期刊文献+

基于演化博弈机制的物理层安全协作方法 被引量:11

A Method for Physical Layer Security Cooperation Based on Evolutionary Game
下载PDF
导出
摘要 在无线网络中,当利用经典博弈机制研究物理层安全时,能量受限的发送端为了最大化自身安全速率,趋向于选择非协作策略,造成网络的安全速率降低。针对这一问题,该文提出一种基于演化博弈机制的物理层安全协作方法。首先,根据演化博弈机制定义策略(发送人工噪声或信号)和收益(不同策略组合下的安全速率);然后,发送端根据当前网络状态以及协作收益与平均期望收益的差值,不断进行策略调整以最大化收益;最后,通过求解获得使发送端达到协作稳定策略的条件,使网络从不稳定状态向协作稳定状态演化,从而提高了系统的安全速率。仿真和分析结果表明,在高斯信道条件下,相比经典博弈方法,该方法的发送端策略稳定在协作状态,网络安全速率可提高1 bit/(s?Hz)。 In wireless networks, when using traditional game studying physical layer security, the energy-limited transmission nodes tend to choose a non-cooperative strategy in order to maximize their own secrecy rate, resulting in reduced network secrecy rate. To solve this problem, this paper presents a method for physical layer security cooperation based on evolutionary game. Firstly, this study defines strategies(sending artificial noise or signal) and benefits(secrecy rate under different strategy combination) according to evolutionary game; then, the transmission nodes adjust strategy to maximize benefits based on current network state and difference between cooperation utility and average expected utility; finally, the conditions that the transmitting nodes can achieve stable cooperation, are obtained, and the network evolution from an unstable state to a stable collaboration state improves the secrecy rate of the system. The simulation and analysis results show that under the Gaussian channel conditions, compared to traditional game method, the proposed method’s network secrecy rate can be improved 1 bit/(s ?Hz).
出处 《电子与信息学报》 EI CSCD 北大核心 2015年第1期193-199,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61379006)资助课题
关键词 无线通信 网络安全 安全速率 演化博弈 协作干扰 窃听者 Wireless communication Network security Secrecy rate Evolutionary game Cooperative interference Eavesdropper
  • 相关文献

参考文献17

  • 1Gupta P and Kumar P. The capacity of wireless networks[J]. IEEE Transactions on Information Theory, 2000, 46(2): 388-404. 被引量:1
  • 2Wyner A D. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387. 被引量:1
  • 3Liu R, Maric I, Spasojevic P, et al.. Discrete memoryless interference and broadcast channels with confidential messages: secrecy rate regions[J]. IEEE Transactions on Information Theory, 2008, 54(6): 2493-2507. 被引量:1
  • 4Jorswieck E, Lai Li-feng, Ma Wing-kin. Signal processing for wireless physical layer security[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1657-1659. 被引量:1
  • 5Marano S and Matta V. Achieving perfect secrecy by pdf- bandlimited jamming[J]. IEEE Signal Processing Letters, 2014, 21(1): 83-87. 被引量:1
  • 6Liu B, Zhang L, and Xin X. Physical layer security in OFDM- PON based on dimension-transformed chaotic permutation[J] IEEE Photonics Technology Letters, 2014, 26(2): 127-130. 被引量:1
  • 7Lin P H, Lai S H, and Lin S C. On secrecy rate of the generalized artificial-Noise assisted secure beamforming for wiretap channels[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1728-1740. 被引量:1
  • 8Zhang Rong-qing and Song Ling-yang. Physical layer security for two-way untrusted relaying with friendly jammers[J]. IEEE Transactions on Vehicular Technology, 2012, 61(8): 3693-3704. 被引量:1
  • 9周洁..基于博弈论的窃听信道安全性能研究[D].南京邮电大学,2013:
  • 10Manzoor A K, Hamidou T, and Athanasios V. Evolutionary coalitional games: design and chMlenges in wireless networks[J]. IEEE Wireless Communications, 2012, 19(2): 50-56. 被引量:1

同被引文献131

  • 1Marti S and Giuli T J.Mitigating routing misbehavior in mobile Ad hoc networks[C].MibiCOM 2000,USA,Boston,2000:255-265. 被引量:1
  • 2Michiardi P and Molva R.Simulation-based analysis of security exposures in mobile Ad hoc networks[C].Proceedings of European Wireless Conference,Firenze,Italy,2002:275-281. 被引量:1
  • 3Malnar M Z and Neskovic N J.An analysis of performances of multi-channel routing protocol based on different link quality metrics[C].International Conference on Telecommunications in Modern Satellite,Cable and Broadcasting Services,Nis,Serbia,2011:737-740. 被引量:1
  • 4Buchegger S and Boudec J Y L.Performance analysis of the Confidant protocol:cooperation of nodes-fairness in dynamic Ad-hoc networks[C].MobiHOC,Lausanne,Switzerland,2002:226-236. 被引量:1
  • 5Michiardi P and Molva R.A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks[C].Conference on Communications and Multimedia Security,Portoroz,2002:107-121. 被引量:1
  • 6Akkarajitsakul K.Game theoretic approaches for multiple access in wireless networks:a survey[J].IEEE Communications Surveys and Tutorials,2012,13(3):372-395. 被引量:1
  • 7Brown D R and Fazel F.A game theoretic study of energy efficient cooperative wireless networks[J].Journal of Communications and Networks,2011,13(3):266-276. 被引量:1
  • 8Alizadeh Y,Sabaei M,and Tavallaie O.Game theoretic modeling of joint topology control and forwarding in MANET based on local information[C].Computational Intelligence and Communication Networks (CICN),Mathura,India,2013:510-515. 被引量:1
  • 9Sarkar S and Datta R.A game theoretic model for stochastic routing in self-organized MANETs[C].Wireless Communications and Networking Conference (WCNC),Shanghai,China,2013:1962-1967. 被引量:1
  • 10Rong C.Cooperative game based relay vehicle selection algorithm for VANETs[C].Communications and Information Technologies (ISCIT),Seoul,Korea,2014:30-34. 被引量:1

引证文献11

二级引证文献63

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部