2010 IEEE International Conference on Communications 2010
DOI: 10.1109/icc.2010.5502588
|View full text |Cite
|
Sign up to set email alerts
|

Equilibrium Outcomes of Dynamic Games in MIMO Channels with Active Eavesdroppers

Abstract: Abstract-This paper investigates transmission strategies in a MIMO wiretap channel with a transmitter, receiver and wiretapper, each equipped with multiple antennas. The secrecy rate between the transmitter and the legitimate receiver is chosen as the performance metric. In a departure from existing work, the wiretapper is able to act either as a passive eavesdropper or as an active jammer, under a half-duplex constraint. The transmitter therefore faces a choice between allocating all of its power for data; or… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 18 publications
(11 reference statements)
0
7
0
Order By: Relevance
“…In reality, jammers and eavesdroppers can coexist in communication networks. In [Mukherjee and Swindlehurst 2010], the authors consider the case where a malicious user can choose to behave as a jammer or an eavesdropper, and they formulate a zero-sum dynamic game to model the interactions between a transmitter and a dual eavesdropper/jammer. In addition, in , the authors analyze the complex interactions between wireless users and a malicious node in the context of relay station-enabled wireless networks.…”
Section: Discussionmentioning
confidence: 99%
“…In reality, jammers and eavesdroppers can coexist in communication networks. In [Mukherjee and Swindlehurst 2010], the authors consider the case where a malicious user can choose to behave as a jammer or an eavesdropper, and they formulate a zero-sum dynamic game to model the interactions between a transmitter and a dual eavesdropper/jammer. In addition, in , the authors analyze the complex interactions between wireless users and a malicious node in the context of relay station-enabled wireless networks.…”
Section: Discussionmentioning
confidence: 99%
“…To ensure secure communications, each team would need to allocate power to jam the eavesdroppers. In fact, a more general scenario is when adversarial teams consist of active eavesdroppers: malicious nodes that can act as jammers and eavesdroppers [21].…”
Section: Discussionmentioning
confidence: 99%
“…Recent work also considered by using friendly helpers to provide jamming signals to confuse the eavesdropper [15]- [23]. A wiretapper with a half-duplex model, which is eavesdropping passively or jamming the intended receiver, was considered in [20].…”
Section: Introductionmentioning
confidence: 99%