메뉴 건너뛰기




Volumn 66, Issue 7, 2017, Pages 6268-6279

Antieavesdropping with Selfish Jamming in Wireless Networks: A Bertrand Game Approach

Author keywords

Bertrand game; eavesdropping; game theory; jamming; security; wireless networks

Indexed keywords

COMPETITION; COSTS; GAME THEORY; NETWORK LAYERS; SECURITY SYSTEMS; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 85029212593     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2016.2639827     Document Type: Article
Times cited : (32)

References (34)
  • 2
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Apr.
    • C. E. Shannon, "Communication theory of secrecy systems, " Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Apr. 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 3
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel, " Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 5
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct.
    • P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels, " IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    Gamal, H.E.3
  • 6
    • 4544354908 scopus 로고    scopus 로고
    • Correlated jamming on MIMO Gaussian fading channels
    • Sep.
    • A. Kashyap, T. Basar, and R. Srikant, "Correlated jamming on MIMO Gaussian fading channels, " IEEE Trans. Inf. Theory, vol. 50, no. 9, pp. 2119-2123, Sep. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.9 , pp. 2119-2123
    • Kashyap, A.1    Basar, T.2    Srikant, R.3
  • 7
    • 44049095259 scopus 로고    scopus 로고
    • Spatially-correlated jamming in Gaussian multiple access and broadcast channels
    • Mar.
    • M. H. Brady, M. Mohseni, and J. M. Cioffi, "Spatially-correlated jamming in gaussian multiple access and broadcast channels, " in Proc. Inf. Sci. Syst., Mar. 2006, pp. 1635-1639.
    • (2006) Proc. Inf. Sci. Syst. , pp. 1635-1639
    • Brady, M.H.1    Mohseni, M.2    Cioffi, J.M.3
  • 8
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming
    • Jun.
    • E. Tekin and A. Yener, "The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 9
    • 84883785476 scopus 로고    scopus 로고
    • Improving physical layer secrecy using full-duplex jamming receivers
    • Jun.
    • G. Zheng, I. Krikidis, J. Li, A. P. Petropulu, and B. Ottersten, "Improving physical layer secrecy using full-duplex jamming receivers, " IEEE Trans. Signal Process., vol. 61, no. 20, pp. 4962-4974, Jun. 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.20 , pp. 4962-4974
    • Zheng, G.1    Krikidis, I.2    Li, J.3    Petropulu, A.P.4    Ottersten, B.5
  • 11
    • 84992213754 scopus 로고    scopus 로고
    • Game theorybased active defense for intrusion detection in cyber-physical embedded systems
    • Oct.
    • K. Wang, M. Du, D. Yang, C. Zhu, J. Shen, and Y. Zhang, "Game theorybased active defense for intrusion detection in cyber-physical embedded systems, " ACM Trans. Embedded Comput. Syst., vol. 16, no. 1, Oct. 2016, Art. no. 18.
    • (2016) ACM Trans. Embedded Comput. Syst. , vol.16 , Issue.1
    • Wang, K.1    Du, M.2    Yang, D.3    Zhu, C.4    Shen, J.5    Zhang, Y.6
  • 12
    • 84859087475 scopus 로고    scopus 로고
    • Nash equilibrium of node cooperation based on metamodel for MANETs
    • Mar.
    • K. Wang and M. Wu, "Nash equilibrium of node cooperation based on metamodel for MANETs, " J. Inf. Sci. Eng., vol. 28, no. 2, pp. 317-333, Mar. 2012.
    • (2012) J. Inf. Sci. Eng. , vol.28 , Issue.2 , pp. 317-333
    • Wang, K.1    Wu, M.2
  • 13
    • 84921773816 scopus 로고    scopus 로고
    • Secure relay and jammer selection for physical layer security
    • Jan.
    • H. Hui, A. L. Swindlehurst, G. Li, and J. Liang, "Secure relay and jammer selection for physical layer security, " IEEE Signal Process. Lett., vol. 22, no. 8, pp. 1147-1151, Jan. 2015.
    • (2015) IEEE Signal Process. Lett. , vol.22 , Issue.8 , pp. 1147-1151
    • Hui, H.1    Swindlehurst, A.L.2    Li, G.3    Liang, J.4
  • 14
    • 84883287296 scopus 로고    scopus 로고
    • Coping with a smart jammer in wireless networks: AStackelberg game approach
    • Jul.
    • D. Yang, G. Xue, J. Zhang, A. Richa, and X. Fang, "Coping with a smart jammer in wireless networks: AStackelberg game approach, " IEEE Trans. Wireless Commun., vol. 12, no. 8, pp. 4038-4047, Jul. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.8 , pp. 4038-4047
    • Yang, D.1    Xue, G.2    Zhang, J.3    Richa, A.4    Fang, X.5
  • 15
    • 48049102969 scopus 로고    scopus 로고
    • The Gaussian multiple access wire-tap channel: Wireless secrecy and cooperative jamming
    • Feb.
    • E. Tekin, "The Gaussian multiple access wire-tap channel: Wireless secrecy and cooperative jamming, " in Proc. Inf. Theory Appl. Workshop, Feb. 2007, pp. 404-413.
    • (2007) Proc. Inf. Theory Appl. Workshop , pp. 404-413
    • Tekin, E.1
  • 16
    • 76649135514 scopus 로고    scopus 로고
    • Physical layer security game: Interaction between source, eavesdropper, and friendly jammer
    • Mar.
    • Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Physical layer security game: Interaction between source, eavesdropper, and friendly jammer, " EURASIP J. Wireless Commun. Netw., vol. 2009, no. 11, pp. 1-10, Mar. 2009.
    • (2009) EURASIP J. Wireless Commun. Netw. , vol.2009 , Issue.11 , pp. 1-10
    • Han, Z.1    Marina, N.2    Debbah, M.3    Hjørungnes, A.4
  • 17
    • 84922280033 scopus 로고    scopus 로고
    • Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing
    • Jan.
    • Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, "Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing, " IEICE Trans. Commun., vol. E98-B, no. 1, pp. 190-200, Jan. 2015.
    • (2015) IEICE Trans. Commun. , vol.E98-B , Issue.1 , pp. 190-200
    • Fu, Z.1    Sun, X.2    Liu, Q.3    Zhou, L.4    Shu, J.5
  • 18
    • 84926455204 scopus 로고    scopus 로고
    • Social network and tag sources based augmenting collaborative recommender system
    • Apr.
    • T. Ma et al., "Social network and tag sources based augmenting collaborative recommender system, " IEICE Trans. Inf. Syst., vol. E98-D, no. 4, pp. 902-910, Apr. 2015.
    • (2015) IEICE Trans. Inf. Syst. , vol.E98-D , Issue.4 , pp. 902-910
    • Ma, T.1
  • 19
    • 84983268338 scopus 로고    scopus 로고
    • Towards efficient content-aware search over encrypted outsourced data in cloud
    • Apr.
    • Z. Fu, X. Sun, S. Ji, and G. Xie, "Towards efficient content-aware search over encrypted outsourced data in cloud, " in Proc. IEEE INFOCOM, Apr. 2016, pp. 1-6.
    • (2016) Proc. IEEE INFOCOM , pp. 1-6
    • Fu, Z.1    Sun, X.2    Ji, S.3    Xie, G.4
  • 20
    • 77953552937 scopus 로고    scopus 로고
    • Cooperative communications based on trust model for mobile ad hoc networks
    • Jun.
    • K. Wang and M. Wu, "Cooperative communications based on trust model for mobile ad hoc networks, " IET Inf. Security, vol. 4, no. 2, pp. 68-79, Jun. 2010.
    • (2010) IET Inf. Security , vol.4 , Issue.2 , pp. 68-79
    • Wang, K.1    Wu, M.2
  • 21
    • 85015100023 scopus 로고    scopus 로고
    • Attack detection and distributed forensics in machine-to-machine networks
    • Nov.
    • K. Wang, M. Du, Y. Sun, A. Vinel, and Y. Zhang, "Attack detection and distributed forensics in machine-to-machine networks, " IEEE Netw., vol. 30, no. 6, pp. 49-55, Nov. 2016.
    • (2016) IEEE Netw. , vol.30 , Issue.6 , pp. 49-55
    • Wang, K.1    Du, M.2    Sun, Y.3    Vinel, A.4    Zhang, Y.5
  • 22
    • 84904649422 scopus 로고    scopus 로고
    • On secrecy capacity of Gaussian wiretap channel aided by a cooperative jammer
    • Jul.
    • L. Li, Z. Chen, and J. Fang, "On secrecy capacity of Gaussian wiretap channel aided by a cooperative jammer, " IEEE Signal Process. Lett., vol. 21, no. 11, pp. 1356-1360, Jul. 2014.
    • (2014) IEEE Signal Process. Lett. , vol.21 , Issue.11 , pp. 1356-1360
    • Li, L.1    Chen, Z.2    Fang, J.3
  • 23
    • 84873097542 scopus 로고    scopus 로고
    • Improving secrecy rate via spectrum leasing for friendly jamming
    • Dec.
    • I. Stanojev and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming, " IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 134-145, Dec. 2012.
    • (2012) IEEE Trans. Wireless Commun. , vol.12 , Issue.1 , pp. 134-145
    • Stanojev, I.1    Yener, A.2
  • 25
    • 84933037312 scopus 로고    scopus 로고
    • Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks
    • Jun.
    • D. Kapetanovic, G. Zheng, and F. Rusek, "Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks, " IEEE Commun. Mag., vol. 53, no. 6, pp. 21-27, Jun. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.6 , pp. 21-27
    • Kapetanovic, D.1    Zheng, G.2    Rusek, F.3
  • 26
    • 84862635573 scopus 로고    scopus 로고
    • Distributed beamforming for physical-layer security of two-way relay networks
    • Jul.
    • H. M. Wang, Q. Yin, and X. G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks, " IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.7 , pp. 3532-3545
    • Wang, H.M.1    Yin, Q.2    Xia, X.G.3
  • 27
    • 84994108270 scopus 로고    scopus 로고
    • An optimal jammer selection for improving physical-layer security in wireless networks with multiple jammers
    • Sep.
    • H. Huang, X. Zhang, X. Hu, P. Zhang, and Y. Li, "An optimal jammer selection for improving physical-layer security in wireless networks with multiple jammers, " in Proc. Int. Wireless Commun. Mobile Comput. Conf., Sep. 2016, pp. 719-724.
    • (2016) Proc. Int. Wireless Commun. Mobile Comput. Conf. , pp. 719-724
    • Huang, H.1    Zhang, X.2    Hu, X.3    Zhang, P.4    Li, Y.5
  • 28
    • 70349991516 scopus 로고    scopus 로고
    • Physical layer security game: How to date a girl with her boyfriend on the same table
    • May
    • Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Physical layer security game: How to date a girl with her boyfriend on the same table, " in Proc. GameNets, May 2009, pp. 287-294.
    • (2009) Proc. GameNets , pp. 287-294
    • Han, Z.1    Marina, N.2    Debbah, M.3    Hjørungnes, A.4
  • 29
    • 84881035358 scopus 로고    scopus 로고
    • Fairness-guaranteed pricing and power allocation with a friendly jammer against eavesdropping
    • Oct.
    • J. Yue, B. Yang, and X. Guan, "Fairness-guaranteed pricing and power allocation with a friendly jammer against eavesdropping, " in Proc. Int. Conf. Wireless Commun. Signal Process., Oct. 2012, pp. 1-6.
    • (2012) Proc. Int. Conf. Wireless Commun. Signal Process. , pp. 1-6
    • Yue, J.1    Yang, B.2    Guan, X.3
  • 32
    • 26444479778 scopus 로고
    • Optimization by simulated annealing
    • S. Kirkpatrick, C. Gelatt Jr., and M. Vecchi, "Optimization by simulated annealing, " Science, vol. 220, no. 4598, pp. 671-680, 1983.
    • (1983) Science , vol.220 , Issue.4598 , pp. 671-680
    • Kirkpatrick, S.1    Gelatt, C.2    Vecchi, M.3
  • 34
    • 79960596603 scopus 로고    scopus 로고
    • Improve physical layer security in cooperative wireless network using distributed auction games
    • Apr.
    • R. Zhang, L. Song, Z. Han, and B. Jiao, "Improve physical layer security in cooperative wireless network using distributed auction games, " in Proc. IEEE Conf. Comput. Commun. Workshops, Apr. 2011, pp. 18-23.
    • (2011) Proc. IEEE Conf. Comput. Commun. Workshops , pp. 18-23
    • Zhang, R.1    Song, L.2    Han, Z.3    Jiao, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.