首页> 美国卫生研究院文献>Entropy >Secure Degrees of Freedom in Networks with User Misbehavior
【2h】

Secure Degrees of Freedom in Networks with User Misbehavior

机译:使用用户不良行为安全地保护网络中的自由度

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

We investigate the secure degrees of freedom (s.d.o.f.) of three new channel models: broadcast channel with combating helpers, interference channel with selfish users, and multiple access wiretap channel with deviating users. The goal of introducing these channel models is to investigate various malicious interactions that arise in networks, including active adversaries. That is in contrast with the common assumption in the literature that the users follow a certain protocol altruistically and transmit both message-carrying and cooperative jamming signals in an optimum manner. In the first model, over a classical broadcast channel with confidential messages (BCCM), there are two helpers, each associated with one of the receivers. In the second model, over a classical interference channel with confidential messages (ICCM), there is a helper and users are selfish. By casting each problem as an extensive-form game and applying recursive real interference alignment, we show that, for the first model, the combating intentions of the helpers are neutralized and the full s.d.o.f. is retained; for the second model, selfishness precludes secure communication and no s.d.o.f. is achieved. In the third model, we consider the multiple access wiretap channel (MAC-WTC), where multiple legitimate users wish to have secure communication with a legitimate receiver in the presence of an eavesdropper. We consider the case when a subset of users deviate from the optimum protocol that attains the exact s.d.o.f. of this channel. We consider two kinds of deviation: when some of the users stop transmitting cooperative jamming signals, and when a user starts sending intentional jamming signals. For the first scenario, we investigate possible responses of the remaining users to counteract such deviation. For the second scenario, we use an extensive-form game formulation for the interactions of the deviating and well-behaving users. We prove that a deviating user can drive the s.d.o.f. to zero; however, the remaining users can exploit its intentional jamming signals as cooperative jamming signals against the eavesdropper and achieve an optimum s.d.o.f.
机译:我们调查了三个新频道模型的安全自由度(S.D.O.F.):使用抗坏的助手,具有自私用户的干扰通道的广播频道,以及具有偏离用户的多个接入丝网通道。介绍这些渠道模型的目标是调查网络中出现的各种恶意互动,包括积极的对手。与文献中的共同假设相反,用户以利他性地遵循某种协议,并以最佳方式传输携带消息和协作干扰信号。在第一模型中,通过具有机密消息(BCCM)的经典广播频道,有两个帮助器,每个帮助器与其中一个接收器相关联。在第二种模型中,通过具有机密消息(ICCM)的经典干扰频道,有一个助手,用户是自私的。通过将每个问题作为广泛形式的游戏和应用递归真正的干扰对齐,我们表明,对于第一款模型,助手的打击意图是中和的,并且完整的S.O.F。保留;对于第二种模型,自私禁止安全通信,没有S.D.O.f.已完成。在第三种模型中,我们考虑多个接入丝网通道(MAC-WTC),其中多个合法用户希望在窃听器的情况下与合法接收器具有安全通信。我们考虑当用户子集偏离达到精确的S.O.F的最佳协议时,考虑这种情况。这个频道。我们考虑两种偏差:当某些用户停止发送协作干扰信号时,并且当用户开始发送有意的干扰信号时。对于第一种情况,我们调查了剩余用户抵消这种偏差的可能响应。对于第二种方案,我们使用广泛的游戏制定以进行偏离和行为良好的用户的相互作用。我们证明偏离用户可以驱动S.O.F.零;然而,剩余的用户可以利用其有意的干扰信号作为针对窃听器的协同干扰信号,并实现最佳S.O.f.f。

著录项

  • 期刊名称 Entropy
  • 作者

    Karim Banawan; Sennur Ulukus;

  • 作者单位
  • 年(卷),期 2019(21),10
  • 年度 2019
  • 页码 945
  • 总页数 26
  • 原文格式 PDF
  • 正文语种
  • 中图分类
  • 关键词

    机译:安全的自由程度;干扰对齐;广泛的游戏;
  • 入库时间 2022-08-21 12:21:00

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号