Applications of Game Theory for Physical Layer Security

Author(s):  
Kaizhi Huang ◽  
Mingliang Li ◽  
Zhou Zhong ◽  
Hua Zhao

This chapter provides a comprehensive review of the domain of game theory based physical layer security in wireless communications. By exploiting the wireless channel characteristic and secure cooperation of nodes, physical layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, without relying on higher-layer encryption. However, the selfness of nodes seriously affects the secure cooperation; game theory can model the influence of the selfness on physical layer security. This chapter firstly describes the physical layer security issues in the wireless networks and the role of game theory in the research on physical layer security. And then the typical applications of game theory in physical layer security are subsequently covered, including zero-sum game, Stackelberg game, auction theory, coalition game. Finally, the chapter concludes with observations on potential research directions in this area.

2021 ◽  
Vol 3 (2) ◽  
pp. 59-67
Author(s):  
Abul Bashar ◽  
Smys S

This paper presents an analysis of Wireless Sensor Network (WSN) security issues that take place due to eavesdropping. The sensor-eavesdropper channels and the sensor sinks are exposed to generalized K-fading. Based on the physical layer security framework we use cumulative distribution, optimal sensors and round robin scheduling scheme to decrease the probability of interception and to equip secure connection between the nodes. For identifying the interception probability, a novel analytical methodology is present with simple analytical expressions. Moreover, diversity orders of scheduling schemes and asymptotic closed-form expressions are evaluated. Numerical results show the crucial result of shadowing and fading parameters of wiretap and main links, selected schemes on WSN security and network size. We have analyzed the output using Monte Carlo simulation and conclusions show the validation of the proposed work.


Information ◽  
2016 ◽  
Vol 7 (3) ◽  
pp. 49 ◽  
Author(s):  
Tommaso Pecorella ◽  
Luca Brilli ◽  
Lorenzo Mucchi

Sensors ◽  
2019 ◽  
Vol 19 (21) ◽  
pp. 4757 ◽  
Author(s):  
João Madeira ◽  
João Guerreiro ◽  
Rui Dinis ◽  
Paulo Montezuma ◽  
Luís Miguel Campos

Multi-Input, Multi-Output (MIMO) techniques are seeing widespread usage in wireless communication systems due to their large capacity gains. On the other hand, security is a concern of any wireless system, which can make schemes that implement physical layer security key in assuring secure communications. In this paper, we study the physical layer security issues of MIMO with Singular Value Decomposition (SVD) schemes, employed along with Single-Carrier with Frequency-Domain Equalization (SC-FDE) techniques. More concretely. the security potential against an unintended eavesdropper is analysed, and it is shown that the higher the distance between the eavesdropper and the transmitter or receiver, the higher the secrecy rate. In addition, in a scenario where there is Line of Sight (LOS) between all users, it is shown that the secrecy rate can be even higher than in the previous scenario. Therefore, MIMO-SVD schemes combined with SC-FDE can be an efficient option for highly secure MIMO communications.


Sign in / Sign up

Export Citation Format

Share Document