481 research outputs found
Applications of Repeated Games in Wireless Networks: A Survey
A repeated game is an effective tool to model interactions and conflicts for
players aiming to achieve their objectives in a long-term basis. Contrary to
static noncooperative games that model an interaction among players in only one
period, in repeated games, interactions of players repeat for multiple periods;
and thus the players become aware of other players' past behaviors and their
future benefits, and will adapt their behavior accordingly. In wireless
networks, conflicts among wireless nodes can lead to selfish behaviors,
resulting in poor network performances and detrimental individual payoffs. In
this paper, we survey the applications of repeated games in different wireless
networks. The main goal is to demonstrate the use of repeated games to
encourage wireless nodes to cooperate, thereby improving network performances
and avoiding network disruption due to selfish behaviors. Furthermore, various
problems in wireless networks and variations of repeated game models together
with the corresponding solutions are discussed in this survey. Finally, we
outline some open issues and future research directions.Comment: 32 pages, 15 figures, 5 tables, 168 reference
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Cooperative Relaying In Power Line Environment: A Survey and Tutorial
Exchange of information is essential in any society and the demand for faster, cheaper, and secure
communications is increasing every day. With other hi-tech initiatives like IPv6 and Internet-of-Things (IOT) already
in the horizon, demand for broadband is set to escalate beyond its current level. Inherently laden in the challenges
posed by this technology are fresh opportunities in terms of penetration of data services into rural communities and
development of innovative strategies for more efficient use of the grid. Though still in its developmental phase/stage,
Power Line Communication (PLC) has grown beyond theoretical fantasy to become a reality. The proofs are the
readily available PLC systems that can be purchased off the shelfto achieve in-house networking and the much talked
about, smart metering technology; generally regarded as the “new bride” in utilities industry. One of the biggest gains
of PLC is its use of existing electrical cables, thereby eliminating cost of installation and maintenance of data cables.
However, given that the power infrastructure was traditionally built to deliver electricity, data signals do suffer various
forms of distortions and impairments as they transit it. This paper presents a tutorial on the deployed wireless system
technique which is to be adapted to PLC scenario for the purpose of managing the available source energy for
achieving reliable communication system. One of these techniques is the cooperative diversity. Its application and
deployment in power line environment is explored. The improvement achieved through cooperative diversity in some
PLC systems were presented along with the associated limitations. Finally, future areas of research which will further
improve the reliability of PLC systems and reduce its power consumption during transmission is shown
- …