User cooperation analysis under eavesdropping attack: A game theory perspective

In this paper, the user cooperation behaviors under eavesdropping attack are analyzed through game theory. Considering the physical layer security, we prove that the conventional cooperation scheme actually deteriorates the secrecy performance compared to the direct transmission, given that the eavesdropper has a better channel condition to the users than the destination. In this case, the necessary condition of the cooperation that the users should obtain additional utilities from the cooperation is not satisfied, which makes the users have no incentive to participate in the cooperation game. In order to motivate users, an adaptive cooperation scheme is designed to improve the secrecy performance even if the eavesdropping channel is superior to the destination's channel, and it is also observed that the mutual cooperation is one of the Nash equilibriums. We further exploit the Stackelberg game with a punishment mechanism to make the mutual cooperation as the unique Nash equilibrium.

[1]  Can Emre Koksal,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.

[2]  Elza Erkip,et al.  Cooperative network implementation using open-source platforms , 2009, IEEE Communications Magazine.

[3]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[4]  Mohammad Reza Pakravan,et al.  A Game-Theoretic Approach for Power Allocation in Bidirectional Cooperative Communication , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[5]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[6]  Zhu Han,et al.  Auction-Based Resource Allocation for Cooperative Communications , 2008, IEEE Journal on Selected Areas in Communications.

[7]  Aylin Yener,et al.  Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming , 2013, IEEE Transactions on Wireless Communications.

[8]  Elisa Bertino,et al.  A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[9]  Zhu Han,et al.  Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..

[10]  Aggelos Bletsas,et al.  A simple Cooperative diversity method based on network path selection , 2005, IEEE Journal on Selected Areas in Communications.

[11]  Shalinee Kishore,et al.  A game-theoretic analysis of decode-and-forward user cooperation , 2008, IEEE Transactions on Wireless Communications.

[12]  Li Sun,et al.  Secrecy-enhanced cooperation scheme with multiuser diversity in wireless relay networks , 2013 .

[13]  Zhu Han,et al.  Distributed Relay Selection and Power Control for Multiuser Cooperative Communication Networks Using Stackelberg Game , 2009, IEEE Transactions on Mobile Computing.

[14]  Behnaam Aazhang,et al.  User Cooperation for Energy-Efficient Cellular Communications , 2010, 2010 IEEE International Conference on Communications.

[15]  Elza Erkip,et al.  User cooperation diversity. Part I. System description , 2003, IEEE Trans. Commun..

[16]  An Wang,et al.  A Stackelberg security game with cooperative jamming over a multiuser OFDMA network , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[17]  Zhu Han,et al.  Physical layer security: Coalitional games for distributed cooperation , 2009, 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.

[18]  Ashutosh Sabharwal,et al.  Design, Implementation, and Characterization of a Cooperative Communications System , 2011, IEEE Transactions on Vehicular Technology.

[19]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[20]  Xi Fang,et al.  Game theory in cooperative communications , 2012, IEEE Wireless Communications.