Standard

Optimizing Scanning Strategies: Selecting Scanning Bandwidth in Adversarial RF Environments. / Garnaev, A.; Trappe, W.; Kung, C.-T.

8th International Conference on Cognitive Radio Oriented Wireless Networks (Crowncom 2013), July 8-10, Washington, USA. Institute of Electrical and Electronics Engineers Inc., 2013. стр. 148-153.

Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференцийстатья в сборнике материалов конференциинаучная

Harvard

Garnaev, A, Trappe, W & Kung, C-T 2013, Optimizing Scanning Strategies: Selecting Scanning Bandwidth in Adversarial RF Environments. в 8th International Conference on Cognitive Radio Oriented Wireless Networks (Crowncom 2013), July 8-10, Washington, USA. Institute of Electrical and Electronics Engineers Inc., стр. 148-153. https://doi.org/10.1109/CROWNCom.2013.6636809

APA

Garnaev, A., Trappe, W., & Kung, C-T. (2013). Optimizing Scanning Strategies: Selecting Scanning Bandwidth in Adversarial RF Environments. в 8th International Conference on Cognitive Radio Oriented Wireless Networks (Crowncom 2013), July 8-10, Washington, USA (стр. 148-153). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CROWNCom.2013.6636809

Vancouver

Garnaev A, Trappe W, Kung C-T. Optimizing Scanning Strategies: Selecting Scanning Bandwidth in Adversarial RF Environments. в 8th International Conference on Cognitive Radio Oriented Wireless Networks (Crowncom 2013), July 8-10, Washington, USA. Institute of Electrical and Electronics Engineers Inc. 2013. стр. 148-153 https://doi.org/10.1109/CROWNCom.2013.6636809

Author

Garnaev, A. ; Trappe, W. ; Kung, C.-T. / Optimizing Scanning Strategies: Selecting Scanning Bandwidth in Adversarial RF Environments. 8th International Conference on Cognitive Radio Oriented Wireless Networks (Crowncom 2013), July 8-10, Washington, USA. Institute of Electrical and Electronics Engineers Inc., 2013. стр. 148-153

BibTeX

@inproceedings{a720508dc24b4daeac63ae1d93a3b3b2,
title = "Optimizing Scanning Strategies: Selecting Scanning Bandwidth in Adversarial RF Environments",
abstract = "In this paper we investigate the problem of designing a spectrum scanning strategy to detect an intelligent Invader who wants to utilize spectrum undetected for his/her unapproved purposes. To deal with this problem we apply game-theoretical tools. We model the situation as a game between a Scanner and an Invader where the Invader faces a dilemma: the more bandwidth the Invader attempts to use leads to a larger payoff if he is not detected, but at the same time also increases the probability of being detected and thus fined. Similarly, the Scanner faces a dilemma: the wider the bandwidth scanned, the higher the probability of detecting the Invader, but at the expense of increasing the cost of building the scanning system. The equilibrium strategies are found explicitly and reveal interesting properties. In particular, we have found a discontinuous dependence of the equilibrium strategies on the network parameters, fine and the type of the Invader's award. This discontinuity on fine means that the network prov",
author = "A. Garnaev and W. Trappe and C.-T. Kung",
year = "2013",
doi = "10.1109/CROWNCom.2013.6636809",
language = "English",
pages = "148--153",
booktitle = "8th International Conference on Cognitive Radio Oriented Wireless Networks (Crowncom 2013), July 8-10, Washington, USA",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

RIS

TY - GEN

T1 - Optimizing Scanning Strategies: Selecting Scanning Bandwidth in Adversarial RF Environments

AU - Garnaev, A.

AU - Trappe, W.

AU - Kung, C.-T.

PY - 2013

Y1 - 2013

N2 - In this paper we investigate the problem of designing a spectrum scanning strategy to detect an intelligent Invader who wants to utilize spectrum undetected for his/her unapproved purposes. To deal with this problem we apply game-theoretical tools. We model the situation as a game between a Scanner and an Invader where the Invader faces a dilemma: the more bandwidth the Invader attempts to use leads to a larger payoff if he is not detected, but at the same time also increases the probability of being detected and thus fined. Similarly, the Scanner faces a dilemma: the wider the bandwidth scanned, the higher the probability of detecting the Invader, but at the expense of increasing the cost of building the scanning system. The equilibrium strategies are found explicitly and reveal interesting properties. In particular, we have found a discontinuous dependence of the equilibrium strategies on the network parameters, fine and the type of the Invader's award. This discontinuity on fine means that the network prov

AB - In this paper we investigate the problem of designing a spectrum scanning strategy to detect an intelligent Invader who wants to utilize spectrum undetected for his/her unapproved purposes. To deal with this problem we apply game-theoretical tools. We model the situation as a game between a Scanner and an Invader where the Invader faces a dilemma: the more bandwidth the Invader attempts to use leads to a larger payoff if he is not detected, but at the same time also increases the probability of being detected and thus fined. Similarly, the Scanner faces a dilemma: the wider the bandwidth scanned, the higher the probability of detecting the Invader, but at the expense of increasing the cost of building the scanning system. The equilibrium strategies are found explicitly and reveal interesting properties. In particular, we have found a discontinuous dependence of the equilibrium strategies on the network parameters, fine and the type of the Invader's award. This discontinuity on fine means that the network prov

U2 - 10.1109/CROWNCom.2013.6636809

DO - 10.1109/CROWNCom.2013.6636809

M3 - Conference contribution

SP - 148

EP - 153

BT - 8th International Conference on Cognitive Radio Oriented Wireless Networks (Crowncom 2013), July 8-10, Washington, USA

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

ID: 4727051