Applications of Game Theory for Physical Layer Security

This chapter provides a comprehensive review of the domain of game theory based physical layer security in wireless communications. By exploiting the wireless channel characteristic and secure cooperation of nodes, physical layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, without relying on higher-layer encryption. However, the selfness of nodes seriously affects the secure cooperation; game theory can model the influence of the selfness on physical layer security. This chapter firstly describes the physical layer security issues in the wireless networks and the role of game theory in the research on physical layer security. And then the typical applications of game theory in physical layer security are subsequently covered, including zero-sum game, Stackelberg game, auction theory, coalition game. Finally, the chapter concludes with observations on potential research directions in this area.

[1]  Michael R. Bartolacci,et al.  Research, Practice, and Educational Advancements in Telecommunications and Networking , 2012 .

[2]  M. Falch Handbook of Research on Global Diffusion of Broadband Data Transmission , 2008 .

[3]  Matt Jones Selected Readings on Telecommunications and Networking , 1970 .

[4]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[5]  Samir Chatterjee,et al.  International Journal of Business Data Communications and Networking , 2010 .

[6]  H. Vincent Poor,et al.  Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization , 2011, IEEE Transactions on Information Forensics and Security.

[7]  Zhu Han,et al.  Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[8]  Wathiq Mansoor,et al.  Distributed Resources Management in Wireless LANs , 2006, Int. J. Bus. Data Commun. Netw..

[9]  R. Srikant,et al.  Correlated Jamming on MIMO Gaussian Fading Channels , 2004, IEEE Trans. Inf. Theory.

[10]  Dan Pescaru,et al.  Data Processing and Exchange Challenges in Video-Based Wireless Sensor Networks , 2014 .

[11]  Mohd Nazri Ismail,et al.  Network Analyzer Development Comparison with Independent Data and Benchmark Products: Network Traffic Utilization , 2010, Int. J. Interdiscip. Telecommun. Netw..

[12]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[13]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[14]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[15]  Nei Kato,et al.  Multi-Path Video Streaming in Wireless Networks using Time-Slot based Scheduling , 2008, Int. J. Bus. Data Commun. Netw..

[16]  Zhu Han,et al.  Coalitional game theory for communication networks , 2009, IEEE Signal Processing Magazine.

[17]  Nick Antonopoulos,et al.  Optimising P2P Networks by Adaptive Overlay Construction , 2009 .

[18]  Amin A. Shaqrah Antecedents of Security Pillars in E-Commerce Applications , 2011, Int. J. Bus. Data Commun. Netw..

[19]  Yogesk K. Dwivedi,et al.  A Longitudinal Study to Investigate Consumer/User Adoption and Use of Broadband in the Netherlands , 2008 .

[20]  Yang Cao,et al.  Distributed coalition formation for selfish relays and eavesdroppers in wireless networks: A job-hopping game , 2012, 2012 International Conference on Wireless Communications and Signal Processing (WCSP).

[21]  Y. K. Dwivedi Development of Survey Instrument: Confirmatory Survey , 2008 .

[22]  T. Başar,et al.  A Stackelberg Network Game with a Large Number of Followers , 2002 .

[23]  Gabriel-Miro Muntean,et al.  Convergence of Broadband, Broadcast, and Cellular Network Technologies , 2014 .

[24]  Debashis Saha,et al.  Web-Based Multimedia Advancements in Data Communications and Networking Technologies , 2012 .

[25]  Fabio Tosti,et al.  FDTD Simulation of the GPR Signal for Preventing the Risk of Accidents due to Pavement Damages , 2014, Int. J. Interdiscip. Telecommun. Netw..

[26]  Jeffrey G. Andrews,et al.  Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.

[27]  A. Lee Swindlehurst,et al.  Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.

[28]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[29]  Zhu Han,et al.  Distributed Coalition Formation of Relay and Friendly Jammers for Secure Cooperative Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[30]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[31]  Bruce Schneier,et al.  Cryptographic Design Vulnerabilities , 1998, Computer.

[32]  J. L. Massey,et al.  An introduction to contemporary cryptology , 1988, Proc. IEEE.

[33]  Ye Ouyang,et al.  A Dimensioning Study for UMTS Core Networks , 2010, Int. J. Bus. Data Commun. Netw..

[34]  George Pallis,et al.  Integrating Caching Techniques in CDNs using a Classification Approach , 2008, Int. J. Bus. Data Commun. Netw..

[35]  Hui Yu,et al.  Secrecy capacity optimization in coordinated multi-point processing , 2013, 2013 IEEE International Conference on Communications (ICC).

[36]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[37]  An Wang,et al.  A Stackelberg security game with cooperative jamming over a multiuser OFDMA network , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[38]  Mario Gerla,et al.  Physical layer security in wireless smart grid , 2012, IEEE Communications Magazine.

[39]  Chetna Singhal,et al.  Resource Allocation in Heterogeneous Broadband Wireless Access Networks , 2014 .

[40]  Lawrence M. Ausubel An Efficient Ascending-Bid Auction for Multiple Objects , 2004 .

[41]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.