On Two-Way Relay Channel with an Active Malicious Relay

被引:0
|
作者
Shao, Yi-Chi [1 ]
Chen, Meng-Hsi [2 ]
Lin, Shih-Chun [3 ]
Lin, W. Sabrina [4 ]
机构
[1] Georgia Inst Technol, Dept ECE, Atlanta, GA 30332 USA
[2] Univ Toronto, Dept ECE, Toronto, ON, Canada
[3] Natl Taiwan Univ Sci & Technol, Dept ECE, Taipei, Taiwan
[4] IBM Thomas J Watson Res Ctr, Yorktown Hts, NY USA
关键词
DIVERSITY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Two-way relay channel is a fundamental building block of cooperative wireless networks, where two source nodes exchange messages via relays. However, most works in the literature assume that all relays are fully cooperative and neglect the effect of possibly misbehaving. This paper investigates the security issues in a two-way relay channel where one of the relay nodes is compromised to malicious and actively attacking the communications. As for the cooperative relay in this channel, it adopts the celebrated analog network coding (ANC). We derive the optimal strategies of both relays by modeling the problem as a mutual information game and identifying the Nash equilibrium (NE) of the game. The cooperative and malicious relays are two players in the game and the achievable sum rates are adopted as the utility for the cooperative relay. We consider the scenario that relays can change transmission actions symbol by symbol in a codeword length and prove that the pure strategy NE exists which suggest the cooperative relay to always vary the amplifying coefficients of ANC symbol by symbol even for a fixed channel. The non-convex utility function is reformulated via proper linearization to obtain the closed-form solution of the optimal strategy. Furthermore, we also show that the attack strategies proposed by previous work, where malicious relay should always attack with its received signal when the channels are fixed, are suboptimal.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Capacity of Two-Way Relay Channel
    Zhang, Shengli
    Liew, Soung Chang
    Wang, Hui
    Lin, Xiaohui
    [J]. ACCESS NETWORKS, 2010, 37 : 219 - +
  • [2] Gaussian Two-Way Relay Channel with Private Information for the Relay
    Ho, Chin Keong
    Gowda, Kiran T.
    Sun, Sumei
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2012, 60 (02) : 306 - 311
  • [3] A Generalized Two-way Relay Channel with Private Information for the Relay
    Ho, Chin Keong
    Gowda, Kiran T.
    Sun, Sumei
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 1588 - 1593
  • [4] An Iterative Noncoherent Relay Receiver for the Two-way Relay Channel
    Ferrett, Terry
    Valenti, Matthew C.
    Torrieri, Don
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013, : 5903 - +
  • [5] On Two-Pair Two-Way Relay Channel with an Intermittently Available Relay
    Lin, Shih-Chun
    Wang, I-Hsiang
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 1901 - 1905
  • [6] The Two-Way Multi-Relay Channel
    Ponniah, Jonathan
    Xie, Liang-Liang
    Kumar, P. R.
    [J]. 2015 IEEE INFORMATION THEORY WORKSHOP (ITW), 2015,
  • [7] Secret Key Generation in the Two-Way Relay Channel With Active Attackers
    Zhou, Heng
    Huie, Lauren M.
    Lai, Lifeng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (03) : 476 - 488
  • [8] The Gaussian Two-way Relay Channel With Wiretapper
    Kim, Sungsoo
    Shin, Won-Yong
    Ishibashi, Koji
    [J]. 2011 CONFERENCE RECORD OF THE FORTY-FIFTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS (ASILOMAR), 2011, : 1987 - 1991
  • [9] Approaching the Capacity of Two-Way Gaussian Relay Channel with Relay Private Messages
    Ghabeli, Leila
    Derpich, Milan S.
    [J]. 2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 2729 - 2733
  • [10] Iterative Network and Channel Decoding for the Two-Way Relay Channel
    Hausl, Christoph
    Hagenauer, Joachim
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 1568 - 1573