481 research outputs found

    Applications of Repeated Games in Wireless Networks: A Survey

    Full text link
    A repeated game is an effective tool to model interactions and conflicts for players aiming to achieve their objectives in a long-term basis. Contrary to static noncooperative games that model an interaction among players in only one period, in repeated games, interactions of players repeat for multiple periods; and thus the players become aware of other players' past behaviors and their future benefits, and will adapt their behavior accordingly. In wireless networks, conflicts among wireless nodes can lead to selfish behaviors, resulting in poor network performances and detrimental individual payoffs. In this paper, we survey the applications of repeated games in different wireless networks. The main goal is to demonstrate the use of repeated games to encourage wireless nodes to cooperate, thereby improving network performances and avoiding network disruption due to selfish behaviors. Furthermore, various problems in wireless networks and variations of repeated game models together with the corresponding solutions are discussed in this survey. Finally, we outline some open issues and future research directions.Comment: 32 pages, 15 figures, 5 tables, 168 reference

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Cooperative Relaying In Power Line Environment: A Survey and Tutorial

    Get PDF
    Exchange of information is essential in any society and the demand for faster, cheaper, and secure communications is increasing every day. With other hi-tech initiatives like IPv6 and Internet-of-Things (IOT) already in the horizon, demand for broadband is set to escalate beyond its current level. Inherently laden in the challenges posed by this technology are fresh opportunities in terms of penetration of data services into rural communities and development of innovative strategies for more efficient use of the grid. Though still in its developmental phase/stage, Power Line Communication (PLC) has grown beyond theoretical fantasy to become a reality. The proofs are the readily available PLC systems that can be purchased off the shelfto achieve in-house networking and the much talked about, smart metering technology; generally regarded as the “new bride” in utilities industry. One of the biggest gains of PLC is its use of existing electrical cables, thereby eliminating cost of installation and maintenance of data cables. However, given that the power infrastructure was traditionally built to deliver electricity, data signals do suffer various forms of distortions and impairments as they transit it. This paper presents a tutorial on the deployed wireless system technique which is to be adapted to PLC scenario for the purpose of managing the available source energy for achieving reliable communication system. One of these techniques is the cooperative diversity. Its application and deployment in power line environment is explored. The improvement achieved through cooperative diversity in some PLC systems were presented along with the associated limitations. Finally, future areas of research which will further improve the reliability of PLC systems and reduce its power consumption during transmission is shown
    • …
    corecore