A zero-sum power allocation game in the parallel Gaussian wiretap channel with an unfriendly jammer

This paper investigates optimal power allocation strategies over a bank of independent parallel Gaussian wiretap channels where a legitimate transmitter and a legitimate receiver communicate in the presence of an eavesdropper and an unfriendly jammer. In particular, we formulate a zero-sum power allocation game between the transmitter and the jammer where the payoff function is the secrecy rate. We characterize the optimal power allocation strategies as well as the Nash equilibrium in some asymptotic regimes. We also provide a set of results that cast further insight into the problem. Our scenario, which is applicable to current OFDM communications systems, demonstrates that transmitters that adapt to jammer experience much higher secrecy rates than non-adaptive transmitters.

[1]  Robert J. McEliece,et al.  Communication in the Presence of Jamming-An Information-Theoretic Approach , 1983 .

[2]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[3]  Samuel Karlin,et al.  Mathematical Methods and Theory in Games, Programming, and Economics , 1961 .

[4]  A. Lee Swindlehurst,et al.  Equilibrium Outcomes of Dynamic Games in MIMO Channels with Active Eavesdroppers , 2010, 2010 IEEE International Conference on Communications.

[5]  Matthew S. Grob,et al.  CDMA/HDR: a bandwidth-efficient high-speed wireless data service for nomadic users , 2000, IEEE Commun. Mag..

[6]  Alan R. Washburn,et al.  Two-Person Zero-Sum Games , 2003 .

[7]  Matthieu R. Bloch,et al.  Friendly Jamming for Wireless Secrecy , 2010, 2010 IEEE International Conference on Communications.

[8]  Elza Erkip,et al.  A secure communication game with a relay helping the eavesdropper , 2009 .

[9]  Roy D. Yates,et al.  Secrecy capacity of independent parallel channels , 2009 .

[10]  Antonia Maria Tulino,et al.  Multiple-antenna capacity in the low-power regime , 2003, IEEE Trans. Inf. Theory.

[11]  Elza Erkip,et al.  A Secure Communication Game With a Relay Helping the Eavesdropper , 2009, IEEE Transactions on Information Forensics and Security.

[12]  Samuel Karlin,et al.  Mathematical Methods and Theory in Games, Programming, and Economics , 1961 .

[13]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[14]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[15]  Sennur Ulukus,et al.  Mutual Information Games in Multi-user Channels with Correlated Jamming , 2006, ArXiv.

[16]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[17]  David Tse,et al.  Shannon Meets Nash on the Interference Channel , 2010, IEEE Transactions on Information Theory.

[18]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[19]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..