Bandwidth scanning involving a Bayesian approach to adapting the belief of an adversary's presence

Andrey Garnaev, Wade Trappe

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

Scanning large amounts of bandwidth for anomalous signals is a fundamental tool to building secure spectrum sharing system. When designing a bandwidth scanning algorithm, the system engineer faces several problems: which band to scan, how long to scan the band, and how to detect whether a malicious adversary is present. It is often not possible to conclusively detect an adversary's presence during a single scan, and therefore the anomaly detection procedure needs to run continuously. For a spectrum scanning system that runs continuously, it is possible to tune the algorithm to better detect the presence of a malicious threat by adapting one's belief as to whether the adversary is present, particularly if the previous scanning attempt failed to detect an adversary in the previous time slot. In this paper, by means of a game theoretical model, we demonstrate some approaches to solve these scanning problems. The equilibrium strategies in the suggested models are obtained explicitly, and thereby allows for interesting properties associated with the problems and related scanning algorithms to be established.

Original languageEnglish (US)
Title of host publication2014 IEEE Conference on Communications and Network Security, CNS 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages35-43
Number of pages9
ISBN (Electronic)9781479958900
DOIs
StatePublished - Dec 23 2014
Externally publishedYes
Event2014 IEEE Conference on Communications and Network Security, CNS 2014 - San Francisco, United States
Duration: Oct 29 2014Oct 31 2014

Publication series

Name2014 IEEE Conference on Communications and Network Security, CNS 2014

Other

Other2014 IEEE Conference on Communications and Network Security, CNS 2014
CountryUnited States
CitySan Francisco
Period10/29/1410/31/14

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Bandwidth scanning involving a Bayesian approach to adapting the belief of an adversary's presence'. Together they form a unique fingerprint.

Cite this