Bargaining-based jammer power allocation for dynamic eavesdropping scenario
نویسندگان
چکیده
This paper proposes a bargaining-based jammer power allocation scheme for multi-source multi-destination wireless network in the presence of a friendly jammer and a malicious node which eavesdrops erratically. We formulate the erratic behavior of the eavesdropper as a novel model where the eavesdropper wiretaps the message of the legitimate sources with a certain probability in a time slot. Moreover, in order to obtain a fair and efficient solution, the jammer power allocation problem is modeled as a Nash bargaining game under the constraint of maximum transmit power of a friendly jammer, which is a convex optimization problem. Then, the closed form of the Nash bargaining solution (NBS) is derived, and a simple but effective centralized algorithm is proposed. Besides, we find that the even power allocation solution and the sum-secrecy-rate optimal solution are the special cases of the NBS, when the bargaining power is properly selected. Simulation results demonstrate that the NBS achieves a good performance in terms of both effectiveness and fairness.
منابع مشابه
Jamming partner selection for maximising the worst D2D secrecy rate based on social trust
Device-to-device (D2D) communications have recently attracted broad attention, owing to its potential ability to improve spectrum and energy efficiency within the existing cellular infrastructure. Without sophisticated control, D2D users themselves are not powerful enough to resist eavesdropping or fight against security attacks. This work investigates how to select jamming partners for D2D use...
متن کاملCross-layer Packet-dependant OFDM Scheduling Based on Proportional Fairness
This paper assumes each user has more than one queue, derives a new packet-dependant proportional fairness power allocation pattern based on the sum of weight capacity and the packet’s priority in users’ queues, and proposes 4 new cross-layer packet-dependant OFDM scheduling schemes based on proportional fairness for heterogeneous classes of traffic. Scenario 1, scenario 2 and scenario 3 lead r...
متن کاملA Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security
Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper&rsqu...
متن کاملPerformance Study of Untrusted Relay Network Utilizing Cooperative Jammer
Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...
متن کاملSecure Communication through Wireless-Powered Friendly Jamming: Jointly Online Optimization over Geography, Energy and Time
Exploring the interference-emitting friendly jammers to protect the sensitive communications in the presence of eavesdroppers has increasingly being investigated in literature. In parallel, scavenging energy from abient radio signals for energy-constrained devices, namely wireless energy harvesting (WEH), has also drawn significant attention. Without relying on external energy supply, the wirel...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- EURASIP J. Wireless Comm. and Networking
دوره 2014 شماره
صفحات -
تاریخ انتشار 2014