Resource Allocation in a MAC with and without security via Game Theoretic Learning

نویسندگان

  • Shahid Mehraj Shah
  • Krishna Chaitanya A
  • Vinod Sharma
چکیده

In this paper, we study a K-user fading multiple access channel (F-MAC), with and without an eavesdropper (Eve). In the system without Eve, we assume that each user knows only its own channel gain and is completely ignorant about the other users’ channel state. The legitimate receiver sends a short acknowledgement message Acknowledge (ACK) if the message is correctly decoded and a No Acknowledge (NACK) if the message is not correctly decoded. Under these assumptions, we use game theoretic learning setup to make transmitters learn about the power allocation under each state. We use multiplicative weight no-regret algorithm to achieve an -coarse correlated equilibrium. We also consider the case where a user can receive other users’ ACK/NACK messages. Now, we can maximize a weighted sum utility and achieve Pareto optimal points. We also obtain Nash bargaining solutions, which are Pareto points that are fairer to the transmitting users. Fairness among users is quantified using Jain’s index. With Eve, we first assume each user knows only its own channel gain to the receiver as well as to Eve. The receiver decides whether to send an ACK or a NACK to the transmitting user based on the secrecy-rate condition. We use the above developed algorithms to get the equilibrium points. Next, we study the case where each user knows only the distribution of the channel state of Eve. Finally, we also consider the system where the users do not know even the distribution of the Eve’s channel.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

NGTSOM: A Novel Data Clustering Algorithm Based on Game Theoretic and Self- Organizing Map

Identifying clusters is an important aspect of data analysis. This paper proposes a noveldata clustering algorithm to increase the clustering accuracy. A novel game theoretic self-organizingmap (NGTSOM ) and neural gas (NG) are used in combination with Competitive Hebbian Learning(CHL) to improve the quality of the map and provide a better vector quantization (VQ) for clusteringdata. Different ...

متن کامل

Game Theoretic Analysis of Security and Sustainability

Computational game theory has become a powerful tool to address critical issues in security and sustainability. Casting the security resource allocation problem as a Stackelberg game, novel algorithms have been developed to provide randomized security resource allocations. These algorithms have led to deployed security-game based decision aids for many real-world security domains including infr...

متن کامل

A Decision and Game Theoretic Approach to Networked System Security with Applications to Power Grid (Invited Lecture)

There has been a growing interest in decision and game theoretic approaches to networked system security as evidenced by the increasing number of publications and conferences such as the Conference on Decision and Game Theory for Security (GameSec). This presentation aims to give an overview on security games and their applications to network and critical infrastructure security based on the re...

متن کامل

Cycle Time Optimization of Processes Using an Entropy-Based Learning for Task Allocation

Cycle time optimization could be one of the great challenges in business process management. Although there is much research on this subject, task similarities have been paid little attention. In this paper, a new approach is proposed to optimize cycle time by minimizing entropy of work lists in resource allocation while keeping workloads balanced. The idea of the entropy of work lists comes fr...

متن کامل

ارائه مدلی جهت استفاده ازعاملهای متحرک در سیستم های تشخیص نفوذ توزیع شده مبتنی بر تئوری بازی

The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • EURASIP J. Wireless Comm. and Networking

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017