Read more
Informationen zum Autor K. J. Ray Liu is a Distinguished Scholar-Teacher at the University of Maryland, College Park. He is the recipient of numerous honors and awards including the 2009 IEEE Signal Processing Society Technical Achievement Award, IEEE Signal Processing Society Distinguished Lecturer, National Science Foundation Presidential Young Investigator, and various best paper awards. Beibei Wang is currently a Research Associate at the University of Maryland, College Park, from where she received her Ph.D. in 2009. Her research interests include dynamic spectrum allocation and management in cognitive radio systems, cooperative communications, multimedia communications, game theory and learning, and network security. Klappentext The fundamentals of designing, implementing, and deploying cognitive radio networks, with a unique focus on game theory and its applications. Zusammenfassung Presenting the fundamentals of designing! implementing! and deploying cognitive radio networks! this book provides a unique focus on game theory and its applications. Cooperation! situational awareness! learning! and security are all covered in detail! in addition to novel! state-of-the-art concepts and recent results. Inhaltsverzeichnis Part I. Cognitive Radio Communications and Cooperation: 1. Introduction to cognitive radios; 2. Game theory for cognitive radio networks; 3. Markov models for dynamic spectrum allocation; 4. Repeated open spectrum sharing game; 5. Pricing game for dynamic spectrum allocation; 6. A multi-winner cognitive spectrum auction game; 7. Evolutionary cooperative spectrum sensing game; 8. Anti-jamming stochastic game; 9. Opportunistic multiple access for cognitive networks; Part II. Resource Awareness and Learning: 10. Reinforcement learning for energy-aware communications; 11. Repeated game and learning for packet forwarding; 12. Dynamic pricing games for routing; 13. Connectivity-aware network lifetime optimization; 14. Connectivity-aware network maintenance and repair; Part III. Securing Mechanism and Strategies: 15. Trust modeling and evaluation; 16. Defense against routing disruptions; 17. Defense against injecting traffic attacks; 18. Attack-resistant cooperation stimulation; 19. Optimal strategies for cooperation stimulation; 20. Belief evaluation for cooperation enforcement; 21. Defense against insider attacks; 22. Secure cooperation stimulation under noise and imperfect monitoring....