You are on page 1of 11

Hindawi Publishing Corporation

EURASIP Journal on Wireless Communications and Networking


Volume 2009, Article ID 452907, 10 pages
doi:10.1155/2009/452907

Research Article
Physical Layer Security Game: Interaction between Source,
Eavesdropper, and Friendly Jammer

Zhu Han,1 Ninoslav Marina,2 Mérouane Debbah,3 and Are Hjørungnes2


1 Electrical
and Computer Engineering Department, University of Houston, TX 77004, USA
2 UniK—University Graduate Center, University of Oslo, Gunnar Randers vei 19, P.O. Box 70,
NO-2027 Kjeller, Norway
3 SUPELEC, Plateau de Moulon, 3 rue Joliot-Curie, Bureau 5-24, 91192 Gif-sur-Yvette Cedex, France

Correspondence should be addressed to Zhu Han, hanzhu22@gmail.com

Received 31 December 2008; Revised 4 August 2009; Accepted 9 November 2009

Recommended by Hesham El-Gamal

Physical layer security is an emerging security area that achieves perfect secrecy data transmission between intended network
nodes, while malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy capacity can be
improved using friendly jammers that introduce extra interference to the eavesdroppers. We investigate the interaction between
the source that transmits the useful data and friendly jammers who assist the source by “masking” the eavesdropper. To obtain
distributed solution, we introduce a game theoretic approach. The game is defined such that the source pays the jammers to
interfere the eavesdropper, therefore, increasing the secrecy capacity. The friendly jammers charge the source with a certain price
for the jamming, and there is a tradeoff for the price. If too low, the profit of the jammers is low; and if too high, the source
would not buy the “service” (jamming power) or would buy it from other jammers. To analyze the game outcome, we investigate
a Stackelburg type of game and construct a distributed algorithm. Our analysis and simulation results show the effectiveness of
friendly jamming and the tradeoff for setting the price. The distributed game solution is shown to have similar performances to
those of the centralized one.

Copyright © 2009 Zhu Han et al. This is an open access article distributed under the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

1. Introduction destination, while all malicious nodes are kept as ignorant of


that information as possible. This maximum reliable rate is
The future communication systems will be decentralized known as secrecy capacity.
and adhoc, therefore allowing various types of network This line of work was pioneered by Wyner, who defined
mobile terminals to join and leave. This aspect makes the wiretap channel and established the possibility to create
the whole system vulnerable and susceptible to attacks. almost perfect secure communication links without relying
Anyone within communication range can listen and possibly on private (secret) keys [1]. Wyner showed that when
extract information. While these days we have numerous the eavesdropper channel is a degraded version of the
cryptographic methods with high level security, there is no main channel, the source and the destination can exchange
system with perfect security on physical layer. Therefore, perfectly secure messages at a nonzero rate. The main
the physical layer security is regaining a new attention. idea proposed by him is to exploit the additive noise
The main goal of this paper is to design a decentralized impairing the eavesdropper by using a stochastic encoder
system that will protect the broadcasted data and make that maps each message to many codewords according to
it impossible for the eavesdropper to receive the packets an appropriate probability distribution. With this scheme,
even if it knows the encoding/decoding schemes used by a maximal equivocation (i.e., uncertainty) is induced at the
the transmitter/receiver. In approaches where physical layer eavesdropper. In other words, a maximal level of secrecy is
security is applied, the main objective is to maximize the obtained. By ensuring that the equivocation rate is arbitrarily
rate of reliable information from the source to the intended close to the message rate, one can achieve perfect secrecy
2 EURASIP Journal on Wireless Communications and Networking

C1 Secrecy capacity as a function of jammer power


S D 1

C2 0.9

0.8
0.7

Secrecy capacity Cs
J1
M 0.6

0.5
J2
JJ 0.4
0.3
0.2
S: Source
D: Destination 0.1
M: Malicious node (eavesdropper)
0
J1 , . . . , JJ : J friendly jammers 0 0.005 0.01 0.015 0.02
Useful data Jamming power
Interference
Jammer location (50, 75)
Payment
Jammer location (10, 75)
Figure 1: System model for the proposed physical layer security
Figure 2: Secrecy capacity versus the power of the single jammer.
game.

in the sense that the eavesdropper is now limited to learn pays the jammers to interfere the malicious eavesdropper,
almost nothing about the source-destination messages from and therefore, to increase the secrecy capacity. The friendly
its observations. Follow-up work by Leung-Yan-Cheong and jammers charge the source with a certain price for their
Hellman characterized the secrecy capacity of the additive service of jamming the eavesdropper. One could notice that
white Gaussian noise (AWGN) wiretap channel [2]. In their there is a tradeoff for the proposed price. If the price of a
landmark paper, Csiszar and Korner generalized Wyner’s certain jammer is too low, its profit is also low; if its price
approach by considering the transmission of confidential is too high, the source will buy from the other jammers.
messages over broadcast channels [3]. Recently, there have In modeling the outcome of the above games our analysis
been considerable efforts on generalizing these studies to the uses the Stackelberg type of game. Initially, the existence of
wireless channel and multiuser scenarios (see [2, 4–11] and equilibrium will be studied. Then, a distributed algorithm
references therein). Jamming [12–14] has been studied for will be proposed and its convergence will be investigated. The
a long time to analyze the hostile behaviors of malicious outcome of the distributed algorithm will be compared to
nodes. Recently, jamming has been employed to physical the centralized genie aided solution. Some implementation
layer security to reduce the eavesdropper’s ability to decode concerns are also discussed. From the simulation results, we
the source’s information [15]. In other words, the jamming can see the efficiency of friendly jamming and tradeoff for
is friendly in this context. Moreover, the friendly helper can setting the price, the source prefers buying service from only
assist the secrecy by sending codewords, and bring further one jammer, and the centralized scheme and the proposed
gains relative to unstructured Gaussian noise [15–17]. game scheme have similar performance.
Game theory [18] is a formal framework with a set The rest of the paper is organized as follows. In Section 2,
of mathematical tools to study some complex interactions the system model of physical layer security with friendly
among interdependent rational players. During the past jamming users is described. In Section 3, the game models
decade, there has been a surge in research activities that are formulated, and the outcomes as well as properties of the
employ game theory to model and analyze modern dis- game are analyzed. Simulation results are shown in Section 4,
tributed communication systems. Most of these works [19– and conclusions are drawn in Section 5.
22] concentrate on the distributed resource allocation for
wireless networks. As far as the authors’ knowledge, the game 2. System Model
theory has not yet been used in the physical layer security.
In this paper, we investigate the interaction between the We consider a network with a source, a destination, a
source and its friendly jammers using game theory. Although malicious eavesdropper node, and J friendly jammer nodes
the friendly jammers help the source by reducing the data as shown in Figure 1. The malicious node tries to eavesdrop
rate that is “leaking” from the source to the malicious node, the transmitted data coming from the source node. When
at the same time they also reduce the useful data rate from the eavesdropper channel from the source to the malicious
the source to the destination. Using well chosen amounts of node is a degraded version of the main source-destination
power from the friendly jammers, the secrecy capacity can channel, the source and destination can exchange perfectly
be maximized. In the game that we define here, the source secure messages at a nonzero rate. By transmitting a message
EURASIP Journal on Wireless Communications and Networking 3

at a rate higher than the rate of the malicious node, the How much power bought versus jammer price
0.016
malicious node can learn almost nothing about the messages
from its observations. The maximum rate of secrecy infor- 0.014
mation from the source to its intended destination is defined

Amount of power bought


by the term secrecy capacity. 0.012
Suppose the source transmits with power P0 . The channel
0.01
gains from the source to the destination and from the source
to the malicious node are Gsd and Gsm , respectively. Each 0.008
friendly jammer i, i = 1, . . . , J, transmits with power Pi and
the channel gains from it to the destination and the malicious 0.006
node are Gid and Gim , respectively. We denote by J the set
of indices {1, 2, . . . , J }. If the path loss model is used, the 0.004
channel gain is given by the distance to the negative power of
0.002
the path loss coefficient. The thermal noise for each channel
is σ 2 and the bandwidth is W. The channel capacity for the 0
source to the destination is 0 50 100 150 200
Jammer price
 
PG
C1 = Wlog2 1 + 2 0 sd . (1) Jammer location (50, 75)
σ + i∈J Pi Gid Jammer location (10, 75)

Figure 3: How much power the source buys as a function of the


The channel capacity from the source to the malicious node
price.
is
 
PG
C2 = Wlog2 1 + 2 0 sm . (2) Source’s Game: max U s = max(aCs − M), (4)
σ + i∈J Pi Gim
s.t. Pi ≤ Pmax , (5)
The secrecy capacity is
where a is the gain per unit capacity, Pmax is the maximal
Cs = (C1 − C2 ) ,+
(3) power that a jammer can provide, and M is the cost to pay
for the other friendly jamming nodes. Here

where (·)+ = max(·, 0). Both C1 and C2 are decreasing and M= pi Pi ,
convex functions of jamming power Pi . However, Cs = C1 − (6)
i∈J
C2 might not be a monotonous and convex function.( Minus
of two convex functions is not a convex function anymore.) where pi is the price per unit power for the friendly jammer,
This is because the jamming power might decrease C1 faster Pi is the friendly jammer’s power, and J is the set of
than C2 . As a result, Cs might increase in some region of value friendly jammers. From (4) we note that the source will not
Pi . When Pi further increases, both C1 and C2 approach zero. participate in the game if C1 < C2 , or in other words, the
As a result, Cs approaches zero. So, the questions are whether secrecy capacity is zero. For each jammer, Ui (pi , Pi (pi )) is the
or not Cs can be increased, and how to control the jamming utility function of the price and power bought by the source.
power in a distributed manner so as to achieve the maximal For the jammer’s (seller’s) utility, in this paper we define the
Cs . We will try to solve the problems in the following section following utility:
using a game theoretical approach.
Ui = pi Pici , (7)

3. Game for Physical Layer Security where ci ≥ 1 is a constant to balance from the payment
pi Pi from the source and the transmission cost Pi . With
In this section, we study how to use game theory to analyze different values of ci , jammers have different strategies for
the physical layer security. First, we define the game between asking the price pi . Notice that Pi is also a function of the
the source and friendly jammers. Next, we optimize the vector of prices (p1 , . . . pN ), since the power that the source
source and jammer sides, respectively. Then, we prove some will buy also depends on the price that the friendly jammers
properties of the proposed game. Furthermore, a comparison ask. Hence, for each friendly jammer, the optimization
with the centralized scheme is constructed. Finally, we problem is
discuss some implementation concerns.
Friendly Jammer’s Game: max U i . (8)
pi
3.1. Game Definition. The source can be modeled as a
buyer who wants to optimize its secrecy capacity minus cost In the next two subsections, we analyze the optimal
by modifying the “service” (jamming power Pi ) from the strategies for the source and friendly jammers to maximize
friendly jammers, that is, their own utilities.
4 EURASIP Journal on Wireless Communications and Networking

3.2. Source (Buyer) Side Analysis. Introducing A = Source (0,0), dest. (100,0), malic. node (50,90),
P0 Gsd /σ 2 , B = P0 Gsm /σ 2 , ui = Gid /σ 2 , and vi = Gim /σ 2 , i ∈ user 1 (50,50), user 2 (50,75)
J, we have
    +
A B 1
Us = aW log 1+  − log 1+ 
1+ j ∈J u j P j 1+ j ∈J v j P j
0.8


Source Us
− pjPj. 0.6
j ∈J
(9) 0.4

For the source (buyer) size, we analyze the case C1 > C2 . 0.2
By differentiating (4), we have 0

∂Us aWAui / ln 2 Us 100 0


= −     er
1p 50
∂Pi 1 + A + j ∈J u j P j 1 + j ∈J u j P j ric 200 100
ep e p1
2 300 pr i c
150 User 2
aWBvi / ln 2
+     − pi = 0.
1 + B + j ∈J v j P j 1 + j ∈J v j P j Figure 4: Us versus the prices of both users.
(10)

Rearranging the above equation, we have


Note that 0 ≤ Pi ≤ Pmax . Since Pi satisfies the polynomial
   function, we can have the optimal strategy as
Pi4 + Fi,3 Pi3 + Fi,2 pi Pi2 + Fi,1 pi Pi + Fi,0 pi = 0, (11)

where Pi∗ = min[max(Pi , 0), Pmax ]. (14)


 2
Fi,3 = (2 + 2αi + A)2 + 2 + 2βi + B ,
Because of the complexity of the closed form solution

 (2 + 2αi + A) 2 + 2βi + B of the quartic equation in (14), we also consider two special
Fi,2 pi = cases: low interference case and high interference case.
ui vi


Li K i aW B A
+ 2 + 2 − − , 3.2.1. Interference at the Destination Is Much Smaller than
vi ui pi ui vi vi ui
the Noise. Remember the definitions: A = P0 Gsd /σ 2 , B =
 Li Ci + Ki Di aW(ADi − BCi ) P0 Gsm /σ 2 , ui = Gid /σ 2 , and vi = Gim /σ 2 . Imagine a situation
Fi,1 pi = + , in which all jammers are close to the malicious node and far
u2i vi2 pi u2i vi2
from the destination node. In that case the interference from
 Ki Li aW(Aui Li − Bvi Ki ) the jammers to the destination is very small in comparison
Fi,0 pi = + ,
u2i vi2 pi u2i vi2 to the additive noise and therefore we have
(12)

αi = G jd P j ,   +
B
j=
/i Us ≈ aW log(1 + A) − log 1 + 
1+ j ∈J vjPj
 (15)
βi = G jm P j , 
j=
/i − pjPj.
j ∈J
Ki = (1 + αi )(1 + αi + A),
  Then
Li = 1 + β i 1 + β i + B ,
Ci = ui (2 + 2αi + A), ∂Us aWBvi / ln 2
=      − pi = 0.
 ∂Pi 1 + B + j ∈J v j P j 1 + j ∈J v j P j
Di = vi 2 + 2βi + B .
(16)
The solutions of the quartic equation (11) can be expressed
in closed form but this is not the primary goal here. It is Rearranging we get
important that the solution we are interested in is given by
the following function:  
2 + 2βi + B 1 + βi 1 + B + βi aWB

Pi2 + Pi + − = 0.
vi vi2 pi vi ln 2
Pi∗ = Pi∗ pi , A, B, u j , v j , P j j=
. (13) (17)
/i
EURASIP Journal on Wireless Communications and Networking 5

Source (0,0), dest. (100,0), malic. node (50,90), If (B/v1 ) − (A/u1 ) ≤ 0, Us is a decreasing function of
user 1 (50,50), user 2 (50,75) P1 . As a result, Ps is optimized when P1 = 0, that is, the
jammer would not participate the game. On the other hand,
if (B/v1 )−(A/u1 ) > 0, in order to find the maximizing powers
we have to calculate
×10−7 ∂Us aWA aWB
=− + − p1 = 0. (21)
3 ∂Pi u1 P12 v1 P12
Hence
Source U1

2


∗ aW B A D1
1 150 P1 = − = . (22)
p1 v1 u1 p1
100
0 1 From this equation we get the optimal closed-form solution
300 ep
250 pr ic Pi∗ , and similarly by comparing P1∗ with the power under the
200 50 2
150 100 er boundary conditions (P1 = 0, P1 = Pmax , and Cs = 0), we
User 1
price p 50 Us
2 0 can obtain the optimal solution for the this special case.
Figure 5: U1 versus the prices of both users.
3.3. Friendly Jammer (Seller) Side Analysis. In this subsec-
tion, we study how the friendly jammers can set the optimal
Solving the above equation we obtain a closed-form solution price to maximize its utility. By differentiating the utility in
(7) and setting it to zero, we have
2 + 2βi + B
Pi∗ = − ,  c −1 ∂Pi∗
2vi ∂Ui  ∗ ci
= Pi + pi ci Pi∗ i = 0. (23)
 ∂pi ∂pi
  
 2 + 2βi + B 2 1 + βi 1 + B + βi aWB
+ 2 − 2 + , This is equivalent to
4vi vi pi vi ln 2
 
  ci −1 ∂Pi∗
z Pi∗ Pi∗ + pi ci · = 0. (24)
= qi + wi + i , ∂pi
pi
(18) This happens either if Pi∗ = 0 or if
where ∂Pi∗
2 + 2βi + B Pi∗ + pi ci · = 0. (25)
qi = − ∂pi
2vi
 2   From the closed form solution of Pi∗ the solution of pi∗ will
2 + 2βi + B 1 + βi 1 + B + βi be a function given as
wi = − (19)
4vi2 vi2 
pi∗ = pi∗ σ 2 ; Gsd ; Gsm ; {Gid }; {Gim } . (26)
aWB
zi = .
vi ln 2 Notice that pi∗ should be positive. Otherwise, the friendly
jammer would not play.
Finally, by comparing Pi∗ with the power under the
boundary conditions (Pi = 0, Pi = Pmax , and Cs = 0), the
optimal Pi∗ in the low SNR region can be obtained. 3.4. Properties. In this subsection, we prove some properties
of the proposed game. First, we prove that the power is
monotonous function of the price under the two extreme
3.2.2. One Jammer with Interference That Is Much Higher
cases. The properties can help for the proof of equilibrium
than the Noise but Much Smaller than the Received Power
existence in the later part of this subsection.
at the Destination and the Malicious Node. In this case the
interference from the jammer is much higher than the Property 1. Under the two special cases, the optimal power
additive noise but much smaller than the power of the consumption Pi∗ for friendly jammer i is monotonous with its
received signal at the destination and the malicious node. In price pi , when the other friendly jammers prices are fixed. The
other words, that means 1  u1 P1  A and 1  v1 P1  B. proof is straightforward from (18) and (22).
Therefore the utility function of the source is given by



We investigate the following analysis of the relation
A B
Us ≈ aW log 1 + − log 1 + − p1 P1 between the price and the power. We find out that the
u1 P1 v1 P1
(20) friendly jammer power Pi bought from the source is convex
aWA aWB in its own price pi under some conditions. To prove this we
≈ − − p1 P1 .
u1 P1 v1 P1 need to check whether the second derivative ∂2 Pi /∂pi2 < 0.
6 EURASIP Journal on Wireless Communications and Networking

In the first special case in which the interference is small Source (0,0), dest. (100,0), malic. node (50,90),
user 1 (50,50), user 2 (50,75)
∂Pi∗ zi
= −   ,
∂pi 2
2pi wi + zi / pi ×10−6
4
  (27)
∂2 Pi∗ zi 1 3
2 = 3  1/2 1 −  .

Source U2
∂pi p i wi + zi / p i 4 pi wi /zi + 1
2
The above equation is greater than zero when pi is small. This 1
means when the interference is small and the price is small,
the power is convex as a function of the price. 0
300
In the second special case in which the interference is
severe 200

Us
er
∂Pi ∗
1

1
150
=− D1 p1−3/2 , 100

pr
100

ice
∂pi 2 50

p
(28) rice p1

2
0 User 2 p
∂2 Pi∗ 3
= D1 p1−5/2 > 0.
∂pi2 4 Figure 6: U2 versus the prices of both users.

This means when the interference is severe, the power is a


convex function of the price. Two user case, Us versus jammer 2 location
1.4
Next, we investigate the equilibrium of the proposed
game. At the equilibrium, no user can improve its utility by 1.3
changing its own strategy only. We first define the Stackelberg 1.2
equilibrium as follows.
1.1
Definition 1. PiSE and piSE are the Stackelberg equilibrium of
Source utility

1
the proposed game, if when pi is fixed,
0.9
 
Us PiSE = sup Us ({Pi }), ∀i ∈ J (29)
0.8
Pmax ≥{PiSE }≥0, ∀i
0.7

and when Pi is fixed, 0.6


   0.5
Ui piSE = supUi pi , ∀i ∈ J. (30)
pi 0.4
−50 0 50 100
Finally, from the analysis in the previous two subsections, Jammer 2’s location
we can show the following property for the proposed game. Game
Centralized
Property 2. The pair of {Pi∗ }Ni=1 in (14) and { pi∗ }Ni=1 in (26)
is the Stackelberg equilibrium for the proposed game. Figure 7: Us versus the location of the second jammer.

Notice that there might be multiple roots in (11), as a


result, there might be multiple Stackelberg equilibria. In the
for the update can be obtained from the source node. This is
simulation results shown in later section, we will show that
similar to the distributed power control [25]. The update of
the proposed scheme can still achieve the equilibria with
the friendly jammers’ prices can be written in a vector form
better performances than those of the no-jammer case.
as

3.5. Distributed Algorithm and Convergence. In this subsec- 


Distributed Algorithm: p(t + 1) = I p(t) , (32)
tion, we study how the distributed game can converge to
the Stackelberg equilibrium defined in the above subsection.
After rearranging (23), we have where I = [I1 , . . . , IN ]T , and the iteration is from time t to
 time t+1. Next we show that the convergence of the proposed
 P∗ scheme by proving that the price update function in (32) is a
pi = Ii p = −  ∗i , (31)
ci ∂Pi /∂pi standard function [23] defined as follows.

where p = [p1 , . . . , pN ]T and Ii (p) is the price update Definition 2. A function I(p) is standard, if for all p ≥ 0, the
function. Notice that Pi∗ is a function of p. The information following properties are satisfied
EURASIP Journal on Wireless Communications and Networking 7

(1) Positivity: p > 0. Two user case, jamming power versus jammer 2 location

0.025
(2) Monotonicity: if p ≥ p , then I(p) ≥ I(p ), or I(p) ≤

I(p ).
0.02
(3) Scalability: for all η > 1, ηI(p) ≥ I(ηp).

Jamming power
In [23], it has been proved that the price will converge to
0.015
the fixed point (i.e., the Stackelberg equilibrium in our case)
from any feasible initial price vector. The positivity is very
easy to prove. If the price pi goes up, the source would buy 0.01
less from the ith friendly jammer. As a result, (∂Pi∗ /∂pi ) in
(23) is negative, and we prove positivity pi = Ii (p) > 0.
The monotonicity and scalability can only be shown in 0.005
the two special cases. For the low interference case, from (18)
it is obvious that
 0
 P∗ −50 0 50 100
Ii p = −  ∗i
Jammer 2 location
ci ∂Pi /∂pi
    (33) Jammer 1 power
2 wi pi2 + zi pi qi pi + wi pi2 + zi pi Jammer 2 power
=
ci z i
Figure 8: Power versus the location of the second jammer.
which is monotonically increasing in pi . For scalability, we
have
     
 Rearranging we get
Ii ηp wi pi2 + zi pi /η qi pi + wi pi2 + zi pi /η
 =     < 1, 
ηIi p wi pi2 + zi pi qi pi + wi pi2 + zi pi Au2i 2 + B + 2βi − Bvi2 (2 + A + 2αi )
Pi2 + Pi
(34) Au3i − Bvi3
 
since η > 1. Aui 1 + βi 1 + B + βi − Bvi (1 + αi )(1 + A + αi )
+
For the large interference case, from (22) we have Au3i − Bvi3

 Pi∗ 2pi = 0.
Ii p = −  = (35)
ci ∂Pi∗ /∂pi ci (38)
which is monotonically increasing in pi and scalable. Using the KKT condition theorem [24], the final solution
For more general cases, the analysis is tractable. In the would be obtained by comparing the boundary conditions
simulation section later, we employ the general simulation (i.e., Pi = 0, Pi = Pmax , and Cs = 0).
setups. The simulation results show that the proposed Notice that our proposed algorithm is distributive,
scheme can converge and outperform the no-jammer case. in the sense that only the pricing information needs to
be exchanged. In the simulation results, we compare the
3.6. Centralized Scheme. Traditionally, the centralized proposed game theoretical approach with this centralized
scheme is employed assuming that all channel information scheme.
is known. The objective is to optimize the secrecy capacity Finally, from the simulation results in the next section, we
under the constraints of maximal jamming power. see that the distributed solution and the centralized solution
⎡ ⎛     ⎞ ⎤ are asymptotically the same if a is sufficiently large (the
1+ P0 Gsd / σ 2 + i∈J Pi Gid source cares more about the secrecy capacity than for the
max C s = max⎣Wlog2⎝     ⎠, 0⎦.
Pi 1+ P0 Gsm / σ 2 + i∈J Pi Gim payment, i.e., the source is sufficiently rich).

s.t. 0 ≤ Pi ≤ Pmax , ∀i. 3.7. Implementation Discussion. There are several implemen-
(36) tation concerns for the proposed scheme. First, the channel
information from the source to the malicious eavesdropper
The centralized solution is found by maximizing the might not be known or accurately known. Under this
secrecy capacity only. If we do not consider the constraint, condition, the secrecy capacity formula should be rewritten
we have considering the uncertainty. If the direction of arrival is
∂Cs AWui known, multiple antenna techniques can be employed such
=−
∂Pi (1 + αi + ui Pi )(1 + A + αi + ui Pi ) as in [11]. Second, the proposed scheme needs to iteratively
(37) update the price and power information. A natural question
BWv
+  i = 0. arises if the distributed scheme has less signalling than the
1 + βi + ui Pi 1 + B + βi + ui Pi centralized scheme. The comparison is similar to distributed
8 EURASIP Journal on Wireless Communications and Networking

×10−5 Finally, for the multisource multidestination case, there are


Two user case, jamming utility versus jammer 2 location
2 two possible choices to solve the problem. First, we can use
clustering method to divide the network into sub-networks,
1.8
and then employ the single-source-destination pair and
1.6 multiple-friendly-jammer solution proposed in this paper.
1.4 If we believe that the jamming power can be useful for
multiple eavesdroppers, some techniques such as double
Jammer utility

1.2
auction could be investigated. The detailed discussion is
1 beyond the scope of this paper and would be considered in
0.8
our future research.

0.6
0.4 4. Simulation Results
0.2 The simulation is set up as follows. The source and friendly
0 jammer have power of 0.02, the bandwidth is 1, the
−50 0 50 100 noise level is 10−8 , the propagation loss factor is 3, and
Jammer 2 location AWGN channel is assumed. The source, destination, and
Jammer 1 utility
eavesdropper are located at the coordinates (0,0), (100,0),
Jammer 2 utility and (50,50), respectively. Here we select a = 2 for the friendly
jammer utility in (7).
Figure 9: Utility versus the location of the second jammer. For single friendly jammer case, we show the simulation
with the friendly jammer at the location of (50,75) and
(10,75). In Figure 2, we show the secrecy capacity as a
Effect of parameter a: jammer 2 location (0, 75) function of the jamming power. We can see that with the
1
increase of the jamming power, the secrecy capacity first
0.95 increases and then decreases. This is because the jamming
power has different effects on C1 and C2 . So there is an
0.9 optimal point for the jamming power. Also the optimal point
Secrecy capacity

depends on the location of the friendly jammer, and the


0.85
friendly jammer close to the eavesdropper is more effective
0.8 to improve the secrecy capacity. Moreover, notice that the
curve is neither convex nor concave. Figure 3 shows how the
0.75 amount of the power bought by the source from the jammer
depends on the requested price. We can see that the power
0.7
is reduced if the price goes high. At some point, the source
0.65
would stop buying the power. So there is a tradeoff for setting
the price, that is, if the price too high, the source would buy
less power or even stop buying.
2 2.5 3 3.5 4 4.5 5
For the two-jammer case, we set up the following
Factor a
simulations. Malicious node is located at (50,90), the first
Optimal solution friendly jammer is located at (50,50), and the second friendly
Game result jammer is located at (50,75). In Figures 4, 5 and 6, the
source’s utility Us , the first jammer’s utility U1 , and the
Figure 10: Effect of the parameter a on the game.
second jammer’s utility U2 as function of both users’ price,
are shown respectively. We can see that the source would buy
service from only one of the friendly jammers. If the friendly
and centralized power control in the literature [23, 25]. jammer asks too low price, the jammer’s utility is very low.
Since the channel condition is continuously changing, the On the other hand, if the jammer asks too high price, it risks
distributed solution only needs to update the difference of the situation in which the source would buy the service from
the parameters such as power and price to be adaptive, while the other friendly jammer. There is an optimal price for each
the centralized scheme requires all channel information in friendly jammer to ask, and the source would always select
each time period. As a result, the distributed solution has the one that can provide the best performance improvement.
a clear advantage and dominates the current and future Next, we set up a simulation of mobility. The first friendly
wireless network designs. For example, the power control for jammer is fixed at (50,50), while the second friendly jammer
cellular networks, the open loop power control is done only moves from (−50,75) to (100,75). In Figure 7, we show the
once during the link initialization, while the close loop power source utilities of the centralized scheme and the proposed
control (distributed power allocation such as [23]) is per- game. We can see that the centralized scheme serves as
formed 1500 times for UMTS and 800 times for CDMA2000. a performance upper bound. The game result is not far
EURASIP Journal on Wireless Communications and Networking 9

away from the upper bound, while the game solution can References
be implemented in a distributed manner. The performance
game is trivial when the friendly jammer 2 is close to the [1] A. D. Wyner, “The wire-tap channel,” Bell System Technical
Journal, vol. 54, no. 8, pp. 1355–1387, 1975.
malicious eavesdropper from (20,75) to (70,75). In Figure 8,
[2] S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian
we show the jammers’ power as a function of jammer
wiretap channel,” IEEE Transactions on Information Theory,
2’s location. We can see that depending on the jammers’ vol. 24, pp. 451–456, 1978.
location, the source switches between two jammers for the [3] I. Csiszar and J. Korner, “Broadcast channels with confidential
best performance. Moreover, the source also buys the optimal messages,” IEEE Transactions on Information Theory, vol. 24,
amount of jamming power: when the jammer is close to no. 3, pp. 339–348, 1978.
the malicious eavesdropper, the source would buy less power [4] A. O. Hero III, “Secure space-time communication,” IEEE
since the jammer is more effective to improve the secrecy Transactions on Information Theory, vol. 49, no. 12, pp. 3235–
capacity. In Figure 9, we show the corresponding friendly 3249+3351, 2003.
jammers’ utilities of the proposed game. [5] Z. Li, W. Trappe, and R. Yates, “Secret communication via
Finally, we show the effect of parameter a for the friendly multi-antenna transmission,” in Proceedings of the 41st Annual
jammer utility in (7). When a is large, the friendly jammer’s Conference on Information Sciences and Systems (CISS ’07), pp.
905–910, Baltimore, Md, USA, March 2007.
utility reduces quick if the source does not buy the service. As
[6] R. Negi and S. Goelm, “Secret communication using artificial
a result, the friendly jammer would not ask arbitrary price,
noise,” in Proceedings of IEEE Vehicular Technology Conference,
and performance gap to the optima solution is small. In vol. 3, pp. 1906–1910, September 2005.
Figure 10, we show the secrecy capacity as a function of a [7] P. Parada and R. Blahut, “Secrecy capacity of SIMO and
when the second jammer is located at (0,75). We can see that slow fading channels,” in Proceedings of IEEE International
the performance gap is shrinking when a is increasing. Notice Symposium on Information Theory (ISIT ’05), pp. 2152–2155,
that for the condition in which the game almost converges to Adelaide, South Australia, September 2005.
the optimal solution, most value of a > 1 will achieve good [8] S. Shafiee and S. Ulukus, “Achievable rates in Gaussian MISO
solution, for example, the second friendly jammer located at channels with secrecy constraints,” in Proceedings of IEEE
(50,75). International Symposium on Information Theory, pp. 2466–
2470, Nice, France, June 2007.
[9] Y. Liang, H. V. Poor, and S. Shamai, “Secure communication
5. Conclusions over fading channels,” IEEE Transactions on Information
Physical layer security is an emerging security technique Theory, vol. 54, no. 6, pp. 2470–2492, 2008.
[10] P. K. Gopala, L. Lai, and H. El Gamal, “On the secrecy capacity
that is an alternative for traditional cryptographic-based
of fading channels,” IEEE Transactions on Information Theory,
protocols to achieve perfect secrecy capacity as eavesdroppers vol. 54, no. 10, pp. 4687–4698, 2008.
obtain zero information. Jamming has been shown in the [11] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Secure
literature to effectively improve secrecy capacity. In this collaborative beamforming,” in Proceedings of Allerton Confer-
paper, we investigate the interaction between the source ence on Communication, Control, and Computing, Allerton, Ill,
and friendly jammers using the game theory in order to USA, October 2008.
have a distributed solution. The source pays the friendly [12] A. Kashyap, T. Başar, and R. Srikant, “Correlated jamming
jammers to interfere the malicious eavesdropper such that on MIMO Gaussian fading channels,” IEEE Transactions on
the secrecy capacity is increased, and therefore the security Information Theory, vol. 50, no. 9, pp. 2119–2123, 2004.
of the network. The friendly jammers charge the source with [13] S. Shafiee and S. Ulukus, “Mutual Information Games in
a price for the jamming. To analyze the game outcome, we Multi-user Channels with Correlated Jamming,” IEEE Trans.
investigate the Stackelburg game and construct a distributed on Information Theory, vol. 55, no. 10, pp. 4598–4607, 2009.
[14] M. H. Brady, M. Mohseni, and J. M. Cioffi, “Spatially-
algorithm. Some properties such as equilibrium and conver-
correlated jamming in Gaussian multiple access and broadcast
gence are analyzed. From the simulation results, we conclude channels,” in Proceedings of the 40th IEEE Conference on
the following. First, there is a tradeoff for the price: If the Information Sciences and Systems (CISS ’06), pp. 1635–1639,
price is too low, the profit is low; and if the price is too Princeton, NJ, USA, March 2006.
high, the source would not buy or buy from other jammers. [15] L. Lai and H. El Gamal, “The relay-eavesdropper channel:
Second, for the multiple jammer case, the source would buy cooperation for secrecy,” IEEE Transactions on Information
service from only one jammer. Third, the centralized scheme Theory, vol. 54, no. 9, pp. 4005–4019, 2008.
and distributed scheme have similar performance, especially [16] X. Tang, R. Liu, P. Spasojević, and H. V. Poor, “The Gaussian
when a is sufficiently large. Overall, the proposed game wiretap channel with a helping interferer,” in Proceedings of
theoretical scheme can achieve a comparable performance IEEE International Symposium on Information Theory (ISIT
with distributed implementation. ’08), pp. 389–393, Toronto, Canada, July 2008.
[17] X. Tang, R. Liu, P. Spasojević, and H. V. Poor, “Interference-
assisted secret communication,” in Proceedings of the IEEE
Acknowledgments Information Theory Workshop (ITW ’08), pp. 164–168, Porto,
Portugal, May 2008.
This work was supported by NSF CNS-0910461 and NSF [18] D. Fudenberg and J. Tirole, Game Theory, MIT Press, Cam-
CNS-0905556 and was supported by the Research Council bridge, Mass, USA, 1991.
of Norway through the project entitled “Mobile-to-Mobile [19] C. U. Saraydar, N. B. Mandayam, and D. J. Goodman,
Communication Systems (M2M).” “Efficient power control via pricing in wireless data networks,”
10 EURASIP Journal on Wireless Communications and Networking

IEEE Transactions on Communications, vol. 50, no. 2, pp. 291–


303, 2002.
[20] G. Scutari, S. Barbarossa, and D. P. Palomar, “Potential games:
a framework for vector power control problems with coupled
constraints,” in Proceedings of IEEE International Conference on
Acoustics, Speech and Signal Processing (ICASSP ’06), vol. 4, pp.
241–244, Toulouse, France, May 2006.
[21] B. Wang, Z. Han, and K. J. R. Liu, “Distributed relay selection
and power control for multiuser cooperative communication
networks using buyer/ seller game,” in Proceedings of Annual
IEEE Conference on Computer Communications (INFOCOM
’07), pp. 544–552, Anchorage, Alaska, USA, May 2007.
[22] N. Bonneau, M. Debbah, E. Altman, and A. Hjørungnes,
“Non-atomic games for multi-user systems,” IEEE Journal on
Selected Areas in Communications, vol. 26, no. 7, pp. 1047–
1058, 2008.
[23] R. D. Yates, “A framework for uplink power control in
cellular radio systems,” IEEE Journal on Selected Areas in
Communications, vol. 13, no. 7, pp. 1341–1347, 1995.
[24] S. Boyd and L. Vandenberghe, Convex Optimization, Cam-
bridge University Press, Cambridge, UK, 2006.
[25] Z. Han and K. J. R. Liu, Resource Allocation for Wireless
Networks: Basics, Techniques, and Applications, Cambridge
University Press, Cambridge, UK, 2008.
Photographȱ©ȱTurismeȱdeȱBarcelonaȱ/ȱJ.ȱTrullàs

Preliminaryȱcallȱforȱpapers OrganizingȱCommittee
HonoraryȱChair
The 2011 European Signal Processing Conference (EUSIPCOȬ2011) is the MiguelȱA.ȱLagunasȱ(CTTC)
nineteenth in a series of conferences promoted by the European Association for GeneralȱChair
Signal Processing (EURASIP, www.eurasip.org). This year edition will take place AnaȱI.ȱPérezȬNeiraȱ(UPC)
in Barcelona, capital city of Catalonia (Spain), and will be jointly organized by the GeneralȱViceȬChair
Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) and the CarlesȱAntónȬHaroȱ(CTTC)
Universitat Politècnica de Catalunya (UPC). TechnicalȱProgramȱChair
XavierȱMestreȱ(CTTC)
EUSIPCOȬ2011 will focus on key aspects of signal processing theory and
TechnicalȱProgramȱCo
Technical Program CoȬChairs
Chairs
applications
li ti as listed
li t d below.
b l A
Acceptance
t off submissions
b i i will
ill be
b based
b d on quality,
lit JavierȱHernandoȱ(UPC)
relevance and originality. Accepted papers will be published in the EUSIPCO MontserratȱPardàsȱ(UPC)
proceedings and presented during the conference. Paper submissions, proposals PlenaryȱTalks
for tutorials and proposals for special sessions are invited in, but not limited to, FerranȱMarquésȱ(UPC)
the following areas of interest. YoninaȱEldarȱ(Technion)
SpecialȱSessions
IgnacioȱSantamaríaȱ(Unversidadȱ
Areas of Interest deȱCantabria)
MatsȱBengtssonȱ(KTH)
• Audio and electroȬacoustics.
• Design, implementation, and applications of signal processing systems. Finances
MontserratȱNájarȱ(UPC)
Montserrat Nájar (UPC)
• Multimedia
l d signall processing andd coding.
d
Tutorials
• Image and multidimensional signal processing. DanielȱP.ȱPalomarȱ
• Signal detection and estimation. (HongȱKongȱUST)
• Sensor array and multiȬchannel signal processing. BeatriceȱPesquetȬPopescuȱ(ENST)
• Sensor fusion in networked systems. Publicityȱ
• Signal processing for communications. StephanȱPfletschingerȱ(CTTC)
MònicaȱNavarroȱ(CTTC)
• Medical imaging and image analysis.
Publications
• NonȬstationary, nonȬlinear and nonȬGaussian signal processing. AntonioȱPascualȱ(UPC)
CarlesȱFernándezȱ(CTTC)
Submissions IIndustrialȱLiaisonȱ&ȱExhibits
d i l Li i & E hibi
AngelikiȱAlexiouȱȱ
Procedures to submit a paper and proposals for special sessions and tutorials will (UniversityȱofȱPiraeus)
be detailed at www.eusipco2011.org. Submitted papers must be cameraȬready, no AlbertȱSitjàȱ(CTTC)
more than 5 pages long, and conforming to the standard specified on the InternationalȱLiaison
EUSIPCO 2011 web site. First authors who are registered students can participate JuȱLiuȱ(ShandongȱUniversityȬChina)
in the best student paper competition. JinhongȱYuanȱ(UNSWȬAustralia)
TamasȱSziranyiȱ(SZTAKIȱȬHungary)
RichȱSternȱ(CMUȬUSA)
ImportantȱDeadlines: RicardoȱL.ȱdeȱQueirozȱȱ(UNBȬBrazil)

P
Proposalsȱforȱspecialȱsessionsȱ
l f i l i 15 D 2010
15ȱDecȱ2010
Proposalsȱforȱtutorials 18ȱFeb 2011
Electronicȱsubmissionȱofȱfullȱpapers 21ȱFeb 2011
Notificationȱofȱacceptance 23ȱMay 2011
SubmissionȱofȱcameraȬreadyȱpapers 6ȱJun 2011

Webpage:ȱwww.eusipco2011.org

You might also like