Secrecy Anti-jamming Game Learning in D2D Underlay Cellular Networks with an Active Eavesdropper

In this paper, we study the physical layer security and transmission reliability problem where there is an active eavesdropper (AE) in the D2D underlaying cellular networks. We formulate the cooperation between the cellular user equipment (CUE) and the D2D user equipment (DUE), the completion between legitimate users and the AE to be a secrecy anti-jamming game. In the proposed game framework, DUE launches the cooperative relaying or the friendly jamming mode to help CUE to improve its anti-eavesdropping and anti-jamming performance. CUE gives different-level rewards for the assistance of the DUE. And AE shifts its attacking modes between actively jamming and passively eavesdropping to maximize the destruction for the D2D underlaying cellular networks. Under the perfect information, we prove the existence of the pure-strategy equilibrium of the proposed game. Under the imperfect information, we analyze the existence of the mixed-strategy equilibrium of the proposed game and propose a distributed Q-Iearning-based algorithm to converge to a mixed-strategy equilibrium. Simulation results show that the proposed algorithm is convergent and verify that average utilities of legitimate users are improved by the cooperation between CUE and DUE.

[1]  Walid Saad,et al.  Mode Selection and Resource Allocation in Device-to-Device Communications: A Matching Game Approach , 2017, IEEE Transactions on Mobile Computing.

[2]  Ekram Hossain,et al.  Distributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach , 2015, IEEE Transactions on Communications.

[3]  Zhu Han,et al.  Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective , 2017, IEEE Transactions on Communications.

[4]  Derrick Wing Kwan Ng,et al.  Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.

[5]  Xiang Cheng,et al.  Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2016, 2015 IEEE Global Communications Conference (GLOBECOM).

[6]  Xuelong Li,et al.  Secrecy-Optimized Resource Allocation for Device-to-Device Communication Underlaying Heterogeneous Networks , 2017, IEEE Transactions on Vehicular Technology.

[7]  Xiang Zhang,et al.  Partner Selection and Incentive Mechanism for Physical Layer Security , 2015, IEEE Transactions on Wireless Communications.

[8]  Kun Zhu,et al.  Joint Mode Selection and Spectrum Partitioning for Device-to-Device Communication: A Dynamic Stackelberg Game , 2015, IEEE Transactions on Wireless Communications.

[9]  A. Lee Swindlehurst,et al.  Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.

[10]  Adnan Yazici,et al.  Game theory based secure wireless powered D2D communications with cooperative jamming , 2017, 2017 Wireless Days.

[11]  Azzam Al-Nahari,et al.  Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers , 2016, IET Commun..

[12]  Walid Saad,et al.  Game Theory in Wireless and Communication Networks: Preface , 2011 .

[13]  Lajos Hanzo,et al.  Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.