Learn More
—The IEEE 802.22 standard for wireless regional area network is the first standard for cognitive radio that tries to harness the idle or under-utilized spectrum allocated for TV bands. Two major challenges that are faced by IEEE 802.22 are (i) the issue of self coexistence and (ii) the hidden incumbent problem. In this paper, we discuss these two challenges(More)
—The cognitive radio based IEEE 802.22 wireless regional area network (WRAN) is designed to operate in the under–utilized TV bands by detecting and avoiding primary TV transmission bands in a timely manner. Such networks, deployed by competing wireless service providers, would have to self-coexist by accessing different parts of the available spectrum in a(More)
In this paper we propose a distributed congestion control algorithm for tree based communications in wireless sensor networks, that seeks to adaptively assign a fair and efficient transmission rate to each node. In our algorithm, each node monitors its aggregate output and input traffic rates. Based on the difference of the two, a node then decides either(More)
—In this paper, we use game theory to mitigate self-interference among cognitive radio based IEEE 802.22 networks such that these networks can efficiently co-exist. When a network experiences interference, it can adopt either one of two choices-switch to a new band hoping to find a non-interfering one, or stay with its current band hoping that the(More)
—In this paper, we model the problem of dynamic spectrum access by a set of cognitive radio enabled nodes as an infinite horizon bargaining game. Each node (or, player) negotiates with its interfering nodes to obtain an agreeable sharing rule of the available channels. We investigate the subgame perfect equilibrium strategies of the bargaining game, abiding(More)
This paper considers the problem of optimal distributed detection with independent identical sensors in the presence of Byzantine attacks. By considering the attacker to be strategic in nature, we address the issue of designing the optimal fusion rule and the local sensor thresholds that minimize the probability of error at the fusion center (FC).We first(More)
This paper considers the problem of optimal Byzantine attacks or data falsification attacks on distributed detection mechanism in tree-based topologies. First, we show that when more than a certain fraction of individual node decisions are falsified, the decision fusion scheme becomes completely incapable. Second, under the assumption that there is a cost(More)
In this paper, we propose a distributed congestion control algorithm for tree based communications in wireless sensor networks, that seeks to adaptively assign a fair and efficient transmission rate to each node. In our algorithm, each node monitors its aggregate output and input traffic rate. Based on the difference of the two, a node then decides to(More)
IEEE 802.22 is a cognitive radio based Wireless Regional Area Network (WRAN) standard that allows opportunistic access to idle or under-utilized sub–900 MHz TV bands by unlicensed (secondary) networks. Though most of the standard has been laid out, there is still no consensus on the channel access policies for the uncoordinated secondary networks. Hence,(More)
This paper presents a Game Theoretic framework for the analysis of distributed spectrum sharing in a Cognitive Radio Network (CRN) prone to jamming attacks. We consider competitive interactions between a selfish secondary user (SU) transmitter-receiver pair and a jammer under realistic physical interference constraints. Assuming incomplete knowledge of the(More)