Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer

نویسندگان

  • Zhu Han
  • Ninoslav Marina
  • Mérouane Debbah
  • Are Hjørungnes
چکیده

Physical layer security is an emerging security area that explores possibilities of achieving perfect secrecy data transmission between the intended network nodes, while possible malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdroppers. Here, we investigate the interaction between the source that transmits the useful data and friendly jammers who assist the source by “masking” the eavesdropper. In order to obtain a distributed solution, one possibility is to introduce a game theoretic approach. The game is defined such that the source pays the jammers to interfere the eavesdropper, therefore increasing the secrecy capacity. The friendly jammers charge the source with a certain price for the jamming and there is a tradeoff for the price. If the price is too low, the profit of the jammers is low and if the price is too high, the source would not buy the “service” (jamming power) or would buy it from other jammers. To analyze the game outcome, we define and investigate a Stackelburg type of game and construct a distributed algorithm. Our analysis and simulation results show the effectiveness of friendly jamming and the tradeoff for setting the price. The distributed game solution is shown to have similar performances to those of the centralized one. This work was supported by NSF CNS-0831371, and was supported by the Research Council of Norway through the project entitled ”Mobile-to-Mobile Communication Systems (M2M)”. ha l-0 04 46 93 4, v er si on 1 13 J an 2 01 0 Author manuscript, published in "Eurasip Journal on Wireless Communications and Networking, special issue on physical layer security (2009) ZHan-Eurasip-2009"

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improved Wireless Secrecy Capacity using Distributed Auction Theory

Physical layer security is an emerging security area that explores possibilities of achieving perfect secrecy data transmission between the intended network nodes, while possible malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdroppers. Here, we investiga...

متن کامل

Physical Layer Security Game : Interaction between Source , Eavesdropper , and Friendly

Physical layer security is an emerging security area that achieves perfect secrecy data transmission between intended network nodes, while malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdroppers. We investigate the interaction between the source that tra...

متن کامل

Bargaining-based jammer power allocation for dynamic eavesdropping scenario

This paper proposes a bargaining-based jammer power allocation scheme for multi-source multi-destination wireless network in the presence of a friendly jammer and a malicious node which eavesdrops erratically. We formulate the erratic behavior of the eavesdropper as a novel model where the eavesdropper wiretaps the message of the legitimate sources with a certain probability in a time slot. Mor...

متن کامل

A Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security

Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper&rsqu...

متن کامل

Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer

Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • EURASIP J. Wireless Comm. and Networking

دوره 2009  شماره 

صفحات  -

تاریخ انتشار 2009