{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00078006","sets":["6164:6165:6462:6551"]},"path":["6551"],"owner":"10","recid":"78006","title":["コグニティブ無線ネットワークでPUE攻撃に対するゼロサムゲームを用いる対策"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-10-12"},"_buckets":{"deposit":"ca62b970-83a6-4492-88e8-4f9a3d0156eb"},"_deposit":{"id":"78006","pid":{"type":"depid","value":"78006","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"コグニティブ無線ネットワークでPUE攻撃に対するゼロサムゲームを用いる対策","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"コグニティブ無線ネットワークでPUE攻撃に対するゼロサムゲームを用いる対策"},{"subitem_title":"A Zero-Sum Game based Approach for Primary User Emulation Attack in Cognitive Radio Network","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"リスク分析・セキュリティポリシー","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2011-10-12","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"九州大学大学院システム情報科学府"},{"subitem_text_value":"九州大学大学院システム情報科学府"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Kyushu University","subitem_text_language":"en"},{"subitem_text_value":"Kyushu University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/78006/files/IPSJCSS2011111.pdf"},"date":[{"dateType":"Available","dateValue":"2012-10-12"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2011111.pdf","filesize":[{"value":"86.9 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"44"},{"tax":["include_tax"],"price":"30000","billingrole":"5"}],"accessrole":"open_date","version_id":"0fe2dd27-2402-43fa-831f-6e1d2f3225c6","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"ハオ, ドン"},{"creatorName":"櫻井, 幸一"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Dong, Hao","creatorNameLang":"en"},{"creatorName":"Kouichi, Sakurai","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"コグニティブ無線では,PUE攻撃という二次利用者に対するサービス拒否攻撃である.攻撃者が一次利用者と類似なシグナルを放送することで,特定な周波数帯域を占有する.二次利用者は攻撃者からのシグナルを感知したら,現在の周波数帯域が一次利用者に使用されていることを誤認識してしまい,この周波数帯域の使用を諦める.攻撃者と防御者の相互行為がゼロサムゲームと認められる.このゲームで,攻撃者がある確率で特定な周波数帯域にJシグナルを送信する.同じように,防御者もある確率で特定な周波数帯域を感知する.本稿では,微分ゲーム理論を用い,攻撃―防御シナリオの分析に基づき,ナッシュ均衡により,最適な防御戦略を制定した.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In cognitive radio networks, primary user emulation(PUE) attack is a denial-of-service (DoS) attack on secondary users. The interaction between the attacker and the secondary user (defender) can be seen as a two-player zero-sum game. The attacker (defender) choose the probability for jamming (sensing) a certain set of spectrum channels. We utilize zero-sum game to analyze the PUE attack/defence scenario. The Nash equilibrium is deprived, and the optimal anti-PUE attack strategy is obtained.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"659","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2011 論文集"}],"bibliographicPageStart":"654","bibliographicIssueDates":{"bibliographicIssueDate":"2011-10-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2011"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"updated":"2025-01-21T20:43:32.662807+00:00","created":"2025-01-18T23:33:28.447088+00:00","links":{},"id":78006}