Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming

Cooperative jamming paradigm in secure communications enlists network nodes to transmit noise or structured codewords, in order to impair the eavesdropper's ability to decode messages to be kept confidential from it. Such an approach can significantly help in facilitating secure communication between legitimate parties but, by definition, assumes dedicated and/or altruistic nodes willing to act as cooperative jammers. In this paper, it is demonstrated that cooperative jamming leads to meaningful secrecy rate improvements even when this assumption is removed. A distributed mechanism is developed that motivates jamming participation of otherwise non-cooperative terminals, by compensating them with an opportunity to use the fraction of legitimate parties' spectrum for their own data traffic. With the goal of maximizing their data transmission rate priced by the invested power, cooperative jammers provide the jamming/transmitting power that is generally proportional to the amount of leased bandwidth. The fully decentralized framework is facilitated through a game-theoretic model, with the legitimate parties as the spectrum owners acting as the game leader, and the set of assisting jammers constituting the follower. To facilitate the behavior of non-cooperative and competitive multiple jammers, auctioning and power control mechanisms are applied for a follower sub-game in a two-layer leader-follower game framework.

[1]  Aylin Yener,et al.  Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels , 2009, ArXiv.

[2]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[3]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[4]  Umberto Spagnolini,et al.  Spectrum Leasing to Cooperating Secondary Ad Hoc Networks , 2008, IEEE Journal on Selected Areas in Communications.

[5]  Zhu Han,et al.  Improved Wireless Secrecy Rate Using Distributed Auction Theory , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.

[6]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[7]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[8]  Sergio Barbarossa,et al.  Optimal Linear Precoding Strategies for Wideband Noncooperative Systems Based on Game Theory—Part I: Nash Equilibria , 2007, IEEE Transactions on Signal Processing.

[9]  Gerhard Kramer,et al.  A New Outer Bound and the Noisy-Interference Sum–Rate Capacity for Gaussian Interference Channels , 2007, IEEE Transactions on Information Theory.

[10]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[11]  Ender Tekin,et al.  The Gaussian multiple access wire-tap channel: wireless secrecy and cooperative jamming , 2007, 2007 Information Theory and Applications Workshop.

[12]  H. Vincent Poor,et al.  Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.

[13]  K. J. Ray Liu,et al.  Repeated open spectrum sharing game with cheat-proof strategies , 2009, IEEE Transactions on Wireless Communications.

[14]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[15]  James O'Daniell Neel,et al.  Analysis and Design of Cognitive Radio Networks and Distributed Radio Resource Management Algorithms , 2006 .

[16]  P. Klemperer Auction Theory: A Guide to the Literature , 1999 .

[17]  Merouane Debbah,et al.  Improved Wireless Secrecy Capacity using Distributed Auction Theory , 2009 .

[18]  H. Vincent Poor,et al.  Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.

[19]  Ender Tekin,et al.  Achievable Rates for the General Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy , 2006, ArXiv.

[20]  Eytan Modiano,et al.  Wireless channel allocation using an auction algorithm , 2006, IEEE Journal on Selected Areas in Communications.

[21]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[22]  Sennur Ulukus,et al.  Secrecy in Cooperative Relay Broadcast Channels , 2008, IEEE Transactions on Information Theory.

[23]  K. J. Ray Liu,et al.  An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.

[24]  Avraham Adler,et al.  Lambert-W Function , 2015 .

[25]  Aylin Yener,et al.  Cooperative jamming via spectrum leasing , 2011, 2011 International Symposium of Modeling and Optimization of Mobile, Ad Hoc, and Wireless Networks.

[26]  Te Sun Han,et al.  A new achievable rate region for the interference channel , 1981, IEEE Trans. Inf. Theory.

[27]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[28]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .

[29]  Venugopal V. Veeravalli,et al.  Gaussian Interference Networks: Sum Capacity in the Low-Interference Regime and New Outer Bounds on the Capacity Region , 2008, IEEE Transactions on Information Theory.

[30]  Aylin Yener,et al.  Recruiting multi-antenna transmitters as cooperative jammers: An auction-theoretic approach , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[31]  Zhu Han,et al.  Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..

[32]  Sergio Barbarossa,et al.  Optimal Linear Precoding Strategies for Wideband Non-Cooperative Systems Based on Game Theory—Part II: Algorithms , 2007, IEEE Transactions on Signal Processing.

[33]  Tuomas Sandholm,et al.  Issues in Computational Vickrey Auctions , 2000, Int. J. Electron. Commer..

[34]  Abhay Parekh,et al.  Spectrum sharing for unlicensed bands , 2005, IEEE Journal on Selected Areas in Communications.

[35]  Roy D. Yates,et al.  The Discrete Memoryless Multiple Access Channel with Confidential Messages , 2006, 2006 IEEE International Symposium on Information Theory.

[36]  Umberto Spagnolini,et al.  Cooperative ARQ via auction-based spectrum leasing , 2010, IEEE Transactions on Communications.