Behavior prediction of untrusted relays based on nonzero-sum game
详细信息    查看全文
  • 作者:Xiaomei Fu ; Xiao Wu ; Qing Wang
  • 关键词:physical layer security ; cooperative communication ; untrusted relay ; secrecy capacity ; nonzero ; sum game
  • 刊名:Transactions of Tianjin University
  • 出版年:2015
  • 出版时间:October 2015
  • 年:2015
  • 卷:21
  • 期:4
  • 页码:371-376
  • 全文大小:827 KB
  • 参考文献:[1]Shannon C E. Communication theory of secrecy systems[J]. The Bell System Technical Journal, 1949, 28(4): 656-15.MathSciNet View Article MATH
    [2]Wyner A D. The wire-tap channel[J]. The Bell System Technical Journal, 1975, 54(8): 1355-387.MathSciNet View Article MATH
    [3]Leung-Yan-Cheong S K, Hellman M E. The Gaussian wire-tap channel[J]. IEEE Transactions on Information Theory, 1978, 24(4): 451-56.MathSciNet View Article MATH
    [4]Elia P E, Vinodh K, Anand M et al. D-MG tradeoff and optimal codes for a class of AF and DF cooperative communication protocols[J]. IEEE Transactions on Information Theory, 2009, 55(7): 3161-185.MathSciNet View Article
    [5]Chen Shuping, Wang Wenbo, Zhang Xing et al. Performance analysis of OSTBC transmission in amplify-andforward cooperative relay networks[J]. IEEE Transactions on Vehicular Technology, 2010, 59(1): 105-13.View Article
    [6]Hou Lijun, Fu Xiaomei. Physical layer security with dynamic behavior cooperator based on coalitional game[J]. IET Communications, 2014, 8(8): 1258-264.View Article
    [7]Mao Yinian, Wu Min. Tracing malicious relays in cooperative wireless communications[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(2): 198-12.View Article
    [8]Karin Sallhammar. Stochastic Models for Combined Security and Dependability Evaluation[D]. Norwegian University of Science and Technology, Norway, 2007.
    [9]Zhu Quanyan, Tembine Hamidou, Basar Tamer. Network security configurations: A nonzero-sum stochastic game approach[C]. In: American Control Conference(ACC). Baltimore, MD, USA, 2010.
    [10]Mukherjee A, Swindlehurst A L. Jamming games in the MIMO wiretap channel with an active eavesdropper[J]. IEEE Transactions on Signal Processing, 2013, 61(1): 82-1.MathSciNet View Article
    [11]Zhang Rongqing, Song Lingyang, Zhu Han et al. Physical layer security for two-way untrusted relaying with friendly jammers[J]. IEEE Transactions on Vehicular Technology, 2012, 61(8): 3693-704.View Article
    [12]Wood A D, Stankovic J A, Zhou G. DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks[C]. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. San Diego, CA, USA, 2007.
    [13]Fu Xiaomei, Zhang Li, Wang Dawei et al. Secrecy performance of untrusted relay's cooperation under fading channels[J]. Transactions of Tianjin University, 2011, 17(6): 440-45.View Article MATH
    [14]Yuksel M, Liu X, Erkip E. A secure communication game with a relay helping the eavesdropper[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 818-30.View Article
    [15]Yuksel M, Liu X, Erkip E. A secrecy game with an informed jammer relay[C]. In: IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications. Istanbul, Turkey, 2010.
    [16]Lin Shih-Chun, Lin Pin-Hsun. On secrecy capacity of fast fading multiple-input wiretap channels with statistical CSIT[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(2): 414-19.View Article
    [17]Mangasarian O L, Stone H. Two-person nonzero-sum games and quadratic programming[J]. Journal of Mathematical Analysis and Applications, 1964, 9(3): 348-55.MathSciNet View Article MATH
  • 作者单位:Xiaomei Fu (1)
    Xiao Wu (1)
    Qing Wang (1)

    1. School of Electronic Information Engineering, Tianjin University, Tianjin, 300072, China
  • 刊物类别:Engineering
  • 刊物主题:Chinese Library of Science
  • 出版者:Tianjin University
  • ISSN:1995-8196
文摘
To keep the secrecy performance from being badly influenced by untrusted relay(UR), a multi-UR network through amplify-and-forward (AF) cooperative scheme is put forward, which takes relay weight and harmful factor into account. A nonzero-sum game is established to capture the interaction among URs and detection strategies. Secrecy capacity is investigated as game payoff to indicate the untrusted behaviors of the relays. The maximum probabilities of the behaviors of relay and the optimal system detection strategy can be obtained by using the proposed algorithm.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700