A three-party hierarchical game for physical layer security aware wireless communications with dynamic trilateral coalitions

R Chen, C Yi, K Zhu, B Chen, J Cai… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this paper, a novel hierarchical game framework for physical layer security (PLS) aware
wireless communications with dynamic trilateral coalitions is studied. In the considered …

A DRL-based hierarchical game for physical layer security with dynamic trilateral coalitions

R Chen, C Yi, K Zhu, J Cai… - ICC 2023-IEEE …, 2023 - ieeexplore.ieee.org
In this paper, a novel hierarchical game framework for physical layer security (PLS) with
dynamic trilateral coalitions is studied. In the considered system, legitimate users (LUs) aim …

[HTML][HTML] Distributed coalition formation games for secure wireless transmission

W Saad, Z Han, T Başar, M Debbah… - Mobile Networks and …, 2011 - Springer
Cooperation among wireless nodes has been recently proposed for improving the physical
layer (PHY) security of wireless transmission in the presence of multiple eavesdroppers …

Hierarchical competition as equilibrium program with equilibrium constraints towards security-enhanced wireless networks

X Tang, P Ren, Z Han - IEEE Journal on Selected Areas in …, 2018 - ieeexplore.ieee.org
Information security is a critical yet challenging issue for wireless communications. In this
paper, we consider the distributed resource competition in a network that consists of both …

Partner selection and incentive mechanism for physical layer security

N Zhang, N Cheng, N Lu, X Zhang… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
We study user cooperation to enhance the physical layer security. Specifically, the source
cooperates with friendly intermediate nodes to transmit message securely in the presence of …

Adaptive base station cooperation for physical layer security in two-cell wireless networks

L Hu, H Wen, B Wu, J Tang, F Pan - IEEE Access, 2016 - ieeexplore.ieee.org
We study physical layer security in two-cell wireless networks in which a base station (Alice)
intends to send a confidential message to a legitimate user (Bob) with the help of a …

Power-efficient secure transmission against full-duplex active eavesdropper: A game-theoretic framework

X Tang, P Ren, Z Han - IEEE Access, 2017 - ieeexplore.ieee.org
Information security is of paramount importance yet significant challenge for wireless
communications. In this paper, we investigate the power-efficient transmissions with security …

Wiretap channel with full-duplex proactive eavesdropper: A game theoretic approach

W Huang, W Chen, B Bai, Z Han - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With the emergence of physical layer security, there has been an increasing interest toward
its framework comprising a wiretap channel with a transmitter, a receiver, and an …

[HTML][HTML] Cooperative jamming-assisted untrusted relaying based on game theory for next-generation communication systems

N Zamir, B Ali, MFU Butt, MA Javed, BM Lee, SX Ng - Applied Sciences, 2023 - mdpi.com
In this contribution, we investigate the performance of an untrusted relaying system when
Cooperative Jammers (CJs) are available. We propose two scenarios, Untrusted Relaying …

Secure transmission with guaranteed user satisfaction in heterogeneous networks: A two-level stackelberg game approach

N Wu, X Zhou, M Sun - IEEE Transactions on Communications, 2018 - ieeexplore.ieee.org
In this paper, secure transmission in a heterogeneous network in the presence of multiple
eavesdroppers is studied. A game-theoretic framework is proposed to enhance the security …