Based on virtual beamforming cooperative jamming with Stackelberg game for physical layer security in the heterogeneous wireless network View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2018-12

AUTHORS

Shuanglin Huang, Li Zhu, Sanjun Liu

ABSTRACT

The physical layer security technology is a technical scheme developed in recent years to solve the problem of information security transmission in wireless communication networks. As one of the physical layer security technologies, cooperative jamming often requires collaborative nodes to actively cooperate with other nodes with secure communication requirements to transmit information. In the environment of heterogeneous wireless network, each wireless node is relatively independent, the relationship is both cooperative and competitive, and the nodes are selfish. In this paper, we study the information transmission between the source and destination nodes, and form a virtual beamforming through the cooperation of the jamming nodes to point to the malicious wiretap nodes, so as to achieve the physical layer secure communication. First, the interest distribution relationship between the source node and other cooperative interference nodes is modeled as the Stackelberg game. The source node pays the consumption of the power consumed by the cooperative jamming nodes and motivates the cooperative interference nodes to participate actively. Then, the competition relationship among all the cooperative nodes is built as a non-cooperative game, so as to promote the reasonable pricing of the consumed power when each node participates in collaboration. When the security rate between the source node and destination node is constant, the power allocation of source and cooperative nodes and the equilibrium point of power price exist and are unique. Through the combined optimization of the two games, the power pricing and power allocation can be dynamically optimized according to the change of the network environment. The simulation results show that the power dynamic allocation and power dynamic pricing have good convergence, and the source node provides a train of thought for the selection of cooperative nodes and their number. More... »

PAGES

69

Identifiers

URI

http://scigraph.springernature.com/pub.10.1186/s13638-018-1081-x

DOI

http://dx.doi.org/10.1186/s13638-018-1081-x

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1101819367


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Hubei University for Nationalities", 
          "id": "https://www.grid.ac/institutes/grid.440771.1", 
          "name": [
            "School of Information Engineering, Hubei University for Nationalities, 445000, Enshi, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Huang", 
        "givenName": "Shuanglin", 
        "id": "sg:person.07407500161.08", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07407500161.08"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Hubei University for Nationalities", 
          "id": "https://www.grid.ac/institutes/grid.440771.1", 
          "name": [
            "School of Information Engineering, Hubei University for Nationalities, 445000, Enshi, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zhu", 
        "givenName": "Li", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Hubei University for Nationalities", 
          "id": "https://www.grid.ac/institutes/grid.440771.1", 
          "name": [
            "School of Information Engineering, Hubei University for Nationalities, 445000, Enshi, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Liu", 
        "givenName": "Sanjun", 
        "id": "sg:person.014724523163.06", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014724523163.06"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1002/cpe.3790", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1016766182"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1002/j.1538-7305.1975.tb02040.x", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1020909493"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1049/el.2015.1491", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1056756585"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/comst.2014.2349883", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061258233"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/t-wc.2008.070773", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061467764"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tcomm.2013.050713.120730", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061558957"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tifs.2014.2384392", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061630456"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tifs.2015.2481797", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061630667"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tifs.2016.2516912", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061630761"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tit.2008.921908", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061651987"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tit.2008.928272", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061652109"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tsp.2009.2038412", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061801981"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tsp.2011.2161295", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061802807"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tvt.2010.2059057", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061820512"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/twc.2015.2505728", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061830194"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iccw.2014.6881299", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093430796"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/gamenets.2009.5137412", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094060437"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/infcomw.2011.5928805", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094684497"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/wicom.2011.6040145", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095377482"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2018-12", 
    "datePublishedReg": "2018-12-01", 
    "description": "The physical layer security technology is a technical scheme developed in recent years to solve the problem of information security transmission in wireless communication networks. As one of the physical layer security technologies, cooperative jamming often requires collaborative nodes to actively cooperate with other nodes with secure communication requirements to transmit information. In the environment of heterogeneous wireless network, each wireless node is relatively independent, the relationship is both cooperative and competitive, and the nodes are selfish. In this paper, we study the information transmission between the source and destination nodes, and form a virtual beamforming through the cooperation of the jamming nodes to point to the malicious wiretap nodes, so as to achieve the physical layer secure communication. First, the interest distribution relationship between the source node and other cooperative interference nodes is modeled as the Stackelberg game. The source node pays the consumption of the power consumed by the cooperative jamming nodes and motivates the cooperative interference nodes to participate actively. Then, the competition relationship among all the cooperative nodes is built as a non-cooperative game, so as to promote the reasonable pricing of the consumed power when each node participates in collaboration. When the security rate between the source node and destination node is constant, the power allocation of source and cooperative nodes and the equilibrium point of power price exist and are unique. Through the combined optimization of the two games, the power pricing and power allocation can be dynamically optimized according to the change of the network environment. The simulation results show that the power dynamic allocation and power dynamic pricing have good convergence, and the source node provides a train of thought for the selection of cooperative nodes and their number.", 
    "genre": "research_article", 
    "id": "sg:pub.10.1186/s13638-018-1081-x", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": [
      {
        "id": "sg:journal.1050477", 
        "issn": [
          "1687-1472", 
          "1687-1499"
        ], 
        "name": "EURASIP Journal on Wireless Communications and Networking", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "1", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "2018"
      }
    ], 
    "name": "Based on virtual beamforming cooperative jamming with Stackelberg game for physical layer security in the heterogeneous wireless network", 
    "pagination": "69", 
    "productId": [
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "9870a8ddab07e37721e45c1d2a5ecf6f5a77c7ef1a44a8f8af714945d311268b"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1186/s13638-018-1081-x"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1101819367"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1186/s13638-018-1081-x", 
      "https://app.dimensions.ai/details/publication/pub.1101819367"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2019-04-11T13:09", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000367_0000000367/records_88233_00000001.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "https://link.springer.com/10.1186%2Fs13638-018-1081-x"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1186/s13638-018-1081-x'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1186/s13638-018-1081-x'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1186/s13638-018-1081-x'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1186/s13638-018-1081-x'


 

This table displays all metadata directly associated to this object as RDF triples.

131 TRIPLES      21 PREDICATES      46 URIs      19 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1186/s13638-018-1081-x schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N6fd91dc55e6e4ad887a19742cddb8693
4 schema:citation https://doi.org/10.1002/cpe.3790
5 https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
6 https://doi.org/10.1049/el.2015.1491
7 https://doi.org/10.1109/comst.2014.2349883
8 https://doi.org/10.1109/gamenets.2009.5137412
9 https://doi.org/10.1109/iccw.2014.6881299
10 https://doi.org/10.1109/infcomw.2011.5928805
11 https://doi.org/10.1109/t-wc.2008.070773
12 https://doi.org/10.1109/tcomm.2013.050713.120730
13 https://doi.org/10.1109/tifs.2014.2384392
14 https://doi.org/10.1109/tifs.2015.2481797
15 https://doi.org/10.1109/tifs.2016.2516912
16 https://doi.org/10.1109/tit.2008.921908
17 https://doi.org/10.1109/tit.2008.928272
18 https://doi.org/10.1109/tsp.2009.2038412
19 https://doi.org/10.1109/tsp.2011.2161295
20 https://doi.org/10.1109/tvt.2010.2059057
21 https://doi.org/10.1109/twc.2015.2505728
22 https://doi.org/10.1109/wicom.2011.6040145
23 schema:datePublished 2018-12
24 schema:datePublishedReg 2018-12-01
25 schema:description The physical layer security technology is a technical scheme developed in recent years to solve the problem of information security transmission in wireless communication networks. As one of the physical layer security technologies, cooperative jamming often requires collaborative nodes to actively cooperate with other nodes with secure communication requirements to transmit information. In the environment of heterogeneous wireless network, each wireless node is relatively independent, the relationship is both cooperative and competitive, and the nodes are selfish. In this paper, we study the information transmission between the source and destination nodes, and form a virtual beamforming through the cooperation of the jamming nodes to point to the malicious wiretap nodes, so as to achieve the physical layer secure communication. First, the interest distribution relationship between the source node and other cooperative interference nodes is modeled as the Stackelberg game. The source node pays the consumption of the power consumed by the cooperative jamming nodes and motivates the cooperative interference nodes to participate actively. Then, the competition relationship among all the cooperative nodes is built as a non-cooperative game, so as to promote the reasonable pricing of the consumed power when each node participates in collaboration. When the security rate between the source node and destination node is constant, the power allocation of source and cooperative nodes and the equilibrium point of power price exist and are unique. Through the combined optimization of the two games, the power pricing and power allocation can be dynamically optimized according to the change of the network environment. The simulation results show that the power dynamic allocation and power dynamic pricing have good convergence, and the source node provides a train of thought for the selection of cooperative nodes and their number.
26 schema:genre research_article
27 schema:inLanguage en
28 schema:isAccessibleForFree true
29 schema:isPartOf N031b69b8cba54f1bbac8df22e3d99cb5
30 N1907d2e6b1764c1ea5c32bbce0a88eed
31 sg:journal.1050477
32 schema:name Based on virtual beamforming cooperative jamming with Stackelberg game for physical layer security in the heterogeneous wireless network
33 schema:pagination 69
34 schema:productId N046fc5bb7fb34a60b3267c00bf50a09b
35 Na5ecfbb2a3624d51b94a171d4040a32d
36 Nc817dbf367ee4575817c48ce17ce5f8a
37 schema:sameAs https://app.dimensions.ai/details/publication/pub.1101819367
38 https://doi.org/10.1186/s13638-018-1081-x
39 schema:sdDatePublished 2019-04-11T13:09
40 schema:sdLicense https://scigraph.springernature.com/explorer/license/
41 schema:sdPublisher N1e774bde5a3b47a780990d661eb8e95f
42 schema:url https://link.springer.com/10.1186%2Fs13638-018-1081-x
43 sgo:license sg:explorer/license/
44 sgo:sdDataset articles
45 rdf:type schema:ScholarlyArticle
46 N031b69b8cba54f1bbac8df22e3d99cb5 schema:volumeNumber 2018
47 rdf:type schema:PublicationVolume
48 N046fc5bb7fb34a60b3267c00bf50a09b schema:name dimensions_id
49 schema:value pub.1101819367
50 rdf:type schema:PropertyValue
51 N1907d2e6b1764c1ea5c32bbce0a88eed schema:issueNumber 1
52 rdf:type schema:PublicationIssue
53 N1e774bde5a3b47a780990d661eb8e95f schema:name Springer Nature - SN SciGraph project
54 rdf:type schema:Organization
55 N6fd91dc55e6e4ad887a19742cddb8693 rdf:first sg:person.07407500161.08
56 rdf:rest N76e6725474d24a9f993787206285d7ed
57 N76e6725474d24a9f993787206285d7ed rdf:first Nb98dfa0a57f64fea8ddcb7381375328a
58 rdf:rest N8667940c1c3f484c8f0367ba47f90d1c
59 N8667940c1c3f484c8f0367ba47f90d1c rdf:first sg:person.014724523163.06
60 rdf:rest rdf:nil
61 Na5ecfbb2a3624d51b94a171d4040a32d schema:name readcube_id
62 schema:value 9870a8ddab07e37721e45c1d2a5ecf6f5a77c7ef1a44a8f8af714945d311268b
63 rdf:type schema:PropertyValue
64 Nb98dfa0a57f64fea8ddcb7381375328a schema:affiliation https://www.grid.ac/institutes/grid.440771.1
65 schema:familyName Zhu
66 schema:givenName Li
67 rdf:type schema:Person
68 Nc817dbf367ee4575817c48ce17ce5f8a schema:name doi
69 schema:value 10.1186/s13638-018-1081-x
70 rdf:type schema:PropertyValue
71 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
72 schema:name Information and Computing Sciences
73 rdf:type schema:DefinedTerm
74 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
75 schema:name Data Format
76 rdf:type schema:DefinedTerm
77 sg:journal.1050477 schema:issn 1687-1472
78 1687-1499
79 schema:name EURASIP Journal on Wireless Communications and Networking
80 rdf:type schema:Periodical
81 sg:person.014724523163.06 schema:affiliation https://www.grid.ac/institutes/grid.440771.1
82 schema:familyName Liu
83 schema:givenName Sanjun
84 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014724523163.06
85 rdf:type schema:Person
86 sg:person.07407500161.08 schema:affiliation https://www.grid.ac/institutes/grid.440771.1
87 schema:familyName Huang
88 schema:givenName Shuanglin
89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07407500161.08
90 rdf:type schema:Person
91 https://doi.org/10.1002/cpe.3790 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016766182
92 rdf:type schema:CreativeWork
93 https://doi.org/10.1002/j.1538-7305.1975.tb02040.x schema:sameAs https://app.dimensions.ai/details/publication/pub.1020909493
94 rdf:type schema:CreativeWork
95 https://doi.org/10.1049/el.2015.1491 schema:sameAs https://app.dimensions.ai/details/publication/pub.1056756585
96 rdf:type schema:CreativeWork
97 https://doi.org/10.1109/comst.2014.2349883 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061258233
98 rdf:type schema:CreativeWork
99 https://doi.org/10.1109/gamenets.2009.5137412 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094060437
100 rdf:type schema:CreativeWork
101 https://doi.org/10.1109/iccw.2014.6881299 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093430796
102 rdf:type schema:CreativeWork
103 https://doi.org/10.1109/infcomw.2011.5928805 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094684497
104 rdf:type schema:CreativeWork
105 https://doi.org/10.1109/t-wc.2008.070773 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061467764
106 rdf:type schema:CreativeWork
107 https://doi.org/10.1109/tcomm.2013.050713.120730 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061558957
108 rdf:type schema:CreativeWork
109 https://doi.org/10.1109/tifs.2014.2384392 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061630456
110 rdf:type schema:CreativeWork
111 https://doi.org/10.1109/tifs.2015.2481797 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061630667
112 rdf:type schema:CreativeWork
113 https://doi.org/10.1109/tifs.2016.2516912 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061630761
114 rdf:type schema:CreativeWork
115 https://doi.org/10.1109/tit.2008.921908 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061651987
116 rdf:type schema:CreativeWork
117 https://doi.org/10.1109/tit.2008.928272 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061652109
118 rdf:type schema:CreativeWork
119 https://doi.org/10.1109/tsp.2009.2038412 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061801981
120 rdf:type schema:CreativeWork
121 https://doi.org/10.1109/tsp.2011.2161295 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061802807
122 rdf:type schema:CreativeWork
123 https://doi.org/10.1109/tvt.2010.2059057 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061820512
124 rdf:type schema:CreativeWork
125 https://doi.org/10.1109/twc.2015.2505728 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061830194
126 rdf:type schema:CreativeWork
127 https://doi.org/10.1109/wicom.2011.6040145 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095377482
128 rdf:type schema:CreativeWork
129 https://www.grid.ac/institutes/grid.440771.1 schema:alternateName Hubei University for Nationalities
130 schema:name School of Information Engineering, Hubei University for Nationalities, 445000, Enshi, China
131 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...