2017
DOI: 10.1109/tvt.2017.2731983
|View full text |Cite
|
Sign up to set email alerts
|

A Game With Randomly Distributed Eavesdroppers in Wireless Ad Hoc Networks: A Secrecy EE Perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 41 publications
0
5
0
Order By: Relevance
“…In [271], the advantages of massive MIMO relaying are utilized to improve the secure EE which is specially defined as the ratio of the secrecy outage capacity to the total power consumption. Moreover, the energy-efficient secure communication over a large-scale wireless network is studied by the combined application of game theory and stochastic geometry in [272]. An alternating optimization scheme is proposed therein for maximizing the secure EE of the legitimate transmitters by controlling the node activation probability, confidential message rate, redundancy rate, and the number of active antennas.…”
Section: ) Maximization Of Secure Eementioning
confidence: 99%
“…In [271], the advantages of massive MIMO relaying are utilized to improve the secure EE which is specially defined as the ratio of the secrecy outage capacity to the total power consumption. Moreover, the energy-efficient secure communication over a large-scale wireless network is studied by the combined application of game theory and stochastic geometry in [272]. An alternating optimization scheme is proposed therein for maximizing the secure EE of the legitimate transmitters by controlling the node activation probability, confidential message rate, redundancy rate, and the number of active antennas.…”
Section: ) Maximization Of Secure Eementioning
confidence: 99%
“…In addition, Subba et al proposed an intrusion detection scheme based on the Bayesian game model for wireless ad hoc networks. More recent studies on game theoretic framework of defending wireless ad hoc networks can be found in [4446] etc.…”
Section: Related Workmentioning
confidence: 99%
“…In [16], an evolutionary game is formulated for a wireless sensor network in which each sensor chooses the transmission power that maximizes the secrecy rate while minimizing the energy consumed. More recently, in [17], the authors investigated the security of a large scale wireless network containing both legitimate transmitters and eavesdroppers. The legitimate transmitters seek to find the optimal probability of node activation that maximizes their secrecy energy efficiency whereas the eavesdroppers find the probability of node activation that minimizes their energy efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…Centralized approaches are not favorable for IoBT as they incur significant communication and computation overhead. Further, existing approaches either maximize the secrecy capacity such as in [16] and [17] or minimize data redundancy such as in [10,11,12]. Thus, there is no existing scheme that minimizes data redundancy while maximizing the secrecy capacity.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation