Combating Full-Duplex Active Eavesdropper: A Game-Theoretic Perspective

被引:1
|
作者
Tang, Xiao [1 ,2 ]
Ren, Pinyi [1 ]
Han, Zhu [3 ]
机构
[1] Xi An Jiao Tong Univ, Dept Informat & Commun Engn, Xian 710049, Peoples R China
[2] Xi An Jiao Tong Univ, Shaanxi Smart Networks & Ubiquitous Access Res Ct, Xian 710049, Peoples R China
[3] Univ Houston, Dept Elect & Comp Engn, Houston, TX 77004 USA
关键词
PHYSICAL-LAYER SECURITY; WIRELESS NETWORKS;
D O I
10.1109/ICC.2016.7510988
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security issue is of paramount importance yet significant challenge for wireless communications, and this problem can be even more intricate when facing with a full-duplex adversary. In this paper, we investigate the physical layer security of a legitimate transmission link in the presence of a full-duplex active eavesdropper, who is capable to perform eavesdropping and jamming simultaneously. The legitimate user aims at a target secrecy rate while the eavesdropper intends to maximize its wiretap rate. To this end, the eavesdropper imposes a jamming signal at the legitimate receiver to stimulate higher-power legitimate transmissions and thus facilitates its eavesdropping. This, however, generates residual self-interference at the eavesdropper itself and is subject to a linear price for the jamming power. The problem is then formulated within a game-theoretic framework, where the closed-form strategies of both the legitimate user and active eavesdropper are obtained. Moreover, we analyze the performance in terms of secrecy outage probability for the legitimate link in such a hostile situation. Also provided are the simulation results which validate our theoretical analysis.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective
    Tang, Xiao
    Ren, Pinyi
    Wang, Yichen
    Han, Zhu
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2017, 65 (03) : 1379 - 1395
  • [2] Power-Efficient Secure Transmission Against Full-Duplex Active Eavesdropper: A Game-Theoretic Framework
    Tang, Xiao
    Ren, Pinyi
    Han, Zhu
    [J]. IEEE ACCESS, 2017, 5 : 24632 - 24645
  • [3] Game-Theoretic Learning Approaches for Secure D2D Communications Against Full-Duplex Active Eavesdropper
    Luo, Yijie
    Feng, Zhibin
    Jiang, Han
    Yang, Yang
    Huang, Yuzhen
    Yao, Junnan
    [J]. IEEE ACCESS, 2019, 7 : 41324 - 41335
  • [4] GAME-THEORETIC RESOURCE ALLOCATION FOR FULL-DUPLEX COMMUNICATIONS
    Song, Lingyang
    Li, Yonghui
    Han, Zhu
    [J]. IEEE WIRELESS COMMUNICATIONS, 2016, 23 (03) : 50 - 56
  • [5] Wiretap Channel With Full-Duplex Proactive Eavesdropper: A Game Theoretic Approach
    Huang, Wei
    Chen, Wei
    Bai, Bo
    Han, Zhu
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (08) : 7658 - 7663
  • [6] Secure Transmission in the Presence of Full-Duplex Active Eavesdropper
    Liu, Chenxi
    Lee, Jemin
    Quek, Tony Q. S.
    [J]. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [7] PHYSICAL LAYER SECURITY GAME WITH FULL-DUPLEX PROACTIVE EAVESDROPPER
    Huang, Wei
    Chen, Wei
    Bai, Bo
    Zhou, Shidong
    Han, Zhu
    [J]. 2016 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2016, : 992 - 996
  • [8] A Game-Theoretic Approach for Power Control in a Full-duplex Femto-Relay Network
    Ahmad, Abdel-Mehsen
    Faraj, Omair
    Saty, Ali
    Mostrah, Abbas
    El Bazzal, Zouhair
    [J]. 2018 SIXTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION, NETWORKING, AND WIRELESS COMMUNICATIONS (DINWC), 2018, : 37 - 42
  • [9] D2D Friendly Jamming and Cooperative Relaying for Combating a Full-Duplex Active Eavesdropper
    Army Engineering University of PLA, Nanjing, China
    [J]. Int. Conf. Commun. Technol. Proc. ICCT, 2019, (572-577):
  • [10] Cooperation for secrecy in presence of an active eavesdropper: A game-theoretic analysis
    School of Electrical Engineering, ACCESS Linnaeus Center, Royal Institute of Technology , SE-100 44 Stockholm, Sweden
    [J]. Proc. Int. Symp. Wirel. Commun. Syst., (281-285): : 281 - 285