Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Physical layer security with dynamic behaviour cooperator based on coalitional game

Cooperation between wireless network users is a promising technique for improving the physical layer (PHY) security of wireless transmission in the presence of eavesdroppers. In practice, users may not always act as reliable cooperators. The misbehaviour of cooperative users may change the original security transmission condition. In this study, an algorithm that user splits or merges from coalition is proposed based on coalitional game with non-transferable utility. It obtains the maximum PHY security capacity of users in wireless networks even when there are users with dynamic behaviour. Simulation results show that a certain degree of misbehaviour can be tolerated by coalition. Analyses also show that the sensitivity of misbehaviour of the coalition is related to the position of users.

References

    1. 1)
    2. 2)
    3. 3)
      • 6. MacKenzie, A., DaSilva, L., Tranter, W.: ‘Game theory for wireless engineers’ (Morgan and Claypool Publishers, 2006).
    4. 4)
    5. 5)
    6. 6)
    7. 7)
    8. 8)
    9. 9)
    10. 10)
    11. 11)
      • 24. Yuksel, M., Liu, X., Erkip, E.: ‘A secrecy game with an informed jammer relay’. 2010 IEEE 21st Int. Symp. on Personal Indoor and Mobile Radio Communications (PIMRC), 2010, Istanbul, Turkey, September 2010, pp. 26872691.
    12. 12)
    13. 13)
      • 15. Jindal, N., Mitra, U., Goldsmith, A.: ‘Capacity of ad-hoc networks with node cooperation’. Proc. Int. Symp. Information Theory, Chicago, USA, June 2004, pp. 269.
    14. 14)
    15. 15)
    16. 16)
      • 19. Saad, W., Zhu, H., Basar, T., Debbah, M., Hjørungnes, A.: ‘Physical layer security: coalitional games for distributed cooperation’. WiOPT 2009 7th Int. Symp. on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Seoul, Korea, June 2009, pp. 18.
    17. 17)
      • 16. Lun, D., Zhu, H., Petropulu, A.P., Poor, H.V.: ‘Secure wireless communications via cooperation’. 2008 46th Annual Allerton Conf. on Communication, Control, and Computing, Urbana, USA, September 2008, pp. 11321138.
    18. 18)
      • 10. Manshaei, M.H., Zhu, Q.Y., Alpcan, T., Basar, T., Hubaux, J.P.: ‘Game theory meets network security and privacy’, ACM Trans. Comput. Logic, 2011, 5, doi: 10.1.1.172.9249.
    19. 19)
      • 26. Apt, K., Witzel, A.: ‘A generic approach to coalition formation’. Proc. of First Int. Workshop on Computational Social Choice (COMSOC), Amsterdam, The Netherlands, December 2006, pp. 114.
    20. 20)
    21. 21)
      • 21. Saad, W., Zhu, H., Debbah, M., Hjørungnes, A.: ‘A distributed merge and split algorithm for fair cooperation in wireless networks’. 2008. ICC Workshops’ 08 IEEE Int. Conf. on Communications Workshops, Beijing, China, May 2008, pp. 311315.
    22. 22)
      • 14. Ng, C.T.K., Goldsmith, A.J.: ‘Transmitter cooperation in ad-hoc wireless networks: does dirty-payer coding beat relaying?’. Information Theory Workshop, 2004, Texas, USA, June 2004, pp. 277282.
    23. 23)
      • 18. Myerson, R.B.: ‘Game theory: analysis of conflict’ (Harvard University Press, 1997).
    24. 24)
    25. 25)
    26. 26)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2013.0274
Loading

Related content

content/journals/10.1049/iet-com.2013.0274
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address