首页> 外文期刊>IEEE transactions on information forensics and security >On Cooperative and Malicious Behaviors in Multirelay Fading Channels
【24h】

On Cooperative and Malicious Behaviors in Multirelay Fading Channels

机译:多中继衰落信道中的合作与恶意行为

获取原文
获取原文并翻译 | 示例

摘要

Multirelay networks exploit spatial diversity by transmitting user's messages through multiple relay paths. Most works in the literature on cooperative or relay networks assume that all terminals are fully cooperative and neglect the effect of possibly existing malicious relay behaviors. In this work, we consider a multirelay network that consists of both cooperative and malicious relays, and aims to obtain an improved understanding on the optimal behaviors of these two groups of relays via information-theoretic mutual information games. By modeling the set of cooperative relays and the set of malicious relays as two players in a zero-sum game with the maximum achievable rate as the utility, the optimal transmission strategies of both types of relays are derived by identifying the Nash equilibrium of the proposed game. Our main contributions are twofold. First, a generalization to previous works is obtained by allowing malicious relays to either listen or attack in Phase 1 (source-relay transmission phase). This is in contrast to previous works that only allow the malicious relays to listen in Phase 1 and to attack in Phase 2 (relay-destination transmission phase). The latter is shown to be suboptimal in our problem. Second, the impact of CSI knowledge at the destination on the optimal attack strategy that can be adopted by the malicious relays is identified. In particular, for the more practical scenario where the interrelay CSI is unknown at the destination, the constant attack is shown to be optimal as opposed to the commonly considered Gaussian attack.
机译:多中继网络通过通过多个中继路径传输用户消息来利用空间分集。文献中有关协作或中继网络的大多数工作都假定所有终端都是完全协作的,并且忽略了可能存在的恶意中继行为的影响。在这项工作中,我们考虑了一个由合作中继和恶意中继组成的多中继网络,旨在通过信息论互信息博弈对这两组中继的最佳行为进行更好的理解。通过在零和博弈中以最大可实现率作为效用,将协作中继集和恶意中继集建模为两个参与者,通过识别提议的纳什均衡来导出两种类型的中继的最优传输策略游戏。我们的主要贡献是双重的。首先,通过允许恶意中继在阶段1(源-中继传输阶段)中侦听或攻击来获得对先前工作的概括。这与以前的工作仅允许恶意中继在阶段1进行侦听并在阶段2(中继目标传输阶段)进行攻击的工作形成对比。后者在我们的问题中显示为次优。其次,确定目标上的CSI知识对恶意中继可以采用的最佳攻击策略的影响。特别是,对于更实际的场景,即在目的地处不知道中继CSI的情况,与通常认为的高斯攻击相反,恒定攻击显示为最佳。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号