Jamming game for secure OFDMA systems

In a communication system, security and reliability have an important impact on the quality of services. In this paper, we investigate power and subcarrier allocation of a transmitter over the downlink of an OFDMA system with security considerations among users in the presence of a jammer. This paper considers the interaction between the jammer and the transmitter as a zero-sum game where the objective function is the transmitter's secrecy sum-rate. In order to allocate available resources, we solve the optimization problem of each player to characterize their optimal strategies. Considering the intractability of the closed form Nash equilibrium for general power regime, we show the existence of pure Nash equilibrium point for low total power regimes of the transmitter and the jammer and attain an expression for each regime. Finally, we examine the jamming power effect on the secrecy sum-rate and acquire lower and upper bounds of this rate using simulations.

[1]  Feten Slimeni,et al.  Closed Form Expression of the Saddle Point in Cognitive Radio and Jammer Power Allocation Game , 2016, CrownCom.

[2]  Alan R. Washburn,et al.  Two-Person Zero-Sum Games , 2003 .

[3]  Pramod K. Varshney,et al.  Strategic Power Allocation With Incomplete Information in the Presence of a Jammer , 2016, IEEE Transactions on Communications.

[4]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[5]  Jing Wang,et al.  Joint power allocation and artificial noise design for multiuser wiretap OFDM channels , 2013, 2013 IEEE International Conference on Communications (ICC).

[6]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[7]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[8]  Miguel R. D. Rodrigues,et al.  A zero-sum power allocation game in the parallel Gaussian wiretap channel with an unfriendly jammer , 2012, 2012 IEEE International Conference on Communication Systems (ICCS).

[9]  Eiji Okamoto,et al.  Multi-user chaos MIMO-OFDM scheme for physical layer multi-access security , 2014 .

[10]  Derrick Wing Kwan Ng,et al.  Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks , 2011, IEEE Transactions on Wireless Communications.

[11]  Meixia Tao,et al.  Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks , 2011, IEEE Transactions on Information Forensics and Security.

[12]  Munnujahan Ara,et al.  Secure communications with D2D cooperation , 2015, 2015 International Conference on Communications, Signal Processing, and their Applications (ICCSPA'15).

[13]  Eduard A. Jorswieck,et al.  Resource allocation for the wire-tap multi-carrier broadcast channel , 2008, 2008 International Conference on Telecommunications.

[14]  Jing Wang,et al.  Optimal Power Allocation for OFDM-Based Wire-Tap Channels with Arbitrarily Distributed Inputs , 2011, WICON.

[15]  Derrick Wing Kwan Ng,et al.  Resource Allocation for Secure OFDMA Networks with Imperfect CSIT , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[16]  Munnujahan Ara,et al.  A zero-sum power allocation game over OFDM Gaussian wiretap channel with dual jamming , 2015, 2015 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE).

[17]  Linglong Dai,et al.  Secure communication in TDS-OFDM system using constellation rotation and noise insertion , 2010, IEEE Transactions on Consumer Electronics.

[18]  Chong-Yung Chi,et al.  Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.