Coalition formation game of dual-identity nodes for improving PHY security of wireless networks

In wireless communication, coalitional game theory has been a promising approach for analyzing cooperative networks to improve the physical layer security. In this paper, we propose a new model in which each user acts as a dual-identity node, a data source or a friendly jammer, and then formulize the cooperation problem based on the proposed model as a coalitional game. Furthermore, we propose a novel distributed algorithm based on “merge-and-split rules”, based on which the dual-identity nodes can mutually effect and cooperate into disjoint independent coalitions which can maximize the total secrecy capacity of all the users with a fixed power constraint. Finally, the coalitional structure is got and the validity of the proposed algorithm is verified by the simulation results as improving the secrecy capacity of each user comparing with the non-cooperative case. In addition, the self-adaption of the network's topology is also studied.

[1]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[2]  Andreas Witzel,et al.  A Generic Approach to Coalition Formation , 2007, IGTR.

[3]  Dusit Niyato,et al.  Coalition-Based Cooperative Packet Delivery under Uncertainty: A Dynamic Bayesian Coalitional Game , 2013, IEEE Transactions on Mobile Computing.

[4]  Zhu Han,et al.  Physical layer security game: How to date a girl with her boyfriend on the same table , 2009, 2009 International Conference on Game Theory for Networks.

[5]  Walid Saad,et al.  Overlapping coalition formation games for cooperative interference management in small cell networks , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[6]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[7]  Roger B. Myerson,et al.  Game theory - Analysis of Conflict , 1991 .

[8]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[9]  Zhu Han,et al.  Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..