The Gaussian Multiple Access Wiretap Channel With Selfish Transmitters: A Coalitional Game Theory Perspective

被引:0
|
作者
Chou, Remi A. [1 ]
Yener, Aylin [2 ]
机构
[1] Univ Texas Arlington, Dept Comp Sci & Engn, Arlington, TX 76019 USA
[2] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43210 USA
关键词
Transmitters; Jamming; Wireless networks; Surveillance; Oral communication; Forensics; Eavesdropping; Gaussian multiple access wiretap channel; adversarial jamming; coalitional game theory;
D O I
10.1109/TIT.2024.3411918
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers the Gaussian multiple access wiretap channel (GMAC-WT) with selfish transmitters, i.e., who are each solely interested in maximizing their individual secrecy rate. The question then arises as to whether selfish transmitters can increase their individual secrecy rate by participating in a collective, i.e, multiple access, protocol instead of operating on their own. If yes, the question arises whether there is a protocol that satisfies all the participating transmitters simultaneously, in the sense that no transmitter has an incentive to deviate from the protocol. Utilizing coalitional game theory, these questions are addressed for the degraded GMAC-WT with an arbitrary number of transmitters and for the non-degraded GMAC-WT with two transmitters. In particular, for the degraded GMAC-WT, cooperation is shown to be in the best interest of all transmitters, and the existence of protocols that incentivize all transmitters to participate is established. Furthermore, a unique, fair, stable, and achievable secrecy rate allocation is determined. For the non-degraded GMAC-WT, depending on the channel parameters, there are cases where cooperation is not in the best interest of all transmitters, and cases where it is. In the latter cases, a unique, fair, stable, and achievable secrecy rate allocation is determined.
引用
收藏
页码:7432 / 7446
页数:15
相关论文
共 50 条
  • [21] A New Multiple Access Wiretap Channel Model
    Nafea, Mohamed
    Yener, Aylin
    2016 IEEE INFORMATION THEORY WORKSHOP (ITW), 2016,
  • [22] Multiple access wiretap channel with noiseless feedback
    Dai, Bin
    Ma, Zheng
    IET COMMUNICATIONS, 2017, 11 (14) : 2190 - 2198
  • [23] A Multiple Access Approach for the Compound Wiretap Channel
    Perron, Etienne
    Diggavi, Suhas
    Telatar, Emre
    2009 IEEE INFORMATION THEORY WORKSHOP (ITW 2009), 2009, : 11 - 15
  • [24] Deep learning approach for physical-layer security in Gaussian multiple access wiretap channel
    Frimpong, Emmanuel Obeng
    Kim, Taehoon
    Bang, Inkyu
    ICT EXPRESS, 2023, 9 (04): : 728 - 733
  • [25] The Multiple Access Wiretap Channel II with a Noisy Main Channel
    Nafea, Mohamed
    Yener, Aylin
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 2983 - 2987
  • [26] Green opportunistic access for CRN with selfish users using Coalitional game Approach in partition form
    Belghiti, Imane Daha
    Elmachkour, Mouna
    Berrada, Ismail
    Kobbane, Abdellatif
    2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST'14), 2014, : 425 - 429
  • [27] Secure Signaling Games For Gaussian Multiple Access Wiretap Channels
    Ge, Hao
    Xu, Ruijie
    Berry, Randall A.
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 111 - 115
  • [28] On the Capacity of Gaussian Multiple-Access Wiretap Channels with Feedback
    Dai, Bin
    Li, Chong
    Liang, Yingbin
    Ma, Zheng
    Shamai , Shlomo
    PROCEEDINGS OF 2020 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2020), 2020, : 397 - 401
  • [29] Precoder Designs for MIMO Gaussian Multiple Access Wiretap Channels
    Lee, Hoon
    Song, Changick
    Moon, Jihwan
    Lee, Inkyu
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (09) : 8563 - 8568
  • [30] The Multiple-Access Channel With Entangled Transmitters
    Pereg, Uzi
    Deppe, Christian
    Boche, Holger
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2025, 71 (02) : 1096 - 1120