2016
DOI: 10.1109/twc.2015.2498934
|View full text |Cite
|
Sign up to set email alerts
|

A Game Theoretic Analysis of Secret and Reliable Communication With Active and Passive Adversarial Modes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
43
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 64 publications
(44 citation statements)
references
References 29 publications
1
43
0
Order By: Relevance
“…For example, physical-layer IDS presented neither in the work of Spuhler et al 14 nor in the work of Chiang and Hu 15 is analyzed in terms of asymptotic complexity. The same case stands with other physical-layer detection schemes presented in other works, [16][17][18][19] in which asymptotic analysis is not presented. Main contribution of this work involves analyzing asymptotic performance of the proposed PLIDS 20 in terms of computational complexity, space complexity, and input scale.…”
Section: Motivations and Contributionssupporting
confidence: 65%
See 2 more Smart Citations
“…For example, physical-layer IDS presented neither in the work of Spuhler et al 14 nor in the work of Chiang and Hu 15 is analyzed in terms of asymptotic complexity. The same case stands with other physical-layer detection schemes presented in other works, [16][17][18][19] in which asymptotic analysis is not presented. Main contribution of this work involves analyzing asymptotic performance of the proposed PLIDS 20 in terms of computational complexity, space complexity, and input scale.…”
Section: Motivations and Contributionssupporting
confidence: 65%
“…Similarly, detail of asymptotic performance is missing from physical‐layer IDSs presented in other works . Moreover, the PLIDS presented in the work of Yousaf et al also lacks asymptotic analysis for which asymptotic performance metric P is derived in Section 6.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Recent studies have shown interest on optimizing the EE of jamming attacker [3], [4]. Whereas optimal attacking strategies for hybrid attacker are designed in [5], [6] to achieve maximum degradation in the secrecy rate, however EE aspect has been neglected. Further, decoding-based energy-expenditures in eavesdropping and practical circuit-level consumption during jamming have been ignored while considering energy consumption at attacker [3]- [7].…”
Section: Introductionmentioning
confidence: 99%
“…In [17], nodes equipped with multiple antennas use the same logic: they transmit artificial noise selectively in the direction of the adversary, limiting it in the direction of the friend/desired user. Game theory can be used to study the optimization of reliability vs. secrecy for both legitimate nodes and eavesdroppers [18]. A review of cooperative techniques for enhancing the security can be found in [19].…”
Section: Physical-layer Securitymentioning
confidence: 99%