|
|
Security Coalition Method Based on Game Theory |
Huang Kai-zhi Hong Ying Luo Wen-yu Lin Sheng-bin |
(National Digital Switching System Engineering & Technological Research Center, Zhengzhou 450002, China) |
|
|
Abstract For the problems of reduced secrecy rate and energy according to noncooperation of selfish relay, this paper presents a security coalition method based on the game theory. Firstly, this paper introduces a benefit-sharing mechanism of cooperative game for the adaptive security coalition method, and models the transmitter coalition. And then this paper makes the increased part of total network secrecy rate compared with the initial as the transferable benefit, and allocates it to all transmitters in the coalition. After that, the transmitters iterate through the average utility under all coalitions, and find the largest benefit coalition. Finally, this coalition of transmitters is formed autonomously, the transmitter which is badly in need of sending signal or the transmitter with the worst eavesdropping channel conditions under the same need sends signal, the rest cooperate by sending artificial noise. Simulations and analyses show the fairness and effectiveness of this method, when sending power is 20 mW, the average network secrecy rate under the Gaussian channel compared with the initial stated is improved by 1.8 .
|
Received: 05 September 2014
Published: 02 June 2015
|
|
Corresponding Authors:
Hong Ying
E-mail: hongyinghunan@126.com
|
|
|
|
[1] |
Stark W and McEliece R J. On the capacity of channels with block memory[J]. IEEE Transactions on Information Theory, 1988, 34(2): 322-324.
|
[2] |
Geraci G and Dhillon H. A new model for physical layer security in cellular networks[C]. Proceedings of 2014 IEEE International Conference on Communications (ICC), Sydney, Australia, 2014: 2147-2152.
|
[3] |
Kashyap A, Basar T, and Srikant R. Correlated jamming on MIMO Gaussian fading channels[J]. IEEE Transactions on Information Theory, 2004, 50(9): 2119-2123.
|
[4] |
Geraci G, Dhillon H, and Andrews J. Physical layer security in downlink multi-antenna cellular networks[J]. IEEE Transactions on Communications, 2014, 62(6): 2006-2021.
|
[5] |
Wyner A. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387.
|
[6] |
Huiming W, Tongxing Z, and Pengcheng M. Secure MISO wiretap channels with multi-antenna passive eavesdropper via artificial fast fading[C]. Proceedings of 2014 IEEE International Conference on Communications (ICC), Sydney, Australia, 2014: 5396-5401.
|
[7] |
Walid S and Zhu H. Physical layer security: coalitional games for distributed cooperation[C]. Proceedings of Symposium on Modeling and Optimization in Mobile Ad Hoc and Wireless Networks, Seoul, Korea, 2009: 1-8.
|
[8] |
Jorswieck E and Mochaourab R. Secrecy rate region of MISO interference channel: Pareto boundary and non-cooperative games[C]. Proceedings of International ITG Workshop on Smart Antennas, Berlin, Germany, 2009: 132-138.
|
[9] |
Fakoorian S and Swindlehurst A. Competing for secrecy in the MISO interference channel[J]. IEEE Transactions on Signal Processing, 2013, 61(1): 170-181.
|
[10] |
Fakoorian S and Swindlehurst A. MIMO interference channel with confidential messages: game theoretic beamforming designs[C]. Proceedings of IEEE Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, 2010: 2099-2103.
|
[11] |
Fakoorian S and Swindlehurst A. MIMO interference channel with confidential messages: achievable secrecy rates and precoder design[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 640-649.
|
[12] |
Anand S, Sengupta S, and Chandramouli R. An attack- defense game theoretic analysis of multi-band wireless covert timing networks[C]. Proceedings of 2010 IEEE Computer Communications, San Diego, CA, USA, 2001: 14-19.
|
[13] |
Cho P, Hong Y, and Kuo J. A game theoretic approach to eavesdropper cooperation in MISO wireless networks[C]. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Prague, Czech, 2011: 3428-3431.
|
[14] |
Jun D, Rongqing Z, and Lingyang S. Truthful mechanisms for secure communication in wireless cooperative system[J]. IEEE Transactions on Wireless Communications, 2013, 12(9): 4236-4245.
|
[15] |
Mukherjee A. Principles of physical layer security in multiuser wireless networks: a survey[J]. IEEE Communications Surveys & Tutorials, 2014, 16(3): 1550-1573.
|
|
|
|