Towards Physical Layer Security systems design using Game Theory approaches

被引:0
作者
Ortega Silva, Nicolas Matias [1 ]
Valencia Cordero, Claudio [1 ]
机构
[1] Univ Santiago Chile, Dept Ingn Elect, Santiago, Chile
来源
2017 CHILEAN CONFERENCE ON ELECTRICAL, ELECTRONICS ENGINEERING, INFORMATION AND COMMUNICATION TECHNOLOGIES (CHILECON) | 2017年
关键词
Physical Layer Security; Second Order Cone Programming; Secrecy Capacity; Wireless Communications; WIRE-TAP CHANNEL; ARTIFICIAL NOISE;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the huge develop of low consumption wireless devices both for industry and human wellness and comfort, such as Wireless Body Area Network for health active care and Wireless Sensors Networks for industry environments, new challenges are proposed for the both industry and scientific community. Security is one of this matters. Given the specific characteristics of the low consumptions modern devices, particular security mechanisms must be developed. Here we model a Physical Layer Security mechanism with Cooperative Jamming using Game Theory, in order to go deep into the study on how security of wireless low consumption devices can be improved. Main results shows that certainty on how Secrecy Capacity will behave on its lower and upper bounds is improved by the use of the mixed strategies suggested by the Second Order Cone Programming problem.
引用
收藏
页数:6
相关论文
共 20 条
[1]  
[Anonymous], 2005, Wireless Communications
[2]  
Barron E. N., 2002, WILEY SERIES OPERATI
[3]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[4]   Fight jamming with jamming - A game theoretic analysis of jamming attack in wireless networks and defense strategy [J].
Chen, Lin ;
Leneutre, Jean .
COMPUTER NETWORKS, 2011, 55 (09) :2259-2270
[5]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[6]  
Cumanan K., 2017, PHYS LAYER SECURITY
[7]  
Ghaderi Majid, 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON), P505, DOI 10.1109/SAHCN.2013.6645022
[8]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189
[9]  
Grant M. C., 2017, Tech. Rep.
[10]  
LEUNGYANCHEONG SK, 1978, IEEE T INFORM THEORY, V24, P451, DOI 10.1109/TIT.1978.1055917