Abstract
Recently, some papers that apply a multi-armed bandit algorithm for channel selection in a cognitive radio system have been reported. In those papers, channel selection based on Upper Confidence Bound (UCB) algorithm has been proposed. However, in those selection, secondary users are not allowed to transmit data over same channels at the same time. Moreover, they do not take security of wireless communication into account. In this paper, we propose secure channel selection methods based on UCB algorithm, taking secrecy capacity into account. In our model, secondary users can share same channel by using transmit time control or transmit power control. Our proposed methods lead to be secure against an eavesdropper compared to conventional channel selections based on only estimated channel availability. By computer simulation, we evaluate average system secrecy capacity. As a result, we show that our proposed channel selections improve average system secrecy capacity compared to conventional channel selection.
Original language | English |
---|---|
Title of host publication | 2017 IEEE 85th Vehicular Technology Conference, VTC Spring 2017 - Proceedings |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Volume | 2017-June |
ISBN (Electronic) | 9781509059324 |
DOIs | |
Publication status | Published - 2017 Nov 14 |
Event | 85th IEEE Vehicular Technology Conference, VTC Spring 2017 - Sydney, Australia Duration: 2017 Jun 4 → 2017 Jun 7 |
Other
Other | 85th IEEE Vehicular Technology Conference, VTC Spring 2017 |
---|---|
Country | Australia |
City | Sydney |
Period | 17/6/4 → 17/6/7 |
Fingerprint
ASJC Scopus subject areas
- Computer Science Applications
- Electrical and Electronic Engineering
- Applied Mathematics
Cite this
Secure Channel Selection Using Multi-Armed Bandit Algorithm in Cognitive Radio Network. / Endo, Masahiro; Ohtsuki, Tomoaki; Fujii, Takeo; Takyu, Osamu.
2017 IEEE 85th Vehicular Technology Conference, VTC Spring 2017 - Proceedings. Vol. 2017-June Institute of Electrical and Electronics Engineers Inc., 2017. 8108219.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
}
TY - GEN
T1 - Secure Channel Selection Using Multi-Armed Bandit Algorithm in Cognitive Radio Network
AU - Endo, Masahiro
AU - Ohtsuki, Tomoaki
AU - Fujii, Takeo
AU - Takyu, Osamu
PY - 2017/11/14
Y1 - 2017/11/14
N2 - Recently, some papers that apply a multi-armed bandit algorithm for channel selection in a cognitive radio system have been reported. In those papers, channel selection based on Upper Confidence Bound (UCB) algorithm has been proposed. However, in those selection, secondary users are not allowed to transmit data over same channels at the same time. Moreover, they do not take security of wireless communication into account. In this paper, we propose secure channel selection methods based on UCB algorithm, taking secrecy capacity into account. In our model, secondary users can share same channel by using transmit time control or transmit power control. Our proposed methods lead to be secure against an eavesdropper compared to conventional channel selections based on only estimated channel availability. By computer simulation, we evaluate average system secrecy capacity. As a result, we show that our proposed channel selections improve average system secrecy capacity compared to conventional channel selection.
AB - Recently, some papers that apply a multi-armed bandit algorithm for channel selection in a cognitive radio system have been reported. In those papers, channel selection based on Upper Confidence Bound (UCB) algorithm has been proposed. However, in those selection, secondary users are not allowed to transmit data over same channels at the same time. Moreover, they do not take security of wireless communication into account. In this paper, we propose secure channel selection methods based on UCB algorithm, taking secrecy capacity into account. In our model, secondary users can share same channel by using transmit time control or transmit power control. Our proposed methods lead to be secure against an eavesdropper compared to conventional channel selections based on only estimated channel availability. By computer simulation, we evaluate average system secrecy capacity. As a result, we show that our proposed channel selections improve average system secrecy capacity compared to conventional channel selection.
UR - http://www.scopus.com/inward/record.url?scp=85040590907&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85040590907&partnerID=8YFLogxK
U2 - 10.1109/VTCSpring.2017.8108219
DO - 10.1109/VTCSpring.2017.8108219
M3 - Conference contribution
AN - SCOPUS:85040590907
VL - 2017-June
BT - 2017 IEEE 85th Vehicular Technology Conference, VTC Spring 2017 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
ER -