Abstract—Cognitive radio technologies have become a promising approach to increase the efficiency of spectrum utilization. Although cognitive radio has been intensively studied in recent years, only a few works have discussed security aspects. In this paper, we focus on the jamming attack, one of major threats to cognitive radio networks, where a malicious user wants to jam the communications of secondary users by injecting interference. Aware of the absence of several primary users and the presence of a malicious user, a secondary user can allocate power to those fallow bands with a randomized strategy, in hope of alleviating the damage caused by the malicious user. We model this scenario into a two-player zero-sum game, and derive its unique Nash Equilibrium under certain conditions using the Colonel Blotto game approach, which provides a minimax strategy that the secondary user should adopt in order to minimize the worstcase damage caused by the malicious user. Simulation results...
Yongle Wu, Beibei Wang, K. J. Ray Liu