A secure communication game with a relay helping the eavesdropper

Melda Yuksel, Xi Liu, Elza Erkip

Research output: Contribution to journalArticle

Abstract

In this work, a four-terminal complex Gaussian network composed of a source, a destination, an eavesdropper, and a jammer relay is studied under two different set of assumptions: 1) The jammer relay does not hear the source transmission, and 2) The jammer relay is causally given the source message. In both cases, the jammer relay assists the eavesdropper and aims to decrease the achievable secrecy rates. The source, on the other hand, aims to increase it. To help the eavesdropper, the jammer relay can use pure relaying and/or send interference. Each of the problems is formulated as a two-player, noncooperative, zero-sum continuous game. Assuming Gaussian strategies at the source and the jammer relay in the first problem, the Nash equilibrium is found and shown to be achieved with mixed strategies in general. The optimal cumulative distribution functions (cdfs) for the source and the jammer relay that achieve the value of the game, which is the Nash equilibrium secrecy rate, are found. For the second problem, the Nash equilibrium solution is found and the results are compared to the case when the jammer relay is not informed about the source message.

Original languageEnglish (US)
Article number5729364
Pages (from-to)818-830
Number of pages13
JournalIEEE Transactions on Information Forensics and Security
Volume6
Issue number3 PART 1
DOIs
StatePublished - Sep 2011

Fingerprint

Distribution functions
Secure communication

Keywords

  • Eavesdropping
  • jamming
  • physical layer security
  • relay channel
  • wire-tap channel

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Cite this

A secure communication game with a relay helping the eavesdropper. / Yuksel, Melda; Liu, Xi; Erkip, Elza.

In: IEEE Transactions on Information Forensics and Security, Vol. 6, No. 3 PART 1, 5729364, 09.2011, p. 818-830.

Research output: Contribution to journalArticle

@article{6f53a8851dca4e80abf29e3613d28d46,
title = "A secure communication game with a relay helping the eavesdropper",
abstract = "In this work, a four-terminal complex Gaussian network composed of a source, a destination, an eavesdropper, and a jammer relay is studied under two different set of assumptions: 1) The jammer relay does not hear the source transmission, and 2) The jammer relay is causally given the source message. In both cases, the jammer relay assists the eavesdropper and aims to decrease the achievable secrecy rates. The source, on the other hand, aims to increase it. To help the eavesdropper, the jammer relay can use pure relaying and/or send interference. Each of the problems is formulated as a two-player, noncooperative, zero-sum continuous game. Assuming Gaussian strategies at the source and the jammer relay in the first problem, the Nash equilibrium is found and shown to be achieved with mixed strategies in general. The optimal cumulative distribution functions (cdfs) for the source and the jammer relay that achieve the value of the game, which is the Nash equilibrium secrecy rate, are found. For the second problem, the Nash equilibrium solution is found and the results are compared to the case when the jammer relay is not informed about the source message.",
keywords = "Eavesdropping, jamming, physical layer security, relay channel, wire-tap channel",
author = "Melda Yuksel and Xi Liu and Elza Erkip",
year = "2011",
month = "9",
doi = "10.1109/TIFS.2011.2125956",
language = "English (US)",
volume = "6",
pages = "818--830",
journal = "IEEE Transactions on Information Forensics and Security",
issn = "1556-6013",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "3 PART 1",

}

TY - JOUR

T1 - A secure communication game with a relay helping the eavesdropper

AU - Yuksel, Melda

AU - Liu, Xi

AU - Erkip, Elza

PY - 2011/9

Y1 - 2011/9

N2 - In this work, a four-terminal complex Gaussian network composed of a source, a destination, an eavesdropper, and a jammer relay is studied under two different set of assumptions: 1) The jammer relay does not hear the source transmission, and 2) The jammer relay is causally given the source message. In both cases, the jammer relay assists the eavesdropper and aims to decrease the achievable secrecy rates. The source, on the other hand, aims to increase it. To help the eavesdropper, the jammer relay can use pure relaying and/or send interference. Each of the problems is formulated as a two-player, noncooperative, zero-sum continuous game. Assuming Gaussian strategies at the source and the jammer relay in the first problem, the Nash equilibrium is found and shown to be achieved with mixed strategies in general. The optimal cumulative distribution functions (cdfs) for the source and the jammer relay that achieve the value of the game, which is the Nash equilibrium secrecy rate, are found. For the second problem, the Nash equilibrium solution is found and the results are compared to the case when the jammer relay is not informed about the source message.

AB - In this work, a four-terminal complex Gaussian network composed of a source, a destination, an eavesdropper, and a jammer relay is studied under two different set of assumptions: 1) The jammer relay does not hear the source transmission, and 2) The jammer relay is causally given the source message. In both cases, the jammer relay assists the eavesdropper and aims to decrease the achievable secrecy rates. The source, on the other hand, aims to increase it. To help the eavesdropper, the jammer relay can use pure relaying and/or send interference. Each of the problems is formulated as a two-player, noncooperative, zero-sum continuous game. Assuming Gaussian strategies at the source and the jammer relay in the first problem, the Nash equilibrium is found and shown to be achieved with mixed strategies in general. The optimal cumulative distribution functions (cdfs) for the source and the jammer relay that achieve the value of the game, which is the Nash equilibrium secrecy rate, are found. For the second problem, the Nash equilibrium solution is found and the results are compared to the case when the jammer relay is not informed about the source message.

KW - Eavesdropping

KW - jamming

KW - physical layer security

KW - relay channel

KW - wire-tap channel

UR - http://www.scopus.com/inward/record.url?scp=80051713767&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=80051713767&partnerID=8YFLogxK

U2 - 10.1109/TIFS.2011.2125956

DO - 10.1109/TIFS.2011.2125956

M3 - Article

VL - 6

SP - 818

EP - 830

JO - IEEE Transactions on Information Forensics and Security

JF - IEEE Transactions on Information Forensics and Security

SN - 1556-6013

IS - 3 PART 1

M1 - 5729364

ER -