Tree Formation with Physical Layer Security Considerations in Wireless Multi-Hop Networks

被引:40
作者
Saad, Walid [1 ]
Zhou, Xiangyun [2 ]
Maham, Behrouz [3 ]
Basar, Tamer [4 ,6 ,7 ]
Poor, H. Vincent [5 ]
机构
[1] Univ Miami, Dept Elect & Comp Engn, Coral Gables, FL 33124 USA
[2] Australian Natl Univ, Res Sch Engn, Canberra, ACT 0200, Australia
[3] Univ Tehran, Sch Elect & Comp Engn, Tehran, Iran
[4] Univ Illinois, Coordinated Sci Lab, Urbana, IL 61801 USA
[5] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
[6] Univ Illinois, Ctr Adv Study, Urbana, IL 61801 USA
[7] Univ Illinois, Informat Trust Inst, Urbana, IL 61801 USA
基金
澳大利亚研究理事会;
关键词
Physical layer security; network formation; game theory; multi-hop networks; COMMUNICATION; ACCESS;
D O I
10.1109/TWC.2012.091812.111923
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Physical layer security has emerged as a promising technique that complements existing cryptographic approaches and enables the securing of wireless transmissions against eavesdropping. In this paper, the impact of optimizing physical layer security metrics on the architecture and interactions of the nodes in multi-hop wireless networks is studied. In particular, a game-theoretic framework is proposed using which a number of nodes interact and choose their optimal and secure communication paths in the uplink of a wireless multi-hop network, in the presence of eavesdroppers. To this end, a tree formation game is formulated in which the players are the wireless nodes that seek to form a network graph among themselves while optimizing their multi-hop secrecy rates or the path qualification probabilities, depending on their knowledge of the eavesdroppers' channels. To solve this game, a distributed tree formation algorithm is proposed and is shown to converge to a stable Nash network. Simulation results show that the proposed approach yields significant performance gains in terms of both the average bottleneck secrecy rate per node and the average path qualification probability per node, relative to classical best-channel algorithms and the single-hop star network. The results also assess the properties and characteristics of the resulting Nash networks.
引用
收藏
页码:3980 / 3991
页数:12
相关论文
共 48 条
[1]  
3GPP, FURTH ADV E UTRA PHY
[2]  
Andrews J., 2007, FUNDAMENTALS WIMAX, Vfirst
[3]  
[Anonymous], P 46 ANN ALL C COMM
[4]  
[Anonymous], 2010, Fundamentals of LTE
[5]  
[Anonymous], 2010, SOCIAL EC NETWORKS
[6]  
[Anonymous], 2002, BOUNDED RATIONALITY
[7]  
Camp J., 2008, IEEE COMMUN MAG, V46
[8]   Cooperative strategies and optimal scheduling for tree networks [J].
de Baynast, Alexandre ;
Gurewitz, Omer ;
Knightly, Edward W. .
INFOCOM 2007, VOLS 1-5, 2007, :1857-+
[9]  
Demange G, 2005, GROUP FORMATION IN ECONOMICS: NETWORKS, CLUBS, AND COALITIONS, P1, DOI 10.1017/CBO9780511614385
[10]  
Derks J., P 2008 3 WORLD C GAM