A method for physical layer security cooperation based on evolutionary game

被引:0
作者
Huang, Kai-Zhi [1 ]
Hong, Ying [1 ]
Luo, Wen-Yu [1 ]
Lin, Sheng-Bin [1 ]
机构
[1] National Digital Switching System Engineering and Technological Research Center, Zhengzhou
来源
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology | 2015年 / 37卷 / 01期
关键词
Cooperative interference; Eavesdropper; Evolutionary game; Network security; Secrecy rate; Wireless communication;
D O I
10.11999/JEIT140309
中图分类号
学科分类号
摘要
In wireless networks, when using traditional game studying physical layer security, the energy-limited transmission nodes tend to choose a non-cooperative strategy in order to maximize their own secrecy rate, resulting in reduced network secrecy rate. To solve this problem, this paper presents a method for physical layer security cooperation based on evolutionary game. Firstly, this study defines strategies (sending artificial noise or signal) and benefits (secrecy rate under different strategy combination) according to evolutionary game; then, the transmission nodes adjust strategy to maximize benefits based on current network state and difference between cooperation utility and average expected utility; finally, the conditions that the transmitting nodes can achieve stable cooperation, are obtained, and the network evolution from an unstable state to a stable collaboration state improves the secrecy rate of the system. The simulation and analysis results show that under the Gaussian channel conditions, compared to traditional game method, the proposed method's network secrecy rate can be improved 1 bit/(s·Hz). ©, 2014, Science Press. All right reserved.
引用
收藏
页码:193 / 199
页数:6
相关论文
共 17 条
[1]  
Gupta P., Kumar P., The capacity of wireless networks, IEEE Transactions on Information Theory, 46, 2, pp. 388-404, (2000)
[2]  
Wyner A.D., The wire-tap channel, Bell System Technical Journal, 54, 8, pp. 1355-1387, (1975)
[3]  
Liu R., Maric I., Spasojevic P., Et al., Discrete memoryless interference and broadcast channels with confidential messages: secrecy rate regions, IEEE Transactions on Information Theory, 54, 6, pp. 2493-2507, (2008)
[4]  
Jorswieck E., Lai L.-F., Ma W.-K., Signal processing for wireless physical layer security, IEEE Journal on Selected Areas in Communications, 31, 9, pp. 1657-1659, (2013)
[5]  
Marano S., Matta V., Achieving perfect secrecy by pdf band limited jamming, IEEE Signal Processing Letters, 21, 1, pp. 83-87, (2014)
[6]  
Liu B., Zhang L., Xin X., Physical layer security in OFDMPON based on dimension-transformed chaotic permutation, IEEE Photonics Technology Letters, 26, 2, pp. 127-130, (2014)
[7]  
Lin P.H., Lai S.H., Lin S.C., On secrecy rate of the generalized artificial-Noise assisted secure beamforming for wiretap channels, IEEE Journal on Selected Areas in Communications, 31, 9, pp. 1728-1740, (2013)
[8]  
Zhang R.-Q., Song L.-Y., Physical layer security for two-way untrusted relaying with friendly jammers, IEEE Transactions on Vehicular Technology, 61, 8, pp. 3693-3704, (2012)
[9]  
Zhou J., Security of wireless communication based on game theory, (2013)
[10]  
Manzoor A.K., Hamidou T., Athanasios V., Evolutionary coalitional games: design and challenges in wireless networks, IEEE Wireless Communications, 19, 2, pp. 50-56, (2012)