Based on virtual beamforming cooperative jamming with Stackelberg game for physical layer security in the heterogeneous wireless network View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2018-12

AUTHORS

Shuanglin Huang, Li Zhu, Sanjun Liu

ABSTRACT

The physical layer security technology is a technical scheme developed in recent years to solve the problem of information security transmission in wireless communication networks. As one of the physical layer security technologies, cooperative jamming often requires collaborative nodes to actively cooperate with other nodes with secure communication requirements to transmit information. In the environment of heterogeneous wireless network, each wireless node is relatively independent, the relationship is both cooperative and competitive, and the nodes are selfish. In this paper, we study the information transmission between the source and destination nodes, and form a virtual beamforming through the cooperation of the jamming nodes to point to the malicious wiretap nodes, so as to achieve the physical layer secure communication. First, the interest distribution relationship between the source node and other cooperative interference nodes is modeled as the Stackelberg game. The source node pays the consumption of the power consumed by the cooperative jamming nodes and motivates the cooperative interference nodes to participate actively. Then, the competition relationship among all the cooperative nodes is built as a non-cooperative game, so as to promote the reasonable pricing of the consumed power when each node participates in collaboration. When the security rate between the source node and destination node is constant, the power allocation of source and cooperative nodes and the equilibrium point of power price exist and are unique. Through the combined optimization of the two games, the power pricing and power allocation can be dynamically optimized according to the change of the network environment. The simulation results show that the power dynamic allocation and power dynamic pricing have good convergence, and the source node provides a train of thought for the selection of cooperative nodes and their number. More... »

PAGES

69

Identifiers

URI

http://scigraph.springernature.com/pub.10.1186/s13638-018-1081-x

DOI

http://dx.doi.org/10.1186/s13638-018-1081-x

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1101819367


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Hubei University for Nationalities", 
          "id": "https://www.grid.ac/institutes/grid.440771.1", 
          "name": [
            "School of Information Engineering, Hubei University for Nationalities, 445000, Enshi, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Huang", 
        "givenName": "Shuanglin", 
        "id": "sg:person.07407500161.08", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07407500161.08"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Hubei University for Nationalities", 
          "id": "https://www.grid.ac/institutes/grid.440771.1", 
          "name": [
            "School of Information Engineering, Hubei University for Nationalities, 445000, Enshi, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zhu", 
        "givenName": "Li", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Hubei University for Nationalities", 
          "id": "https://www.grid.ac/institutes/grid.440771.1", 
          "name": [
            "School of Information Engineering, Hubei University for Nationalities, 445000, Enshi, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Liu", 
        "givenName": "Sanjun", 
        "id": "sg:person.014724523163.06", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014724523163.06"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1002/cpe.3790", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1016766182"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1002/j.1538-7305.1975.tb02040.x", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1020909493"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1049/el.2015.1491", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1056756585"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/comst.2014.2349883", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061258233"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/t-wc.2008.070773", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061467764"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tcomm.2013.050713.120730", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061558957"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tifs.2014.2384392", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061630456"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tifs.2015.2481797", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061630667"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tifs.2016.2516912", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061630761"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tit.2008.921908", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061651987"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tit.2008.928272", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061652109"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tsp.2009.2038412", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061801981"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tsp.2011.2161295", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061802807"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tvt.2010.2059057", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061820512"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/twc.2015.2505728", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061830194"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iccw.2014.6881299", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093430796"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/gamenets.2009.5137412", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094060437"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/infcomw.2011.5928805", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094684497"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/wicom.2011.6040145", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095377482"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2018-12", 
    "datePublishedReg": "2018-12-01", 
    "description": "The physical layer security technology is a technical scheme developed in recent years to solve the problem of information security transmission in wireless communication networks. As one of the physical layer security technologies, cooperative jamming often requires collaborative nodes to actively cooperate with other nodes with secure communication requirements to transmit information. In the environment of heterogeneous wireless network, each wireless node is relatively independent, the relationship is both cooperative and competitive, and the nodes are selfish. In this paper, we study the information transmission between the source and destination nodes, and form a virtual beamforming through the cooperation of the jamming nodes to point to the malicious wiretap nodes, so as to achieve the physical layer secure communication. First, the interest distribution relationship between the source node and other cooperative interference nodes is modeled as the Stackelberg game. The source node pays the consumption of the power consumed by the cooperative jamming nodes and motivates the cooperative interference nodes to participate actively. Then, the competition relationship among all the cooperative nodes is built as a non-cooperative game, so as to promote the reasonable pricing of the consumed power when each node participates in collaboration. When the security rate between the source node and destination node is constant, the power allocation of source and cooperative nodes and the equilibrium point of power price exist and are unique. Through the combined optimization of the two games, the power pricing and power allocation can be dynamically optimized according to the change of the network environment. The simulation results show that the power dynamic allocation and power dynamic pricing have good convergence, and the source node provides a train of thought for the selection of cooperative nodes and their number.", 
    "genre": "research_article", 
    "id": "sg:pub.10.1186/s13638-018-1081-x", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": [
      {
        "id": "sg:journal.1050477", 
        "issn": [
          "1687-1472", 
          "1687-1499"
        ], 
        "name": "EURASIP Journal on Wireless Communications and Networking", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "1", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "2018"
      }
    ], 
    "name": "Based on virtual beamforming cooperative jamming with Stackelberg game for physical layer security in the heterogeneous wireless network", 
    "pagination": "69", 
    "productId": [
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "9870a8ddab07e37721e45c1d2a5ecf6f5a77c7ef1a44a8f8af714945d311268b"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1186/s13638-018-1081-x"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1101819367"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1186/s13638-018-1081-x", 
      "https://app.dimensions.ai/details/publication/pub.1101819367"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2019-04-11T13:09", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000367_0000000367/records_88233_00000001.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "https://link.springer.com/10.1186%2Fs13638-018-1081-x"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1186/s13638-018-1081-x'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1186/s13638-018-1081-x'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1186/s13638-018-1081-x'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1186/s13638-018-1081-x'


 

This table displays all metadata directly associated to this object as RDF triples.

131 TRIPLES      21 PREDICATES      46 URIs      19 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1186/s13638-018-1081-x schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N9a86e528225d46cf8f09e1e7d599e57b
4 schema:citation https://doi.org/10.1002/cpe.3790
5 https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
6 https://doi.org/10.1049/el.2015.1491
7 https://doi.org/10.1109/comst.2014.2349883
8 https://doi.org/10.1109/gamenets.2009.5137412
9 https://doi.org/10.1109/iccw.2014.6881299
10 https://doi.org/10.1109/infcomw.2011.5928805
11 https://doi.org/10.1109/t-wc.2008.070773
12 https://doi.org/10.1109/tcomm.2013.050713.120730
13 https://doi.org/10.1109/tifs.2014.2384392
14 https://doi.org/10.1109/tifs.2015.2481797
15 https://doi.org/10.1109/tifs.2016.2516912
16 https://doi.org/10.1109/tit.2008.921908
17 https://doi.org/10.1109/tit.2008.928272
18 https://doi.org/10.1109/tsp.2009.2038412
19 https://doi.org/10.1109/tsp.2011.2161295
20 https://doi.org/10.1109/tvt.2010.2059057
21 https://doi.org/10.1109/twc.2015.2505728
22 https://doi.org/10.1109/wicom.2011.6040145
23 schema:datePublished 2018-12
24 schema:datePublishedReg 2018-12-01
25 schema:description The physical layer security technology is a technical scheme developed in recent years to solve the problem of information security transmission in wireless communication networks. As one of the physical layer security technologies, cooperative jamming often requires collaborative nodes to actively cooperate with other nodes with secure communication requirements to transmit information. In the environment of heterogeneous wireless network, each wireless node is relatively independent, the relationship is both cooperative and competitive, and the nodes are selfish. In this paper, we study the information transmission between the source and destination nodes, and form a virtual beamforming through the cooperation of the jamming nodes to point to the malicious wiretap nodes, so as to achieve the physical layer secure communication. First, the interest distribution relationship between the source node and other cooperative interference nodes is modeled as the Stackelberg game. The source node pays the consumption of the power consumed by the cooperative jamming nodes and motivates the cooperative interference nodes to participate actively. Then, the competition relationship among all the cooperative nodes is built as a non-cooperative game, so as to promote the reasonable pricing of the consumed power when each node participates in collaboration. When the security rate between the source node and destination node is constant, the power allocation of source and cooperative nodes and the equilibrium point of power price exist and are unique. Through the combined optimization of the two games, the power pricing and power allocation can be dynamically optimized according to the change of the network environment. The simulation results show that the power dynamic allocation and power dynamic pricing have good convergence, and the source node provides a train of thought for the selection of cooperative nodes and their number.
26 schema:genre research_article
27 schema:inLanguage en
28 schema:isAccessibleForFree true
29 schema:isPartOf N96fae9ef65df4b10aac2ffd585a92e16
30 Nb4da23c863ef46fcb6b4d417e88c45fd
31 sg:journal.1050477
32 schema:name Based on virtual beamforming cooperative jamming with Stackelberg game for physical layer security in the heterogeneous wireless network
33 schema:pagination 69
34 schema:productId N2f0b532f122d49489605664f915f8abf
35 N3006de52045d41539d0d1daa5d0a1a53
36 Nb0f7156a1e6049ddbe1cf227bb417c3c
37 schema:sameAs https://app.dimensions.ai/details/publication/pub.1101819367
38 https://doi.org/10.1186/s13638-018-1081-x
39 schema:sdDatePublished 2019-04-11T13:09
40 schema:sdLicense https://scigraph.springernature.com/explorer/license/
41 schema:sdPublisher Ncb31f012dead4457886d1073714cb145
42 schema:url https://link.springer.com/10.1186%2Fs13638-018-1081-x
43 sgo:license sg:explorer/license/
44 sgo:sdDataset articles
45 rdf:type schema:ScholarlyArticle
46 N196bbd1d2993444daf58b347f67b2422 rdf:first sg:person.014724523163.06
47 rdf:rest rdf:nil
48 N2f0b532f122d49489605664f915f8abf schema:name doi
49 schema:value 10.1186/s13638-018-1081-x
50 rdf:type schema:PropertyValue
51 N3006de52045d41539d0d1daa5d0a1a53 schema:name readcube_id
52 schema:value 9870a8ddab07e37721e45c1d2a5ecf6f5a77c7ef1a44a8f8af714945d311268b
53 rdf:type schema:PropertyValue
54 N64bd7c0f4b1d47cf83808f5488b65e0c rdf:first N7abc1ae12d3c425792360e6d3b6205d0
55 rdf:rest N196bbd1d2993444daf58b347f67b2422
56 N7abc1ae12d3c425792360e6d3b6205d0 schema:affiliation https://www.grid.ac/institutes/grid.440771.1
57 schema:familyName Zhu
58 schema:givenName Li
59 rdf:type schema:Person
60 N96fae9ef65df4b10aac2ffd585a92e16 schema:issueNumber 1
61 rdf:type schema:PublicationIssue
62 N9a86e528225d46cf8f09e1e7d599e57b rdf:first sg:person.07407500161.08
63 rdf:rest N64bd7c0f4b1d47cf83808f5488b65e0c
64 Nb0f7156a1e6049ddbe1cf227bb417c3c schema:name dimensions_id
65 schema:value pub.1101819367
66 rdf:type schema:PropertyValue
67 Nb4da23c863ef46fcb6b4d417e88c45fd schema:volumeNumber 2018
68 rdf:type schema:PublicationVolume
69 Ncb31f012dead4457886d1073714cb145 schema:name Springer Nature - SN SciGraph project
70 rdf:type schema:Organization
71 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
72 schema:name Information and Computing Sciences
73 rdf:type schema:DefinedTerm
74 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
75 schema:name Data Format
76 rdf:type schema:DefinedTerm
77 sg:journal.1050477 schema:issn 1687-1472
78 1687-1499
79 schema:name EURASIP Journal on Wireless Communications and Networking
80 rdf:type schema:Periodical
81 sg:person.014724523163.06 schema:affiliation https://www.grid.ac/institutes/grid.440771.1
82 schema:familyName Liu
83 schema:givenName Sanjun
84 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014724523163.06
85 rdf:type schema:Person
86 sg:person.07407500161.08 schema:affiliation https://www.grid.ac/institutes/grid.440771.1
87 schema:familyName Huang
88 schema:givenName Shuanglin
89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07407500161.08
90 rdf:type schema:Person
91 https://doi.org/10.1002/cpe.3790 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016766182
92 rdf:type schema:CreativeWork
93 https://doi.org/10.1002/j.1538-7305.1975.tb02040.x schema:sameAs https://app.dimensions.ai/details/publication/pub.1020909493
94 rdf:type schema:CreativeWork
95 https://doi.org/10.1049/el.2015.1491 schema:sameAs https://app.dimensions.ai/details/publication/pub.1056756585
96 rdf:type schema:CreativeWork
97 https://doi.org/10.1109/comst.2014.2349883 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061258233
98 rdf:type schema:CreativeWork
99 https://doi.org/10.1109/gamenets.2009.5137412 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094060437
100 rdf:type schema:CreativeWork
101 https://doi.org/10.1109/iccw.2014.6881299 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093430796
102 rdf:type schema:CreativeWork
103 https://doi.org/10.1109/infcomw.2011.5928805 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094684497
104 rdf:type schema:CreativeWork
105 https://doi.org/10.1109/t-wc.2008.070773 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061467764
106 rdf:type schema:CreativeWork
107 https://doi.org/10.1109/tcomm.2013.050713.120730 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061558957
108 rdf:type schema:CreativeWork
109 https://doi.org/10.1109/tifs.2014.2384392 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061630456
110 rdf:type schema:CreativeWork
111 https://doi.org/10.1109/tifs.2015.2481797 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061630667
112 rdf:type schema:CreativeWork
113 https://doi.org/10.1109/tifs.2016.2516912 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061630761
114 rdf:type schema:CreativeWork
115 https://doi.org/10.1109/tit.2008.921908 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061651987
116 rdf:type schema:CreativeWork
117 https://doi.org/10.1109/tit.2008.928272 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061652109
118 rdf:type schema:CreativeWork
119 https://doi.org/10.1109/tsp.2009.2038412 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061801981
120 rdf:type schema:CreativeWork
121 https://doi.org/10.1109/tsp.2011.2161295 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061802807
122 rdf:type schema:CreativeWork
123 https://doi.org/10.1109/tvt.2010.2059057 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061820512
124 rdf:type schema:CreativeWork
125 https://doi.org/10.1109/twc.2015.2505728 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061830194
126 rdf:type schema:CreativeWork
127 https://doi.org/10.1109/wicom.2011.6040145 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095377482
128 rdf:type schema:CreativeWork
129 https://www.grid.ac/institutes/grid.440771.1 schema:alternateName Hubei University for Nationalities
130 schema:name School of Information Engineering, Hubei University for Nationalities, 445000, Enshi, China
131 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...