971 research outputs found

    Truth-Telling Mechanism for Two-Way Relay Selection for Secrecy Communications With Energy-Harvesting Revenue

    Get PDF
    This paper brings the novel idea of paying the utility to the winning agents in terms of some physical entity in cooperative communications. Our setting is a secret two-way communication channel where two transmitters exchange information in the presence of an eavesdropper. The relays are selected from a set of interested parties, such that the secrecy sum rate is maximized. In return, the selected relay nodes' energy harvesting requirements will be fulfilled up to a certain threshold through their own payoff so that they have the natural incentive to be selected and involved in the communication. However, relays may exaggerate their private information in order to improve their chance to be selected. Our objective is to develop a mechanism for relay selection that enforces them to reveal the truth since otherwise they may be penalized. We also propose a joint cooperative relay beamforming and transmit power optimization scheme based on an alternating optimization approach. Note that the problem is highly non-convex, since the objective function appears as a product of three correlated Rayleigh quotients. While a common practice in the existing literature is to optimize the relay beamforming vector for given transmit power via rank relaxation, we propose a second-order cone programming-based approach in this paper, which requires a significantly lower computational task. The performance of the incentive control mechanism and the optimization algorithm has bee

    Secure Full-Duplex Device-to-Device Communication

    Get PDF
    This paper considers full-duplex (FD) device-to-device (D2D) communications in a downlink MISO cellular system in the presence of multiple eavesdroppers. The D2D pair communicate sharing the same frequency band allocated to the cellular users (CUs). Since the D2D users share the same frequency as the CUs, both the base station (BS) and D2D transmissions interfere each other. In addition, due to limited processing capability, D2D users are susceptible to external attacks. Our aim is to design optimal beamforming and power control mechanism to guarantee secure communication while delivering the required quality-of-service (QoS) for the D2D link. In order to improve security, artificial noise (AN) is transmitted by the BS. We design robust beamforming for secure message as well as the AN in the worst-case sense for minimizing total transmit power with imperfect channel state information (CSI) of all links available at the BS. The problem is strictly non-convex with infinitely many constraints. By discovering the hidden convexity of the problem, we derive a rank-one optimal solution for the power minimization problem.Comment: Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 201

    Secure Full-Duplex Device-to-Device Communication

    Get PDF
    This paper considers full-duplex (FD) device-to-device (D2D) communications in a downlink MISO cellular system in the presence of multiple eavesdroppers. The D2D pair communicate sharing the same frequency band allocated to the cellular users (CUs). Since the D2D users share the same frequency as the CUs, both the base station (BS) and D2D transmissions interfere each other. In addition, due to limited processing capability, D2D users are susceptible to external attacks. Our aim is to design optimal beamforming and power control mechanism to guarantee secure communication while delivering the required quality-of-service (QoS) for the D2D link. In order to improve security, artificial noise (AN) is transmitted by the BS. We design robust beamforming for secure message as well as the AN in the worst-case sense for minimizing total transmit power with imperfect channel state information (CSI) of all links available at the BS. The problem is strictly non-convex with infinitely many constraints. By discovering the hidden convexity of the problem, we derive a rank-one optimal solution for the power minimization problem.Comment: Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 201

    Blockchain-based distributive auction for relay-assisted secure communications

    Get PDF
    Physical layer security (PLS) is considered as a promising technique to prevent information eavesdropping in wireless systems. In this context, cooperative relaying has emerged as a robust solution for achieving PLS due to multipath diversity and relatively lower transmission power. However, relays or the relay operators in the practical environment are unwilling for service provisioning unless they are incentivized for their cost of services. Thus, it is required to jointly consider network economics and relay cooperation to improve system efficiency. In this paper, we consider the problem of joint network economics and PLS using cooperative relaying and jamming. Based on the double auction theory, we model the interaction between transmitters seeking for a particular level of secure transmission of information and relay operators for suitable relay and jammer assignment, in a multiple source-destination networks. In addition, theoretical analyses are presented to justify that the proposed auction mechanism satisfies the desirable economic properties of individual rationality, budget balance, and truthfulness. As the participants in the traditional centralized auction framework may take selfish actions or collude with each other, we propose a decentralized and trustless auction framework based on blockchain technology. In particular, we exploit the smart contract feature of blockchain to construct a completely autonomous framework, where all the participants are financially enforced by smart contract terms. The security properties of the proposed framework are also discussed

    Applications of Repeated Games in Wireless Networks: A Survey

    Full text link
    A repeated game is an effective tool to model interactions and conflicts for players aiming to achieve their objectives in a long-term basis. Contrary to static noncooperative games that model an interaction among players in only one period, in repeated games, interactions of players repeat for multiple periods; and thus the players become aware of other players' past behaviors and their future benefits, and will adapt their behavior accordingly. In wireless networks, conflicts among wireless nodes can lead to selfish behaviors, resulting in poor network performances and detrimental individual payoffs. In this paper, we survey the applications of repeated games in different wireless networks. The main goal is to demonstrate the use of repeated games to encourage wireless nodes to cooperate, thereby improving network performances and avoiding network disruption due to selfish behaviors. Furthermore, various problems in wireless networks and variations of repeated game models together with the corresponding solutions are discussed in this survey. Finally, we outline some open issues and future research directions.Comment: 32 pages, 15 figures, 5 tables, 168 reference
    • …
    corecore