Combating Full-Duplex Active Eavesdropper: A Game-Theoretic Perspective

被引:1
|
作者
Tang, Xiao [1 ,2 ]
Ren, Pinyi [1 ]
Han, Zhu [3 ]
机构
[1] Xi An Jiao Tong Univ, Dept Informat & Commun Engn, Xian 710049, Peoples R China
[2] Xi An Jiao Tong Univ, Shaanxi Smart Networks & Ubiquitous Access Res Ct, Xian 710049, Peoples R China
[3] Univ Houston, Dept Elect & Comp Engn, Houston, TX 77004 USA
关键词
PHYSICAL-LAYER SECURITY; WIRELESS NETWORKS;
D O I
10.1109/ICC.2016.7510988
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security issue is of paramount importance yet significant challenge for wireless communications, and this problem can be even more intricate when facing with a full-duplex adversary. In this paper, we investigate the physical layer security of a legitimate transmission link in the presence of a full-duplex active eavesdropper, who is capable to perform eavesdropping and jamming simultaneously. The legitimate user aims at a target secrecy rate while the eavesdropper intends to maximize its wiretap rate. To this end, the eavesdropper imposes a jamming signal at the legitimate receiver to stimulate higher-power legitimate transmissions and thus facilitates its eavesdropping. This, however, generates residual self-interference at the eavesdropper itself and is subject to a linear price for the jamming power. The problem is then formulated within a game-theoretic framework, where the closed-form strategies of both the legitimate user and active eavesdropper are obtained. Moreover, we analyze the performance in terms of secrecy outage probability for the legitimate link in such a hostile situation. Also provided are the simulation results which validate our theoretical analysis.
引用
下载
收藏
页数:6
相关论文
共 50 条
  • [41] Small-Cell Sleeping and Association for Energy-Harvesting-Aided Cellular IoT With Full-Duplex Self-Backhauls: A Game-Theoretic Approach
    Cheng, Yulun
    Zhang, Jun
    Zhang, Jing
    Zhao, Haitao
    Yang, Longxiang
    Zhu, Hongbo
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (03) : 2304 - 2318
  • [42] Two-Way Full-Duplex Gaussian Channels With or Without Eavesdropper: Revisit
    Xia, Dengfeng
    Yang, Chuanchuan
    Dai, Bin
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (08) : 5434 - 5450
  • [43] An Oblivious Game-Theoretic Perspective of RRM in Vehicular Communications
    Chen, Xianfu
    Wu, Celimuge
    2020 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2020, : 85 - 89
  • [44] Migrating to IPv6: A Game-Theoretic Perspective
    Tuan Anh Trinh
    Gyarmati, Laszlo
    Sallai, Gyula
    IEEE LOCAL COMPUTER NETWORK CONFERENCE, 2010, : 344 - 347
  • [45] Competition policy: A game-theoretic perspective - Phlips,L
    Church, J
    ECONOMIC JOURNAL, 1997, 107 (444): : 1590 - 1592
  • [46] Competition policy: A game-theoretic perspective - Phlips,L
    Ordover, JA
    JOURNAL OF ECONOMIC LITERATURE, 1997, 35 (03) : 1408 - 1409
  • [47] Credibility, transparency, and sustainability in fashion: a game-theoretic perspective
    Nandkeolyar, Olivia
    Chen, Frederick
    AGRICULTURAL AND RESOURCE ECONOMICS REVIEW, 2023, 52 (01) : 43 - 70
  • [48] Game-theoretic perspective of Ping-Pong protocol
    Kaur, Hargeet
    Kumar, Atul
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2018, 490 : 1415 - 1422
  • [49] Nanoscale molecular communication networks: a game-theoretic perspective
    Jiang, Chunxiao
    Chen, Yan
    Liu, K. J. Ray
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2015,
  • [50] Distributed Protocols for Leader Election: A Game-Theoretic Perspective
    Abraham, Ittai
    Dolev, Danny
    Halpern, Joseph Y.
    ACM TRANSACTIONS ON ECONOMICS AND COMPUTATION, 2019, 7 (01)