Wireless physical layer network coding in potential presence of malicious relays – incomplete information game approach

A wireless physical layer network coding (WPLNC) technique in a decentralised and distributed relay network where a maliciously behaving relay may be present is studied. Most research has optimistically assumed altruistic cooperation of relays. The malicious node can lead to a significant disorder among the other relays by selecting its own WPLNC mapping. This scenario is described as a static (single-shot) incomplete information game where a node type – either friendly or malicious – of the relay is its private information. The focus is on the existence of particular equilibria given the probability of the presence of a malicious node.

[1]  Yao-Win Peter Hong,et al.  A Game Theoretic Approach for the Cooperative Network with the Presence of Malicious Relays , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[2]  Alister G. Burr,et al.  Layered Design of Hierarchical Exclusive Codebook and Its Capacity Regions for HDF Strategy in Parametric Wireless 2-WRC , 2011, IEEE Transactions on Vehicular Technology.

[3]  Nasir D. Memon,et al.  Detecting Malicious Behavior in Cooperative Diversity , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[4]  Mainak Chatterjee,et al.  Coexistence with malicious nodes: A game theoretic approach , 2009, 2009 International Conference on Game Theory for Networks.

[5]  Toshiaki Koike-Akino,et al.  Optimized constellations for two-way wireless relaying with physical network coding , 2009, IEEE Journal on Selected Areas in Communications.

[6]  Michael Gastpar,et al.  Compute-and-Forward: Harnessing Interference Through Structured Codes , 2009, IEEE Transactions on Information Theory.

[7]  John C. Harsanyi,et al.  Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..

[8]  Armin Wittneben,et al.  Achievable Rate Regions for the Two-way Relay Channel , 2006, 2006 IEEE International Symposium on Information Theory.

[9]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[10]  Muriel Médard,et al.  XORs in the Air: Practical Wireless Network Coding , 2006, IEEE/ACM Transactions on Networking.