<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=us-ascii"><meta name=Generator content="Microsoft Word 12 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Tahoma;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
        {font-family:"Albertus Extra Bold";}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";}
h2
        {mso-style-priority:9;
        mso-style-link:"Heading 2 Char";
        margin:0in;
        margin-bottom:.0001pt;
        text-align:center;
        page-break-after:avoid;
        font-size:16.0pt;
        font-family:"Albertus Extra Bold";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
span.EmailStyle17
        {mso-style-type:personal-compose;
        font-family:"Calibri","sans-serif";
        color:windowtext;}
span.Heading2Char
        {mso-style-name:"Heading 2 Char";
        mso-style-priority:9;
        mso-style-link:"Heading 2";
        font-family:"Albertus Extra Bold";
        font-weight:bold;}
.MsoChpDefault
        {mso-style-type:export-only;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link=blue vlink=purple><div class=WordSection1><h2><span style='font-size:12.0pt;font-family:"Tahoma","sans-serif"'>PhD Dissertation Presentation<o:p></o:p></span></h2><p class=MsoNormal><b><span style='font-size:12.0pt;font-family:"Tahoma","sans-serif"'><o:p> </o:p></span></b></p><p class=MsoNormal align=center style='text-align:center'><b><span style='font-size:12.0pt;font-family:"Tahoma","sans-serif"'>A FRAMEWORK OF BELIEF PROPAGATION AND GAME THEORY FOR COGNITIVE RADIO SECURITY AND ROUTING<o:p></o:p></span></b></p><p class=MsoNormal align=center style='text-align:center'><b><span style='font-size:12.0pt;font-family:"Tahoma","sans-serif"'><o:p> </o:p></span></b></p><p class=MsoNormal align=center style='text-align:center'><b><span style='font-size:12.0pt;font-family:"Tahoma","sans-serif"'>Zhou Yuan<o:p></o:p></span></b></p><p class=MsoNormal align=center style='text-align:center'><b><span style='font-size:14.0pt;font-family:"Tahoma","sans-serif"'><o:p> </o:p></span></b></p><p class=MsoNormal align=center style='text-align:center'><span style='font-family:"Tahoma","sans-serif"'>June 27, 2012 , 11:00 AM ECE Conference Room<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify'><span style='font-size:9.0pt;font-family:"Tahoma","sans-serif"'><o:p> </o:p></span></p><p class=MsoNormal align=center style='text-align:center'><span style='font-family:"Tahoma","sans-serif"'>Committee: Dr. Zhu Han (Chair), Dr. Haluk Ogmen, Dr. Wei-Chuan Shih, Dr. Rong Zheng, Dr. Lijun Qian<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify'><span style='font-size:9.0pt;font-family:"Tahoma","sans-serif"'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify'><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'>With the advent of new high data rate wireless applications, as well as growth of existing wireless services, demand for additional bandwidth is increasing rapidly. Existing spectrum allocation policies of the Federal Communications Commission (FCC) prohibits unlicensed access to licensed spectrum, constraining them instead to several heavily populated, interference-prone frequency bands, which causes spectrum scarcity. However, it has been shown by several spectrum measurement campaigns that the current licensed spectrum usage across time and frequency is in-efficient. Therefore, a concept of unlicensed users temporarily “borrowing” spectrum from incumbent license holders to improve the spectrum utilization, called dynamic spectrum access (DSA), is proposed. Cognitive radio is a communication paradigm that employs software-defined radio technology in order to perform DSA and others versatile, powerful and portable wireless transceivers. <o:p></o:p></span></p><p class=MsoNormal style='text-align:justify'><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify'><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Up till now, most existing works have focused on spectrum sensing and spectrum access, but very few have focused on the higher layer, which is very important for cognitive radio networks. In this dissertation, we use the framework of distributed game theory and belief propagation to explore the routing techniques and the security issues in cognitive radio networks. The proposed distributed routing algorithm can avoid the problems in the centralized routing solution, such as the high cost for building the centralized coordinate nodes, high information-gathering delay, and system breakdown caused by the possible failures in the centralized nodes, and is practically implementable. <o:p></o:p></span></p><p class=MsoNormal><o:p> </o:p></p></div></body></html>