Cooperative jammer power allocation — A Nash bargaining solution method

In this paper, we investigate a multi-source multi-destination wireless communication network in the presence of an eavesdropper and a cooperative jammer. Nash bargaining solution (NBS) is introduced to investigate the negotiation among the sources on jammer power allocation. In order to improve the network sum-secrecy-rate and maintain sources' fairness at the same time, the optimization problem is formulated as a Nash bargaining game (NBG), which is proved to be a convex optimization problem. The effect of bargaining power selection on sum-secrecy-rate and sources' fairness is investigated analytically and a simple but efficient centralized algorithm is proposed to implement the NBS-based scheme. Simulation results validate the effectiveness and fairness of our proposed scheme.

[1]  Yindi Jing,et al.  Power Allocation in Multi-User Wireless Relay Networks through Bargaining , 2013, IEEE Transactions on Wireless Communications.

[2]  Zhu Han,et al.  Physical layer security game: How to date a girl with her boyfriend on the same table , 2009, 2009 International Conference on Game Theory for Networks.

[3]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .

[4]  Aylin Yener,et al.  Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming , 2013, IEEE Transactions on Wireless Communications.

[5]  Derrick Wing Kwan Ng,et al.  Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks , 2011, IEEE Transactions on Wireless Communications.

[6]  Xin-Ping Guan,et al.  Fairness-guaranteed pricing and power allocation with a friendly jammer against eavesdropping , 2012, 2012 International Conference on Wireless Communications and Signal Processing (WCSP).

[7]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[8]  A. Muthoo Bargaining Theory with Applications , 1999 .

[9]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[10]  An Wang,et al.  A Stackelberg security game with cooperative jamming over a multiuser OFDMA network , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[11]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[12]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[13]  Zhu Han,et al.  Improve physical layer security in cooperative wireless network using distributed auction games , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[14]  Behnaam Aazhang,et al.  User Cooperation for Energy-Efficient Cellular Communications , 2010, 2010 IEEE International Conference on Communications.

[15]  Zhu Han,et al.  Power Allocation for Two-Way Relay System Based on Sequential Second Price Auction , 2011, Wireless Personal Communications.

[16]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[17]  Dimitri P. Bertsekas,et al.  Nonlinear Programming , 1997 .