TY - GEN
T1 - No-regret learning in collaborative spectrum sensing with malicious nodes
AU - Zhu, Quanyan
AU - Han, Zhu
AU - Başar, Tamer
PY - 2010
Y1 - 2010
N2 - In cognitive radio networks, spectrum sensing is a key component to detect spectrum holes (i.e., channels not used by any primary user). Collaborative spectrum sensing among the cognitive radio nodes is expected to improve the fidelity of primary user detection. However, malicious nodes can significantly impair the collaborative spectrum sensing by sending wrong reports to the fusion center. To overcome this problem, we propose in this paper no-regret learning to study the nonconstructive secondary users caused by either evil-intention or altruistical incapability. We investigate learning scenarios under both perfect observation and partial monitoring and propose two algorithms, for which we also establish some convergence properties. Moreover, we analyze the case in which the nature is assumed to be a player to develop a game-theoretical point of view towards the no-regret learning algorithms. Illustrative examples and simulation results demonstrate that the proposed schemes can assist the users to figure out the malicious nodes in a distributed way.
AB - In cognitive radio networks, spectrum sensing is a key component to detect spectrum holes (i.e., channels not used by any primary user). Collaborative spectrum sensing among the cognitive radio nodes is expected to improve the fidelity of primary user detection. However, malicious nodes can significantly impair the collaborative spectrum sensing by sending wrong reports to the fusion center. To overcome this problem, we propose in this paper no-regret learning to study the nonconstructive secondary users caused by either evil-intention or altruistical incapability. We investigate learning scenarios under both perfect observation and partial monitoring and propose two algorithms, for which we also establish some convergence properties. Moreover, we analyze the case in which the nature is assumed to be a player to develop a game-theoretical point of view towards the no-regret learning algorithms. Illustrative examples and simulation results demonstrate that the proposed schemes can assist the users to figure out the malicious nodes in a distributed way.
UR - http://www.scopus.com/inward/record.url?scp=77955374426&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77955374426&partnerID=8YFLogxK
U2 - 10.1109/ICC.2010.5502580
DO - 10.1109/ICC.2010.5502580
M3 - Conference contribution
AN - SCOPUS:77955374426
SN - 9781424464043
T3 - IEEE International Conference on Communications
BT - 2010 IEEE International Conference on Communications, ICC 2010
T2 - 2010 IEEE International Conference on Communications, ICC 2010
Y2 - 23 May 2010 through 27 May 2010
ER -