2010
DOI: 10.1155/2009/452907
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer

Abstract: Physical layer security is an emerging security area that achieves perfect secrecy data transmission between intended network nodes, while malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdroppers. We investigate the interaction between the source that transmits the useful data and friendly jammers who assist the source by "masking" the eavesdropper. To obtain distributed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
86
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 97 publications
(87 citation statements)
references
References 22 publications
(31 reference statements)
1
86
0
Order By: Relevance
“…Proof: It suffices to show that (19) is the solution of the winning jammer's J w(α,β) utility maximization problem over P J w(α,β) under the constraint R S α, β; P J w(α,β) ≥ R S,2 (α, β). This maximization problem is also illustrated in Figure 5.…”
Section: Theorem 2 Under the Rule In Definition 1 The Powermentioning
confidence: 99%
See 2 more Smart Citations
“…Proof: It suffices to show that (19) is the solution of the winning jammer's J w(α,β) utility maximization problem over P J w(α,β) under the constraint R S α, β; P J w(α,β) ≥ R S,2 (α, β). This maximization problem is also illustrated in Figure 5.…”
Section: Theorem 2 Under the Rule In Definition 1 The Powermentioning
confidence: 99%
“…To conclude this section, the outcome of the auction, as given by (19), constitutes the follower's response in the Stackelberg framework and the Stackelberg equilibrium thus reads…”
Section: Theorem 2 Under the Rule In Definition 1 The Powermentioning
confidence: 99%
See 1 more Smart Citation
“…In information-theoretic security, there exists a substantial number of works following the seminal work of [28], focusing on analysis of channel secrecy even when eavesdroppers have unlimited resources [12,15,23,25]. Other works include game-theoretic approaches for power allocation to jammers [6] and also identifying "forbidden" regions where eavesdroppers must not be present. However, the geometry has not been fully explored and optimization schemes providing guarantees are not presented.…”
Section: Contributionsmentioning
confidence: 99%
“…where p (l) t = P {x ∈ T l−1 } is the probability that a node in level l has a GN in level l − 1, which results in (18). By substituting (22) into (21), we obtain (16).…”
Section: Lemma 4 (Average Energy Consumption)mentioning
confidence: 99%