• DocumentCode
    82216
  • Title

    Physical-Layer Security in Distributed Wireless Networks Using Matching Theory

  • Author

    Bayat, Siavash ; Louie, Raymond H. Y. ; Zhu Han ; Vucetic, Branka ; Yonghui Li

  • Author_Institution
    Center of Excellence in Telecommun., Univ. of Sydney, Sydney, NSW, Australia
  • Volume
    8
  • Issue
    5
  • fYear
    2013
  • fDate
    May-13
  • Firstpage
    717
  • Lastpage
    732
  • Abstract
    We consider the use of physical-layer security in a wireless communication system where multiple jamming nodes assist multiple source-destination nodes in combating unwanted eavesdropping from a single eavesdropper. In particular, we propose a distributed algorithm that matches each source-destination pair with a particular jammer. Our algorithm caters for three channel state information (CSI) assumptions: global CSI, local CSI, and local CSI without the eavesdropper channel. We prove that our algorithm has many desirable properties. First, the outcome of the proposed algorithm results in a stable matching, which is important if the source and jamming nodes are selfish. Second, the secrecy rate of the proposed algorithm converges to the secrecy rate of a centralized optimal solution, if the price step-number is sufficiently small. Third, our algorithm converges only after a small number of iterations, and its overhead is relatively small. Fourth, our algorithm has a significantly lower complexity than a centralized optimal approach.
  • Keywords
    jamming; radio networks; telecommunication security; centralized optimal approach; channel state information assumptions; distributed wireless networks; global CSI; local CSI; matching theory; multiple jamming nodes; multiple source-destination nodes; physical-layer security; price step-number; secrecy rate; wireless communication system; Antennas; Interference; Jamming; Physical layer; Security; Vectors; Wireless communication; Physical-layer security; equilibrium; matching; secrecy rate; stability;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2013.2251335
  • Filename
    6475179