Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper

被引:140
作者
Mukherjee, Amitav [1 ]
Swindlehurst, A. Lee [1 ]
机构
[1] Univ Calif Irvine, Dept Elect Engn & Comp Sci, Irvine, CA 92697 USA
基金
美国国家科学基金会;
关键词
Game theory; jamming; MIMO wiretap channel; Nash equilibria; physical layer security; secrecy rate; SECURE TRANSMISSION; ARTIFICIAL NOISE; SECRECY CAPACITY; FADING CHANNELS;
D O I
10.1109/TSP.2012.2222386
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper investigates reliable and covert transmission strategies in a multiple-input multiple-output (MIMO) wiretap channel with a transmitter, receiver and an adversarial wiretapper, each equipped with multiple antennas. In a departure from existing work, the wiretapper possesses a novel capability to act either as a passive eavesdropper or as an active jammer, under a half-duplex constraint. The transmitter therefore faces a choice between allocating all of its power for data, or broadcasting artificial interference along with the information signal in an attempt to jam the eavesdropper (assuming its instantaneous channel state is unknown). To examine the resulting trade-offs for the legitimate transmitter and the adversary, we model their interactions as a two-person zero-sum game with the ergodic MIMO secrecy rate as the payoff function. We first examine conditions for the existence of pure-strategy Nash equilibria (NE) and the structure of mixed-strategy NE for the strategic form of the game. We then derive equilibrium strategies for the extensive form of the game where players move sequentially under scenarios of perfect and imperfect information. Finally, numerical simulations are presented to examine the equilibrium outcomes of the various scenarios considered.
引用
收藏
页码:82 / 91
页数:10
相关论文
共 32 条
[1]   Half-Duplex Active Eavesdropping in Fast-Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme [J].
Amariucai, George T. ;
Wei, Shuangqing .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (07) :4660-4677
[2]  
[Anonymous], 1991, Game Theory
[3]  
[Anonymous], 1998, FUNDEMENTALS STAT SI
[4]  
Bayesteh A., 2004, PROC 42 ALLERTON C C, P401
[5]  
Cheong S. L. Y., 1978, IEEE T INFORM THEORY, V24, P451
[6]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[7]   The worst additive noise under a covariance constraint [J].
Diggavi, SN ;
Cover, TM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (07) :3072-3081
[8]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189
[9]   Correlated jamming on MIMO Gaussian fading channels [J].
Kashyap, A ;
Basar, T ;
Srikant, R .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2004, 50 (09) :2119-2123
[10]   Secure Transmission With Multiple Antennas-Part II: The MIMOME Wiretap Channel [J].
Khisti, Ashish ;
Wornell, Gregory W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (11) :5515-5532