Behavior prediction of untrusted relays based on nonzero-sum game

Xiaomei Fu , Xiao Wu , Qing Wang

Transactions of Tianjin University ›› 2015, Vol. 21 ›› Issue (4) : 371 -376.

PDF
Transactions of Tianjin University ›› 2015, Vol. 21 ›› Issue (4) : 371 -376. DOI: 10.1007/s12209-015-2520-y
Article

Behavior prediction of untrusted relays based on nonzero-sum game

Author information +
History +
PDF

Abstract

To keep the secrecy performance from being badly influenced by untrusted relay(UR), a multi-UR network through amplify-and-forward (AF) cooperative scheme is put forward, which takes relay weight and harmful factor into account. A nonzero-sum game is established to capture the interaction among URs and detection strategies. Secrecy capacity is investigated as game payoff to indicate the untrusted behaviors of the relays. The maximum probabilities of the behaviors of relay and the optimal system detection strategy can be obtained by using the proposed algorithm.

Keywords

physical layer security / cooperative communication / untrusted relay / secrecy capacity / nonzero-sum game

Cite this article

Download citation ▾
Xiaomei Fu, Xiao Wu, Qing Wang. Behavior prediction of untrusted relays based on nonzero-sum game. Transactions of Tianjin University, 2015, 21(4): 371-376 DOI:10.1007/s12209-015-2520-y

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

Shannon C E. Communication theory of secrecy systems[J]. The Bell System Technical Journal, 1949, 28(4): 656-715.

[2]

Wyner A D. The wire-tap channel[J]. The Bell System Technical Journal, 1975, 54(8): 1355-1387.

[3]

Leung-Yan-Cheong S K, Hellman M E. The Gaussian wire-tap channel[J]. IEEE Transactions on Information Theory, 1978, 24(4): 451-456.

[4]

Elia P E, Vinodh K, Anand M, et al. D-MG tradeoff and optimal codes for a class of AF and DF cooperative communication protocols[J]. IEEE Transactions on Information Theory, 2009, 55(7): 3161-3185.

[5]

Chen S, Wang W, Zhang X, et al. Performance analysis of OSTBC transmission in amplify-andforward cooperative relay networks[J]. IEEE Transactions on Vehicular Technology, 2010, 59(1): 105-113.

[6]

Hou L, Fu Xiaomei. Physical layer security with dynamic behavior cooperator based on coalitional game[J]. IET Communications, 2014, 8(8): 1258-1264.

[7]

Mao Y, Wu Min. Tracing malicious relays in cooperative wireless communications[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(2): 198-212.

[8]

Karin Sallhammar. Stochastic Models for Combined Security and Dependability Evaluation[D], 2007, Norway: Norwegian University of Science and Technology.

[9]

Zhu Q, Tembine H, Basar Tamer. Network security configurations: A nonzero-sum stochastic game approach[C]. American Control Conference(ACC), 2010.

[10]

Mukherjee A, Swindlehurst A L. Jamming games in the MIMO wiretap channel with an active eavesdropper[J]. IEEE Transactions on Signal Processing, 2013, 61(1): 82-91.

[11]

Zhang R, Song L, Zhu H, et al. Physical layer security for two-way untrusted relaying with friendly jammers[J]. IEEE Transactions on Vehicular Technology, 2012, 61(8): 3693-3704.

[12]

Wood A D, Stankovic J A, Zhou G. DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks[C]. 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2007.

[13]

Fu X, Zhang L, Wang D, et al. Secrecy performance of untrusted relay's cooperation under fading channels[J]. Transactions of Tianjin University, 2011, 17(6): 440-445.

[14]

Yuksel M, Liu X, Erkip E. A secure communication game with a relay helping the eavesdropper[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 818-830.

[15]

Yuksel M, Liu X, Erkip E. A secrecy game with an informed jammer relay[C]. IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, 2010.

[16]

Lin S-C, Lin P-Hsun. On secrecy capacity of fast fading multiple-input wiretap channels with statistical CSIT[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(2): 414-419.

[17]

Mangasarian O L, Stone H. Two-person nonzero-sum games and quadratic programming[J]. Journal of Mathematical Analysis and Applications, 1964, 9(3): 348-355.

AI Summary AI Mindmap
PDF

110

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/