Skip to main content

Showing 1–6 of 6 results for author: Garnaev, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:1711.10955  [pdf, other

    cs.GT cs.CR cs.NI

    Connectivity jamming game for physical layer attack in peer to peer networks

    Authors: Ying Liu, Andrey Garnaev, Wade Trappe

    Abstract: Because of the open access nature of wireless communications, wireless networks can suffer from malicious activity, such as jamming attacks, aimed at undermining the network's ability to sustain communication links and acceptable throughput. One important consideration when designing networks is to appropriately tune the network topology and its connectivity so as to support the communication need… ▽ More

    Submitted 29 November, 2017; originally announced November 2017.

    Journal ref: Security and Communication Networks 2016

  2. Optimal Scanning Bandwidth Strategy Incorporating Uncertainty about Adversary's Characteristics

    Authors: Andrey Garnaev, Wade Trappe

    Abstract: In this paper we investigate the problem of designing a spectrum scanning strategy to detect an intelligent Invader who wants to utilize spectrum undetected for his/her unapproved purposes. To deal with this problem we model the situation as two games, between a Scanner and an Invader, and solve them sequentially. The first game is formulated to design the optimal (in maxmin sense) scanning algori… ▽ More

    Submitted 25 April, 2015; v1 submitted 16 February, 2015; originally announced February 2015.

    Comments: This is the last draft version of the paper. Revised version of the paper was published in EAI Endorsed Transactions on Mobile Communications and Applications, Vol. 14, Issue 5, 2014, doi=10.4108/mca.2.5.e6. arXiv admin note: substantial text overlap with arXiv:1310.7247

    MSC Class: 91A05

    Journal ref: EAI Endorsed Transactions on Mobile Communications and Applications, volume 14, number 5, 2014

  3. arXiv:1401.1479  [pdf, other

    cs.GT

    Multilevel Pricing Schemes in a Deregulated Wireless Network Market

    Authors: Andrey Garnaev, Yezekael Hayel, Eitan Altman

    Abstract: Typically the cost of a product, a good or a service has many components. Those components come from different complex steps in the supply chain of the product from sourcing to distribution. This economic point of view also takes place in the determination of goods and services in wireless networks. Indeed, before transmitting customer data, a network operator has to lease some frequency range fro… ▽ More

    Submitted 7 January, 2014; originally announced January 2014.

    Comments: This is the last draft version of the paper. Revised version of the paper accepted by ValueTools 2013 can be found in Proceedings of the 7th International Conference on Performance Evaluation Methodologies and Tools (ValueTools '13), December 10-12, 2013, Turin, Italy

  4. arXiv:1310.7247  [pdf, other

    cs.GT

    Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments

    Authors: Andrey Garnaev, Wade Trappe, Chun-Ta Kung

    Abstract: In this paper we investigate the problem of designing a spectrum scanning strategy to detect an intelligent Invader who wants to utilize spectrum undetected for his/her unapproved purposes. To deal with this problem we apply game-theoretical tools. We model the situation as a game between a Scanner and an Invader where the Invader faces a dilemma: the more bandwidth the Invader attempts to use lea… ▽ More

    Submitted 27 October, 2013; originally announced October 2013.

    Journal ref: 2013 8th International Conference on Cognitive Radio Oriented Wireless Networks (CROWNCOM), 8-10 July 2013, Washington, DC, USA, pp. 148-153

  5. arXiv:1107.4251  [pdf, ps, other

    cs.NI

    Long-Term Energy Constraints and Power Control in Cognitive Radio Networks

    Authors: François Mériaux, Yezekael Hayel, Samson Lasaulce, Andrey Garnaev

    Abstract: When a long-term energy constraint is imposed to a transmitter, the average energy-efficiency of a transmitter is, in general, not maximized by always transmitting. In a cognitive radio context, this means that a secondary link can re-exploit the non-used time-slots. In the case where the secondary link is imposed to generate no interference on the primary link, a relevant issue is therefore to kn… ▽ More

    Submitted 21 July, 2011; originally announced July 2011.

    Comments: DSP 2011: 17th International Conference on Digital Signal Processing, July 2011, Corfu, Greece

  6. arXiv:0707.3936  [pdf, ps, other

    cs.NI cs.GT

    Closed form solutions for symmetric water filling games

    Authors: Eitan Altman, Konstantin Avrachenkov, Andrey Garnaev

    Abstract: We study power control in optimization and game frameworks. In the optimization framework there is a single decision maker who assigns network resources and in the game framework users share the network resources according to Nash equilibrium. The solution of these problems is based on so-called water-filling technique, which in turn uses bisection method for solution of non-linear equations for… ▽ More

    Submitted 30 July, 2007; v1 submitted 26 July, 2007; originally announced July 2007.