Based on virtual beamforming cooperative jamming with Stackelberg game for physical layer security in the heterogeneous wireless network View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2018-12

AUTHORS

Shuanglin Huang, Li Zhu, Sanjun Liu

ABSTRACT

The physical layer security technology is a technical scheme developed in recent years to solve the problem of information security transmission in wireless communication networks. As one of the physical layer security technologies, cooperative jamming often requires collaborative nodes to actively cooperate with other nodes with secure communication requirements to transmit information. In the environment of heterogeneous wireless network, each wireless node is relatively independent, the relationship is both cooperative and competitive, and the nodes are selfish. In this paper, we study the information transmission between the source and destination nodes, and form a virtual beamforming through the cooperation of the jamming nodes to point to the malicious wiretap nodes, so as to achieve the physical layer secure communication. First, the interest distribution relationship between the source node and other cooperative interference nodes is modeled as the Stackelberg game. The source node pays the consumption of the power consumed by the cooperative jamming nodes and motivates the cooperative interference nodes to participate actively. Then, the competition relationship among all the cooperative nodes is built as a non-cooperative game, so as to promote the reasonable pricing of the consumed power when each node participates in collaboration. When the security rate between the source node and destination node is constant, the power allocation of source and cooperative nodes and the equilibrium point of power price exist and are unique. Through the combined optimization of the two games, the power pricing and power allocation can be dynamically optimized according to the change of the network environment. The simulation results show that the power dynamic allocation and power dynamic pricing have good convergence, and the source node provides a train of thought for the selection of cooperative nodes and their number. More... »

PAGES

69

Identifiers

URI

http://scigraph.springernature.com/pub.10.1186/s13638-018-1081-x

DOI

http://dx.doi.org/10.1186/s13638-018-1081-x

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1101819367


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Hubei University for Nationalities", 
          "id": "https://www.grid.ac/institutes/grid.440771.1", 
          "name": [
            "School of Information Engineering, Hubei University for Nationalities, 445000, Enshi, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Huang", 
        "givenName": "Shuanglin", 
        "id": "sg:person.07407500161.08", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07407500161.08"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Hubei University for Nationalities", 
          "id": "https://www.grid.ac/institutes/grid.440771.1", 
          "name": [
            "School of Information Engineering, Hubei University for Nationalities, 445000, Enshi, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zhu", 
        "givenName": "Li", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Hubei University for Nationalities", 
          "id": "https://www.grid.ac/institutes/grid.440771.1", 
          "name": [
            "School of Information Engineering, Hubei University for Nationalities, 445000, Enshi, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Liu", 
        "givenName": "Sanjun", 
        "id": "sg:person.014724523163.06", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014724523163.06"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1002/cpe.3790", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1016766182"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1002/j.1538-7305.1975.tb02040.x", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1020909493"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1049/el.2015.1491", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1056756585"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/comst.2014.2349883", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061258233"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/t-wc.2008.070773", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061467764"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tcomm.2013.050713.120730", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061558957"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tifs.2014.2384392", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061630456"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tifs.2015.2481797", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061630667"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tifs.2016.2516912", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061630761"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tit.2008.921908", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061651987"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tit.2008.928272", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061652109"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tsp.2009.2038412", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061801981"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tsp.2011.2161295", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061802807"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tvt.2010.2059057", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061820512"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/twc.2015.2505728", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061830194"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iccw.2014.6881299", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093430796"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/gamenets.2009.5137412", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094060437"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/infcomw.2011.5928805", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094684497"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/wicom.2011.6040145", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095377482"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2018-12", 
    "datePublishedReg": "2018-12-01", 
    "description": "The physical layer security technology is a technical scheme developed in recent years to solve the problem of information security transmission in wireless communication networks. As one of the physical layer security technologies, cooperative jamming often requires collaborative nodes to actively cooperate with other nodes with secure communication requirements to transmit information. In the environment of heterogeneous wireless network, each wireless node is relatively independent, the relationship is both cooperative and competitive, and the nodes are selfish. In this paper, we study the information transmission between the source and destination nodes, and form a virtual beamforming through the cooperation of the jamming nodes to point to the malicious wiretap nodes, so as to achieve the physical layer secure communication. First, the interest distribution relationship between the source node and other cooperative interference nodes is modeled as the Stackelberg game. The source node pays the consumption of the power consumed by the cooperative jamming nodes and motivates the cooperative interference nodes to participate actively. Then, the competition relationship among all the cooperative nodes is built as a non-cooperative game, so as to promote the reasonable pricing of the consumed power when each node participates in collaboration. When the security rate between the source node and destination node is constant, the power allocation of source and cooperative nodes and the equilibrium point of power price exist and are unique. Through the combined optimization of the two games, the power pricing and power allocation can be dynamically optimized according to the change of the network environment. The simulation results show that the power dynamic allocation and power dynamic pricing have good convergence, and the source node provides a train of thought for the selection of cooperative nodes and their number.", 
    "genre": "research_article", 
    "id": "sg:pub.10.1186/s13638-018-1081-x", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": [
      {
        "id": "sg:journal.1050477", 
        "issn": [
          "1687-1472", 
          "1687-1499"
        ], 
        "name": "EURASIP Journal on Wireless Communications and Networking", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "1", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "2018"
      }
    ], 
    "name": "Based on virtual beamforming cooperative jamming with Stackelberg game for physical layer security in the heterogeneous wireless network", 
    "pagination": "69", 
    "productId": [
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "9870a8ddab07e37721e45c1d2a5ecf6f5a77c7ef1a44a8f8af714945d311268b"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1186/s13638-018-1081-x"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1101819367"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1186/s13638-018-1081-x", 
      "https://app.dimensions.ai/details/publication/pub.1101819367"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2019-04-11T13:09", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000367_0000000367/records_88233_00000001.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "https://link.springer.com/10.1186%2Fs13638-018-1081-x"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1186/s13638-018-1081-x'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1186/s13638-018-1081-x'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1186/s13638-018-1081-x'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1186/s13638-018-1081-x'


 

This table displays all metadata directly associated to this object as RDF triples.

131 TRIPLES      21 PREDICATES      46 URIs      19 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1186/s13638-018-1081-x schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Nbddf80646a0a4c19b509949ae18b4a61
4 schema:citation https://doi.org/10.1002/cpe.3790
5 https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
6 https://doi.org/10.1049/el.2015.1491
7 https://doi.org/10.1109/comst.2014.2349883
8 https://doi.org/10.1109/gamenets.2009.5137412
9 https://doi.org/10.1109/iccw.2014.6881299
10 https://doi.org/10.1109/infcomw.2011.5928805
11 https://doi.org/10.1109/t-wc.2008.070773
12 https://doi.org/10.1109/tcomm.2013.050713.120730
13 https://doi.org/10.1109/tifs.2014.2384392
14 https://doi.org/10.1109/tifs.2015.2481797
15 https://doi.org/10.1109/tifs.2016.2516912
16 https://doi.org/10.1109/tit.2008.921908
17 https://doi.org/10.1109/tit.2008.928272
18 https://doi.org/10.1109/tsp.2009.2038412
19 https://doi.org/10.1109/tsp.2011.2161295
20 https://doi.org/10.1109/tvt.2010.2059057
21 https://doi.org/10.1109/twc.2015.2505728
22 https://doi.org/10.1109/wicom.2011.6040145
23 schema:datePublished 2018-12
24 schema:datePublishedReg 2018-12-01
25 schema:description The physical layer security technology is a technical scheme developed in recent years to solve the problem of information security transmission in wireless communication networks. As one of the physical layer security technologies, cooperative jamming often requires collaborative nodes to actively cooperate with other nodes with secure communication requirements to transmit information. In the environment of heterogeneous wireless network, each wireless node is relatively independent, the relationship is both cooperative and competitive, and the nodes are selfish. In this paper, we study the information transmission between the source and destination nodes, and form a virtual beamforming through the cooperation of the jamming nodes to point to the malicious wiretap nodes, so as to achieve the physical layer secure communication. First, the interest distribution relationship between the source node and other cooperative interference nodes is modeled as the Stackelberg game. The source node pays the consumption of the power consumed by the cooperative jamming nodes and motivates the cooperative interference nodes to participate actively. Then, the competition relationship among all the cooperative nodes is built as a non-cooperative game, so as to promote the reasonable pricing of the consumed power when each node participates in collaboration. When the security rate between the source node and destination node is constant, the power allocation of source and cooperative nodes and the equilibrium point of power price exist and are unique. Through the combined optimization of the two games, the power pricing and power allocation can be dynamically optimized according to the change of the network environment. The simulation results show that the power dynamic allocation and power dynamic pricing have good convergence, and the source node provides a train of thought for the selection of cooperative nodes and their number.
26 schema:genre research_article
27 schema:inLanguage en
28 schema:isAccessibleForFree true
29 schema:isPartOf Na1f2d353b17e4b79b422ed8040f7bb1d
30 Ne3770d083c8149eaa048b12d49ae61f3
31 sg:journal.1050477
32 schema:name Based on virtual beamforming cooperative jamming with Stackelberg game for physical layer security in the heterogeneous wireless network
33 schema:pagination 69
34 schema:productId N81f8169aa109478d86b433821954c06c
35 Nd3b0bed3e9be4414a0608629e18edaca
36 Nf1ec7eb7ed8b4e4e92f66bd7e7b5a073
37 schema:sameAs https://app.dimensions.ai/details/publication/pub.1101819367
38 https://doi.org/10.1186/s13638-018-1081-x
39 schema:sdDatePublished 2019-04-11T13:09
40 schema:sdLicense https://scigraph.springernature.com/explorer/license/
41 schema:sdPublisher Nb5d4d84d11cf4630b2ed84cb6384eae9
42 schema:url https://link.springer.com/10.1186%2Fs13638-018-1081-x
43 sgo:license sg:explorer/license/
44 sgo:sdDataset articles
45 rdf:type schema:ScholarlyArticle
46 N203e85c878374c1a911a47ebdf5f8a15 rdf:first Ncb6956484bd6471191a54990176b28b4
47 rdf:rest N87737125f2c84137b10975a5e53a948e
48 N81f8169aa109478d86b433821954c06c schema:name dimensions_id
49 schema:value pub.1101819367
50 rdf:type schema:PropertyValue
51 N87737125f2c84137b10975a5e53a948e rdf:first sg:person.014724523163.06
52 rdf:rest rdf:nil
53 Na1f2d353b17e4b79b422ed8040f7bb1d schema:issueNumber 1
54 rdf:type schema:PublicationIssue
55 Nb5d4d84d11cf4630b2ed84cb6384eae9 schema:name Springer Nature - SN SciGraph project
56 rdf:type schema:Organization
57 Nbddf80646a0a4c19b509949ae18b4a61 rdf:first sg:person.07407500161.08
58 rdf:rest N203e85c878374c1a911a47ebdf5f8a15
59 Ncb6956484bd6471191a54990176b28b4 schema:affiliation https://www.grid.ac/institutes/grid.440771.1
60 schema:familyName Zhu
61 schema:givenName Li
62 rdf:type schema:Person
63 Nd3b0bed3e9be4414a0608629e18edaca schema:name doi
64 schema:value 10.1186/s13638-018-1081-x
65 rdf:type schema:PropertyValue
66 Ne3770d083c8149eaa048b12d49ae61f3 schema:volumeNumber 2018
67 rdf:type schema:PublicationVolume
68 Nf1ec7eb7ed8b4e4e92f66bd7e7b5a073 schema:name readcube_id
69 schema:value 9870a8ddab07e37721e45c1d2a5ecf6f5a77c7ef1a44a8f8af714945d311268b
70 rdf:type schema:PropertyValue
71 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
72 schema:name Information and Computing Sciences
73 rdf:type schema:DefinedTerm
74 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
75 schema:name Data Format
76 rdf:type schema:DefinedTerm
77 sg:journal.1050477 schema:issn 1687-1472
78 1687-1499
79 schema:name EURASIP Journal on Wireless Communications and Networking
80 rdf:type schema:Periodical
81 sg:person.014724523163.06 schema:affiliation https://www.grid.ac/institutes/grid.440771.1
82 schema:familyName Liu
83 schema:givenName Sanjun
84 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014724523163.06
85 rdf:type schema:Person
86 sg:person.07407500161.08 schema:affiliation https://www.grid.ac/institutes/grid.440771.1
87 schema:familyName Huang
88 schema:givenName Shuanglin
89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07407500161.08
90 rdf:type schema:Person
91 https://doi.org/10.1002/cpe.3790 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016766182
92 rdf:type schema:CreativeWork
93 https://doi.org/10.1002/j.1538-7305.1975.tb02040.x schema:sameAs https://app.dimensions.ai/details/publication/pub.1020909493
94 rdf:type schema:CreativeWork
95 https://doi.org/10.1049/el.2015.1491 schema:sameAs https://app.dimensions.ai/details/publication/pub.1056756585
96 rdf:type schema:CreativeWork
97 https://doi.org/10.1109/comst.2014.2349883 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061258233
98 rdf:type schema:CreativeWork
99 https://doi.org/10.1109/gamenets.2009.5137412 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094060437
100 rdf:type schema:CreativeWork
101 https://doi.org/10.1109/iccw.2014.6881299 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093430796
102 rdf:type schema:CreativeWork
103 https://doi.org/10.1109/infcomw.2011.5928805 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094684497
104 rdf:type schema:CreativeWork
105 https://doi.org/10.1109/t-wc.2008.070773 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061467764
106 rdf:type schema:CreativeWork
107 https://doi.org/10.1109/tcomm.2013.050713.120730 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061558957
108 rdf:type schema:CreativeWork
109 https://doi.org/10.1109/tifs.2014.2384392 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061630456
110 rdf:type schema:CreativeWork
111 https://doi.org/10.1109/tifs.2015.2481797 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061630667
112 rdf:type schema:CreativeWork
113 https://doi.org/10.1109/tifs.2016.2516912 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061630761
114 rdf:type schema:CreativeWork
115 https://doi.org/10.1109/tit.2008.921908 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061651987
116 rdf:type schema:CreativeWork
117 https://doi.org/10.1109/tit.2008.928272 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061652109
118 rdf:type schema:CreativeWork
119 https://doi.org/10.1109/tsp.2009.2038412 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061801981
120 rdf:type schema:CreativeWork
121 https://doi.org/10.1109/tsp.2011.2161295 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061802807
122 rdf:type schema:CreativeWork
123 https://doi.org/10.1109/tvt.2010.2059057 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061820512
124 rdf:type schema:CreativeWork
125 https://doi.org/10.1109/twc.2015.2505728 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061830194
126 rdf:type schema:CreativeWork
127 https://doi.org/10.1109/wicom.2011.6040145 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095377482
128 rdf:type schema:CreativeWork
129 https://www.grid.ac/institutes/grid.440771.1 schema:alternateName Hubei University for Nationalities
130 schema:name School of Information Engineering, Hubei University for Nationalities, 445000, Enshi, China
131 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...