The Gaussian Multiple Access Wiretap Channel With Selfish Transmitters: A Coalitional Game Theory Perspective

被引:0
|
作者
Chou, Remi A. [1 ]
Yener, Aylin [2 ]
机构
[1] Univ Texas Arlington, Dept Comp Sci & Engn, Arlington, TX 76019 USA
[2] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43210 USA
关键词
Transmitters; Jamming; Wireless networks; Surveillance; Oral communication; Forensics; Eavesdropping; Gaussian multiple access wiretap channel; adversarial jamming; coalitional game theory;
D O I
10.1109/TIT.2024.3411918
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers the Gaussian multiple access wiretap channel (GMAC-WT) with selfish transmitters, i.e., who are each solely interested in maximizing their individual secrecy rate. The question then arises as to whether selfish transmitters can increase their individual secrecy rate by participating in a collective, i.e, multiple access, protocol instead of operating on their own. If yes, the question arises whether there is a protocol that satisfies all the participating transmitters simultaneously, in the sense that no transmitter has an incentive to deviate from the protocol. Utilizing coalitional game theory, these questions are addressed for the degraded GMAC-WT with an arbitrary number of transmitters and for the non-degraded GMAC-WT with two transmitters. In particular, for the degraded GMAC-WT, cooperation is shown to be in the best interest of all transmitters, and the existence of protocols that incentivize all transmitters to participate is established. Furthermore, a unique, fair, stable, and achievable secrecy rate allocation is determined. For the non-degraded GMAC-WT, depending on the channel parameters, there are cases where cooperation is not in the best interest of all transmitters, and cases where it is. In the latter cases, a unique, fair, stable, and achievable secrecy rate allocation is determined.
引用
收藏
页码:7432 / 7446
页数:15
相关论文
共 50 条
  • [41] Real Interference Alignment for the MIMO Multiple Access Wiretap Channel
    Mukherjee, Pritam
    Ulukus, Sennur
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [42] The Gaussian Multiple Access Diamond Channel
    Kang, Wei
    Liu, Nan
    2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2011, : 1499 - 1503
  • [43] The Gaussian Multiple Access Diamond Channel
    Kang, Wei
    Liu, Nan
    Chong, Weiwei
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (11) : 6049 - 6059
  • [44] Multiple-access wiretap channel with common channel state information at the encoders
    Dai, Bin
    Wang, Yongtao
    Zhuang, Zhuojun
    IET COMMUNICATIONS, 2014, 8 (05) : 597 - 606
  • [45] Cooperative supply of service by heterogeneous member: a perspective of coalitional game theory
    Huang Jun
    Zhu Guo-wei
    2007 INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT, VOLS 1-3, 2007, : 985 - +
  • [46] Cooperative game theory and the Gaussian interference channel
    Leshem, Amir
    Zehavi, Ephraim
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (07) : 1078 - 1088
  • [47] Capacity Results on the Multiple-Access Wiretap Channel with Noiseless Feedback
    Dai, Bin
    2017 EIGHTH INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS (IWSDA), 2017, : 39 - 43
  • [48] Multiple Access Wiretap Channel With Partial Rate-Limited Feedback
    Xu, Peng
    Chen, Gaojie
    Yang, Zheng
    Li, Yong
    Tomasin, Stefano
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3279 - 3294
  • [49] Achievable Secrecy Rates in the Multiple Access Wiretap Channel with Deviating Users
    Banawan, Karim
    Ulukus, Sennur
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 2814 - 2818
  • [50] Secure Degrees of Freedom of the Multiple Access Wiretap Channel with No Eavesdropper CSI
    Mukherjee, Pritam
    Ulukus, Sennur
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 2311 - 2315