Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme

In this paper, a coordinated multiple-relays-based cooperative communication scheme is proposed to improve the physical-layer security. In order to benefit the relays in forwarding the signals for defending against the eavesdropping attacks, the interactions between the source and the multiple relays are modeled as a single-leader multiple-followers Stackelberg game. The source plays as the leader to coordinate the relays, including the phase of signals forwarded by the relays and the transmit power of the relays, for maximizing the secrecy capacity of the system. An algorithm is developed for the relays to find an optimal price allocation to achieve the fairness among the multiple relays based on the egalitarian welfare solution, and an approximate optimal strategy of source (i.e., phase coordinated vector and power allocation) is studied. The closed-form intercept probability of the proposed scheme is derived. Numerical studies demonstrate that the proposed scheme can greatly improve the utilities of both the source and multiple relays over that resulted from the Nash equilibrium scheme and rand scheme, which means that the relays are more willing to participate in the cooperative communication, and the source can achieve better secure transmission based on the proposed scheme. It is also shown that the proposed scheme performs much better in defending against the eavesdropping attacks than those existing schemes, for example, the single relay selection scheme, the opportunistic relay selection scheme, the optimal relay scheme, and cooperative jamming scheme.

[1]  Branka Vucetic,et al.  A Physical-Layer Rateless Code for Wireless Channels , 2013, IEEE Transactions on Communications.

[2]  Octavia A. Dobre,et al.  Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.

[3]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[4]  Erik G. Larsson,et al.  Competition Versus Cooperation on the MISO Interference Channel , 2008, IEEE Journal on Selected Areas in Communications.

[5]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[6]  Lifeng Wang,et al.  Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks , 2016, IEEE Transactions on Communications.

[7]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[8]  Shuguang Cui,et al.  Price-Based Spectrum Management in Cognitive Radio Networks , 2008, IEEE J. Sel. Top. Signal Process..

[9]  H. Vincent Poor,et al.  Security Enhancement of Cooperative Single Carrier Systems , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Ning Zhang,et al.  Security-aware Cooperation in Cognitive Radio Networks , 2014, SpringerBriefs in Computer Science.

[11]  Raef Bassily,et al.  Deaf Cooperation and Relay Selection Strategies for Secure Communication in Multiple Relay Networks , 2013, IEEE Transactions on Signal Processing.

[12]  Sungwook Kim Multi-leader multi-follower Stackelberg model for cognitive radio spectrum sharing scheme , 2012, Comput. Networks.

[13]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[14]  Kwok Hung Li,et al.  Relay Selection for Secure Successive AF Relaying Networks With Untrusted Nodes , 2016, IEEE Transactions on Information Forensics and Security.

[15]  Christopher Leckie,et al.  A Game Theoretical Approach to Defend Against Co-Resident Attacks in Cloud Computing: Preventing Co-Residence Using Semi-Supervised Learning , 2016, IEEE Transactions on Information Forensics and Security.

[16]  Naveen K. Chilamkurti,et al.  Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment , 2016, IEEE Transactions on Dependable and Secure Computing.

[17]  Zhu Han,et al.  Interference Improves PHY Security for Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.

[18]  Aydin Behnad,et al.  Distributed Resource Allocation for Multihop Decode-and-Forward Relay Systems , 2015, IEEE Transactions on Vehicular Technology.

[19]  Kin K. Leung,et al.  Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.

[20]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[21]  Rainer Böhme,et al.  Game Theory and Adaptive Steganography , 2016, IEEE Transactions on Information Forensics and Security.

[22]  Sergio Barbarossa,et al.  IEEE TRANSACTIONS ON SIGNAL PROCESSING (ACCEPTED) 1 The MIMO Iterative Waterfilling Algorithm , 2022 .

[23]  Mihaela van der Schaar,et al.  Bargaining Strategies for Networked Multimedia Resource Management , 2007, IEEE Transactions on Signal Processing.

[24]  Wenyu Luo,et al.  Cooperative Interference Based on Evolutionary Game in Wire-Tap Channel , 2014 .

[25]  Francis Minhthang Bui,et al.  Delay-Aware Optimization of Physical Layer Security in Multi-Hop Wireless Body Area Networks , 2016, IEEE Transactions on Information Forensics and Security.

[26]  Li Xu,et al.  Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks , 2017, Appl. Math. Comput..

[27]  Minyi Guo,et al.  Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs , 2015, IEEE Transactions on Parallel and Distributed Systems.

[28]  K. J. Ray Liu,et al.  Evolutionary cooperative spectrum sensing game: how to collaborate? , 2010, IEEE Transactions on Communications.

[29]  Mérouane Debbah,et al.  Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.

[30]  Lajos Hanzo,et al.  Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.

[31]  Lajos Hanzo,et al.  Physical-layer authentication for wireless security enhancement: current challenges and future developments , 2016, IEEE Communications Magazine.