
Dissertations and Theses in Electrical and Computer EngineeringManage Files
Loading…
Edit Collection Membership
Loading…
Edit Metadata
Loading…
Edit Properties
Loading…
Embargoes
Loading…