Consideration of security for PLNC with untrusted relay in game theoretic perspective

Yusuke Shirasaki, Osamu Takyu, Takeo Fujii, Tomoaki Ohtsuki, Fumihito Sasamori, Shiro Handa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

A physical layer network coding (PLNC) is a highly efficient scheme for exchanging information between two nodes. Since the relay receives the interfered signal between two signals sent by two nodes, it hardly decodes any information from received signal. Therefore, the secure wireless communication link to the untrusted relay is constructed. The two nodes optimize the transmit power control for maximizing the secure capacity but these depend on the channel state information informed by the relay station. Therefore, the untrusted relay disguises the informed CSI for exploiting the information from two nodes. This paper constructs the game of two optimizations between the legitimate two nodes and the untrusted relay for clarifying the security of PLNC with untrusted relay.

Original languageEnglish
Title of host publicationRWS 2018 - Proceedings
Subtitle of host publication2018 IEEE Radio and Wireless Symposium
PublisherIEEE Computer Society
Pages109-112
Number of pages4
ISBN (Electronic)9781538607091
DOIs
Publication statusPublished - 2018 Feb 28
Event2018 IEEE Radio and Wireless Symposium, RWS 2018 - Anaheim, United States
Duration: 2018 Jan 142018 Jan 17

Publication series

NameIEEE Radio and Wireless Symposium, RWS
Volume2018-January
ISSN (Print)2164-2958
ISSN (Electronic)2164-2974

Other

Other2018 IEEE Radio and Wireless Symposium, RWS 2018
Country/TerritoryUnited States
CityAnaheim
Period18/1/1418/1/17

Keywords

  • Game Theory
  • Physical Layer Security
  • Transmit Power Control Channel State Information

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Communication

Fingerprint

Dive into the research topics of 'Consideration of security for PLNC with untrusted relay in game theoretic perspective'. Together they form a unique fingerprint.

Cite this