• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Hou, H. (Hou, H..) [1] | Lin, R. (Lin, R..) [2] | Wang, J. (Wang, J..) [3] | Li, S. (Li, S..) [4] | Chen, W. (Chen, W..) [5]

Indexed by:

Scopus

Abstract:

In Cognitive Radio (CR) networks combined with Energy Harvesting (EH) technology, Secondary Users (SUs) are vulnerable to jamming attacks when sensing idle channels. At the same time, they may encounter numerous jamming and eavesdropping attacks during the data transmission phase. This paper examines the scenario in which SUs are susceptible to malicious attacks and energy constraints in both the sensing and transmission phases. We propose a utility function applicable to a single time slot. The blockchain uses Smart Contract (SC) technology to set rewards and punishments for users' channel selection behavior and adjust mining difficulty. This method combines blockchain with spectrum sensing data fusion, abandons the decision-making mechanism of the traditional Cooperative Spectrum Sensing (CSS) Fusion Center (FC), and adopts a distributed structure to ensure the security and reliability of sensing data fusion. In addition, this paper uses the potential game and the Stackelberg game to study the optimal transmission channel and optimal time slot allocation strategy for SUs under malicious attacks. Considering the possible interference caused by channel switching and the greedy principle of Malicious User (MU), the proposed two-layer game method gradually optimizes the sensing detection probability and secure communication rate with time slot iteration. In order to further improve the secure communication rate, an iterative update formula for transmission power is given to make reasonable use of the remaining energy of each SU at the end of each time slot. Simulation results show that the proposed method is superior to traditional methods in terms of sensing performance and secure communication rate. © 2013 IEEE.

Keyword:

blockchain eavesdropping attack Energy harvesting jamming attack two-layer game

Community:

  • [ 1 ] [Hou H.]Guangdong Planning and Designing Institute of Telecommunications co.LTD, Guangdong, 510630, China
  • [ 2 ] [Lin R.]Fuzhou University, College of Electrical Engineering and Automation, Fuzhou, 350108, China
  • [ 3 ] [Wang J.]Fuzhou University, College of Electrical Engineering and Automation, Fuzhou, 350108, China
  • [ 4 ] [Li S.]Fuzhou University, College of Electrical Engineering and Automation, Fuzhou, 350108, China
  • [ 5 ] [Chen W.]Fuzhou University, College of Electrical Engineering and Automation, Fuzhou, 350108, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Source :

IEEE Access

ISSN: 2169-3536

Year: 2024

3 . 4 0 0

JCR@2023

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:262/9697032
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1