Indexed by:
Abstract:
In Cognitive Radio (CR) networks combined with Energy Harvesting (EH) technology, Secondary Users (SUs) are vulnerable to jamming attacks when sensing idle channels. At the same time, they may encounter numerous jamming and eavesdropping attacks during the data transmission phase. This paper examines the scenario in which SUs are susceptible to malicious attacks and energy constraints in both the sensing and transmission phases. We propose a utility function applicable to a single time slot. The blockchain uses Smart Contract (SC) technology to set rewards and punishments for users' channel selection behavior and adjust mining difficulty. This method combines blockchain with spectrum sensing data fusion, abandons the decision-making mechanism of the traditional Cooperative Spectrum Sensing (CSS) Fusion Center (FC), and adopts a distributed structure to ensure the security and reliability of sensing data fusion. In addition, this paper uses the potential game and the Stackelberg game to study the optimal transmission channel and optimal time slot allocation strategy for SUs under malicious attacks. Considering the possible interference caused by channel switching and the greedy principle of Malicious User (MU), the proposed two-layer game method gradually optimizes the sensing detection probability and secure communication rate with time slot iteration. In order to further improve the secure communication rate, an iterative update formula for transmission power is given to make reasonable use of the remaining energy of each SU at the end of each time slot. Simulation results show that the proposed method is superior to traditional methods in terms of sensing performance and secure communication rate. © 2013 IEEE.
Keyword:
Reprint 's Address:
Email:
Source :
IEEE Access
ISSN: 2169-3536
Year: 2024
3 . 4 0 0
JCR@2023
Cited Count:
SCOPUS Cited Count:
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 0
Affiliated Colleges: