Font Size: a A A

Game Theory-based Anti-eavesdropping In Physical Layer Security

Posted on:2019-03-15Degree:MasterType:Thesis
Country:ChinaCandidate:L YuanFull Text:PDF
GTID:2370330566495982Subject:Information security
Abstract/Summary:PDF Full Text Request
Wireless communications are vulnerable to eavesdropping attacks due to their broadcast nature.To deal with the emerging challenge of physical layer security,we study the anti-eavesdropping problem in the presence of intermediate nodes.The intermediate nodes can act as jammer or relay.The jammer node is used to broadcast artificial interference noise on the eavesdropper.Meanwhile,the relay node acts as a traditional relay and retransmits source signal from the source to the intended destination.This thesis studies the security problem in wireless networks,cooperative networks and wireless communication process.The goal is to obtain the optimal power allocation strategy in order to achieve the maximum secrecy capacity on the basis of Shannon information theory.The contributions of this thesis are as follows.First,we study the anti-eavesdropping problem in the presence of selfish jammers,who desire to achieve the maximum profit of themselves.When the cost of friendly jammers is considered in previous works,the cost is either set fixed or a same variable to all jammers.Since this treatment is not realistic,we propose the communication systems including selfish jammers with different costs.Second,we propose a relay and jammer selection strategy which selects the jammer and relay nodes from intermediate nodes to enhance the security of the malicious eavesdropper.For achieving the maximum secrecy capacity by the selected nodes,we introduce a power allocation approach based on price competition.Finally,we consider the transmission process in the presence of jamming attacks and eavesdropping attacks.With the existence of jamming attacks,we maximize the secrecy capacity of the main channel.We perfectly study the anti-eavesdropping problem in the presence of intermediate nodes under various wireless communication settings.In addition,game theory is applied to analyze these optimization problems.
Keywords/Search Tags:Physical layer security, eavesdropping attacks, game theory, jammer, secrecy capacity
PDF Full Text Request
Related items