Fr. 180.00

Cognitive Radio Networking and Security - A Game-Theoretic View

English · Hardback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

Informationen zum Autor K. J. Ray Liu is a Distinguished Scholar-Teacher at the University of Maryland, College Park. He is the recipient of numerous honors and awards including the 2009 IEEE Signal Processing Society Technical Achievement Award, IEEE Signal Processing Society Distinguished Lecturer, National Science Foundation Presidential Young Investigator, and various best paper awards. Beibei Wang is currently a Research Associate at the University of Maryland, College Park, from where she received her Ph.D. in 2009. Her research interests include dynamic spectrum allocation and management in cognitive radio systems, cooperative communications, multimedia communications, game theory and learning, and network security. Klappentext The fundamentals of designing, implementing, and deploying cognitive radio networks, with a unique focus on game theory and its applications. Zusammenfassung Presenting the fundamentals of designing! implementing! and deploying cognitive radio networks! this book provides a unique focus on game theory and its applications. Cooperation! situational awareness! learning! and security are all covered in detail! in addition to novel! state-of-the-art concepts and recent results. Inhaltsverzeichnis Part I. Cognitive Radio Communications and Cooperation: 1. Introduction to cognitive radios; 2. Game theory for cognitive radio networks; 3. Markov models for dynamic spectrum allocation; 4. Repeated open spectrum sharing game; 5. Pricing game for dynamic spectrum allocation; 6. A multi-winner cognitive spectrum auction game; 7. Evolutionary cooperative spectrum sensing game; 8. Anti-jamming stochastic game; 9. Opportunistic multiple access for cognitive networks; Part II. Resource Awareness and Learning: 10. Reinforcement learning for energy-aware communications; 11. Repeated game and learning for packet forwarding; 12. Dynamic pricing games for routing; 13. Connectivity-aware network lifetime optimization; 14. Connectivity-aware network maintenance and repair; Part III. Securing Mechanism and Strategies: 15. Trust modeling and evaluation; 16. Defense against routing disruptions; 17. Defense against injecting traffic attacks; 18. Attack-resistant cooperation stimulation; 19. Optimal strategies for cooperation stimulation; 20. Belief evaluation for cooperation enforcement; 21. Defense against insider attacks; 22. Secure cooperation stimulation under noise and imperfect monitoring....

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.