Secure Channel Selection Using Multi-Armed Bandit Algorithm in Cognitive Radio Network

Masahiro Endo, Tomoaki Ohtsuki, Takeo Fujii, Osamu Takyu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Recently, some papers that apply a multi-armed bandit algorithm for channel selection in a cognitive radio system have been reported. In those papers, channel selection based on Upper Confidence Bound (UCB) algorithm has been proposed. However, in those selection, secondary users are not allowed to transmit data over same channels at the same time. Moreover, they do not take security of wireless communication into account. In this paper, we propose secure channel selection methods based on UCB algorithm, taking secrecy capacity into account. In our model, secondary users can share same channel by using transmit time control or transmit power control. Our proposed methods lead to be secure against an eavesdropper compared to conventional channel selections based on only estimated channel availability. By computer simulation, we evaluate average system secrecy capacity. As a result, we show that our proposed channel selections improve average system secrecy capacity compared to conventional channel selection.

Original languageEnglish
Title of host publication2017 IEEE 85th Vehicular Technology Conference, VTC Spring 2017 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Volume2017-June
ISBN (Electronic)9781509059324
DOIs
Publication statusPublished - 2017 Nov 14
Event85th IEEE Vehicular Technology Conference, VTC Spring 2017 - Sydney, Australia
Duration: 2017 Jun 42017 Jun 7

Other

Other85th IEEE Vehicular Technology Conference, VTC Spring 2017
CountryAustralia
CitySydney
Period17/6/417/6/7

Fingerprint

Multi-armed Bandit
Cognitive Radio Networks
Cognitive radio
Radio systems
Confidence Bounds
Power control
Availability
Communication
Computer simulation
Cognitive Radio
Power Control
Wireless Communication
Computer Simulation
Evaluate

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics

Cite this

Endo, M., Ohtsuki, T., Fujii, T., & Takyu, O. (2017). Secure Channel Selection Using Multi-Armed Bandit Algorithm in Cognitive Radio Network. In 2017 IEEE 85th Vehicular Technology Conference, VTC Spring 2017 - Proceedings (Vol. 2017-June). [8108219] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/VTCSpring.2017.8108219

Secure Channel Selection Using Multi-Armed Bandit Algorithm in Cognitive Radio Network. / Endo, Masahiro; Ohtsuki, Tomoaki; Fujii, Takeo; Takyu, Osamu.

2017 IEEE 85th Vehicular Technology Conference, VTC Spring 2017 - Proceedings. Vol. 2017-June Institute of Electrical and Electronics Engineers Inc., 2017. 8108219.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Endo, M, Ohtsuki, T, Fujii, T & Takyu, O 2017, Secure Channel Selection Using Multi-Armed Bandit Algorithm in Cognitive Radio Network. in 2017 IEEE 85th Vehicular Technology Conference, VTC Spring 2017 - Proceedings. vol. 2017-June, 8108219, Institute of Electrical and Electronics Engineers Inc., 85th IEEE Vehicular Technology Conference, VTC Spring 2017, Sydney, Australia, 17/6/4. https://doi.org/10.1109/VTCSpring.2017.8108219
Endo M, Ohtsuki T, Fujii T, Takyu O. Secure Channel Selection Using Multi-Armed Bandit Algorithm in Cognitive Radio Network. In 2017 IEEE 85th Vehicular Technology Conference, VTC Spring 2017 - Proceedings. Vol. 2017-June. Institute of Electrical and Electronics Engineers Inc. 2017. 8108219 https://doi.org/10.1109/VTCSpring.2017.8108219
Endo, Masahiro ; Ohtsuki, Tomoaki ; Fujii, Takeo ; Takyu, Osamu. / Secure Channel Selection Using Multi-Armed Bandit Algorithm in Cognitive Radio Network. 2017 IEEE 85th Vehicular Technology Conference, VTC Spring 2017 - Proceedings. Vol. 2017-June Institute of Electrical and Electronics Engineers Inc., 2017.
@inproceedings{6f91d79a5e9544859cc6ec32ff02de0d,
title = "Secure Channel Selection Using Multi-Armed Bandit Algorithm in Cognitive Radio Network",
abstract = "Recently, some papers that apply a multi-armed bandit algorithm for channel selection in a cognitive radio system have been reported. In those papers, channel selection based on Upper Confidence Bound (UCB) algorithm has been proposed. However, in those selection, secondary users are not allowed to transmit data over same channels at the same time. Moreover, they do not take security of wireless communication into account. In this paper, we propose secure channel selection methods based on UCB algorithm, taking secrecy capacity into account. In our model, secondary users can share same channel by using transmit time control or transmit power control. Our proposed methods lead to be secure against an eavesdropper compared to conventional channel selections based on only estimated channel availability. By computer simulation, we evaluate average system secrecy capacity. As a result, we show that our proposed channel selections improve average system secrecy capacity compared to conventional channel selection.",
author = "Masahiro Endo and Tomoaki Ohtsuki and Takeo Fujii and Osamu Takyu",
year = "2017",
month = "11",
day = "14",
doi = "10.1109/VTCSpring.2017.8108219",
language = "English",
volume = "2017-June",
booktitle = "2017 IEEE 85th Vehicular Technology Conference, VTC Spring 2017 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Secure Channel Selection Using Multi-Armed Bandit Algorithm in Cognitive Radio Network

AU - Endo, Masahiro

AU - Ohtsuki, Tomoaki

AU - Fujii, Takeo

AU - Takyu, Osamu

PY - 2017/11/14

Y1 - 2017/11/14

N2 - Recently, some papers that apply a multi-armed bandit algorithm for channel selection in a cognitive radio system have been reported. In those papers, channel selection based on Upper Confidence Bound (UCB) algorithm has been proposed. However, in those selection, secondary users are not allowed to transmit data over same channels at the same time. Moreover, they do not take security of wireless communication into account. In this paper, we propose secure channel selection methods based on UCB algorithm, taking secrecy capacity into account. In our model, secondary users can share same channel by using transmit time control or transmit power control. Our proposed methods lead to be secure against an eavesdropper compared to conventional channel selections based on only estimated channel availability. By computer simulation, we evaluate average system secrecy capacity. As a result, we show that our proposed channel selections improve average system secrecy capacity compared to conventional channel selection.

AB - Recently, some papers that apply a multi-armed bandit algorithm for channel selection in a cognitive radio system have been reported. In those papers, channel selection based on Upper Confidence Bound (UCB) algorithm has been proposed. However, in those selection, secondary users are not allowed to transmit data over same channels at the same time. Moreover, they do not take security of wireless communication into account. In this paper, we propose secure channel selection methods based on UCB algorithm, taking secrecy capacity into account. In our model, secondary users can share same channel by using transmit time control or transmit power control. Our proposed methods lead to be secure against an eavesdropper compared to conventional channel selections based on only estimated channel availability. By computer simulation, we evaluate average system secrecy capacity. As a result, we show that our proposed channel selections improve average system secrecy capacity compared to conventional channel selection.

UR - http://www.scopus.com/inward/record.url?scp=85040590907&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85040590907&partnerID=8YFLogxK

U2 - 10.1109/VTCSpring.2017.8108219

DO - 10.1109/VTCSpring.2017.8108219

M3 - Conference contribution

AN - SCOPUS:85040590907

VL - 2017-June

BT - 2017 IEEE 85th Vehicular Technology Conference, VTC Spring 2017 - Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

ER -