Achieving Secure Communication in CRN with Malicious Energy Harvester Using Game Theory

被引:0
作者
Ghosh, Saptarshi [1 ]
Bhatnagar, Manav R. [1 ,2 ]
Singh, Ajay [3 ]
Panigrahi, Bijaya K. [1 ,2 ]
机构
[1] Indian Inst Technol Delhi, Dept Elect Engn, Hauz Khas, New Delhi 110016, India
[2] Indian Inst Technol Delhi, Bharti Sch Telecommun Tech & Mgmt, Hauz Khas, New Delhi 110016, India
[3] NIT Hamirpur, Dept Elect & Commun Engn, Hamirpur 177005, Himachal Prades, India
来源
2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2016年
关键词
Cognitive radio network; eavesdropping; energy harvesting; physical layer security; Stackelberg game; SIMULTANEOUS WIRELESS INFORMATION; PHYSICAL LAYER SECURITY; POWER TRANSFER; TRANSMISSION; ALLOCATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, an underlay based cognitive radio network (CRN) consisting of a secondary base station (SBS), a secondary receiver (SR), an energy harvesting node (EHN), and a primary transmitter-receiver (PT-PR) pair, is considered. The EHN is assumed to have a power splitter (PS) at the receiver to decode information and harvest energy simultaneously from the SBS transmission, thus reducing the secrecy capacity of SBS. Since both the SBS and the malicious EHN are selfish with conflicting interests, we model the interaction between them as a non-cooperative Stackelberg game. The objective of the SBS is to maximize the secrecy rate and minimize its interference at the PR, whereas the EHN aims at maximizing both the energy it can harvest and the information it can decode from the received SBS signal. The existence of a unique equilibrium point is proved through mathematical analysis. Further, a distributed algorithm is proposed, following which the players will attain the equilibrium of the game as predicted by analytical results. Analytical and simulation results demonstrate that both SBS and EHN can achieve their optimal utilities by adopting the equilibrium strategy.
引用
收藏
页数:7
相关论文
共 19 条
  • [1] [Anonymous], 2010, P 2010 IEEE GLOB TEL
  • [2] [Anonymous], 1991, Game Theory
  • [3] [Anonymous], P IEEE MIL COMM C OR
  • [4] Boyd S, 2004, CONVEX OPTIMIZATION
  • [5] Improving Wireless Physical Layer Security via Cooperating Relays
    Dong, Lun
    Han, Zhu
    Petropulu, Athina P.
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) : 1875 - 1888
  • [6] Robust Secure Transmission in MISO Simultaneous Wireless Information and Power Transfer System
    Feng, Renhai
    Li, Quanzhong
    Zhang, Qi
    Qin, Jiayin
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (01) : 400 - 405
  • [7] Govindaraj R, 2016, PR IEEE COMP DESIGN, P141, DOI 10.1109/ICCD.2016.7753272
  • [8] Shannon meets Tesla: Wireless information and power transfer
    Grover, Pulkit
    Sahai, Anant
    [J]. 2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 2363 - 2367
  • [9] Kulkarni R.G., 2008, Atlantic Electr. J. Math., V3, P56
  • [10] Game-Theoretic Hierarchical Resource Allocation for Heterogeneous Relay Networks
    Liang, Liang
    Feng, Gang
    Jia, Yunjian
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (04) : 1480 - 1492