Abstract
This paper presents a price-searching model in which a source node (Alice) seeks friendly jammers that prevent eavesdroppers (Eves) from snooping legitimate communications by generating interference or noise. Unlike existing models, the distributed jammers also have data to send to their respective destinations and are allowed to access Alice’s channel if it can transmit sufficient jamming power, which is referred to as collaborative jamming in this paper. For the power used to deliver its own signal, the jammer should pay Alice. The price of the jammers’ signal power is set by Alice and provides a tradeoff between the signal and the jamming power. This paper presents, in closed-form, an optimal price that maximizes Alice’s benefit and the corresponding optimal power allocation from a jammers’ perspective by assuming that the network-wide channel knowledge is shared by Alice and jammers. For a multiple-jammer scenario where Alice hardly has the channel knowledge, this paper provides a distributed and interactive price-searching procedure that geometrically converges to an optimal price and shows that Alice by a greedy selection policy achieves certain diversity gain, which increases log-linearly as the number of (potential) jammers grows. Various numerical examples are presented to illustrate the behavior of the proposed model.
1. Introduction
Due to the inherent broadcast nature of the wireless medium, eavesdropping is one of major threats in wireless network security. Especially, wireless sensor networks, where tiny sensing devices are transmitting information data through radio links, are vulnerable to eavesdroppers (Eves). Physical layer security emerges as an effective means of securing wireless communications against eavesdropping by exploiting the physical characteristics of wireless channels. In the presence of an Eve, a so-called secrecy capacity is given in [1,2] as the difference between the channel capacity from a source (referred to as Alice) to destination (referred to as Bob) and that from the source to Eve.
In tremendous research efforts in enhancing physical layer security (for example, listed in [3]), jamming has been widely accepted as an attractive way, which prevents Eves from snooping legitimate communications by generating friendly interference or noise. In [4], the coverage of friendly jamming is evaluated, and the secrecy outage probability (SOP) is characterized for various levels of channel state information. In [5], optimal power allocation between multiple friendly jammers that cooperatively jam multiple Eves is investigated in order to maximize the secrecy capacity, and SOP is also analyzed. Jamming signals are sometimes transmitted by intermediate relay nodes to secure the source signals, which is so-called cooperative jamming [6,7]. In [8], multiple intermediate nodes are designated as either relays or jammers, for which optimal relay and jammer selection is investigated. In [9], the cooperative jammers harvest energy transmitted by a source and use it to generate artificial noise to jam the Eves cognitive Internet-of-Things networks, in which an auction framework that formulates the jammer selection and the power allocation together is also provided. In an amplify-and-forward relay network, the destination can work as a friendly jammer by generating artificial noise in the first phase to prevent the possibly untrusted relay from decoding the signal [10].
Though there have been plenty of works on investigating the secrecy performance of friendly or cooperative jamming, to the best of our knowledge, why and how much the jammers waste their valuable power or time for Alice is not well modeled in the literature. In [11], a game-theoretic model is established for this purpose, where Alice pays the jammer for the jamming power to interfere with Eve, therefore achieving more secrecy capacity, and the relationship between the jamming power and the price is investigated.
In this paper, we pay attention to the great burden that Alice should suffer in the previous model, though it is a legitimate user having a valuable right to access certain bandwidth. Our model relieves its burden by allowing the jammer to send its own data as a secondary legitimate user and letting Alice charge for the power used to deliver the jammer’s signal, which is referred to as collaborative jamming in this paper. The proposed collaborative jamming is more efficient than the previous jamming techniques in the sense that the jamming power is not just wasted, but used to send information data. To maintain the communication quality of Alice, the collaboration is allowed only if it does not degrade a predetermined level of secrecy capacity.
With the collaboration, we provide an optimal price issued by Alice and an optimal power allocation by the jammer corresponding to the price, where Alice is often called a price-leader and Jack is a price-follower in Stackelberg games. In order to provide the optimal solutions, we assume that legitimate sensors have perfect and full knowledge of Eve’s channel in their vicinity. We further investigate two scenarios for the collaboration: Bob and the jammer share common artificial signals (CASs) that are used for jamming signals so that Bob could (partly) cancel the jamming interference from the received signals; Additionally, Bob and the jammer have no CASs, and thus, the whole power from the jammer is treated as interference by Bob. We further extend the model with multiple jammers, in which Alice selects the most beneficial jammer that would provide the greatest payment. With such a greedy-selection policy, it is shown that the benefit taken by Alice increases as the number of potential jammers increases. Moreover, the probability (in asymptotic environments) that Alice’s benefit drops below a certain predefined threshold is shown to decrease geometrically as the number of jammers grows. If multiple jammers exist, it is hard for Alice to know the network-wide channel information for jammers and/or for Eves. By assuming that only the jammers, but Alice, know the relevant channel information, an interactive and iterative price-searching procedure is provided. The procedure converges geometrically to an optimal price. With numerical investigation, we show that the convergence speed is sufficiently fast with the moderate number of jammers. Numerical examples are also provided for illustrating the proposed optimal pricing and power allocation for a single jammer and multiple jammers, respectively. The result especially show that about a 6–28% increase in Alice’s benefit is achieved by allowing eight jammers to participate in the price-searching procedure.
The contributions of this paper can be summarized as follows:
- provides a new price-searching model that explains an adequate price level of the transmitting power used to deliver secondary traffic by friendly jammers; who also contribute to protecting the secure transmission of Alice,
- presents, in closed-form, an optimal price that maximizes Alice’s benefit and the corresponding optimal power allocation from a jammers’ perspective;
- provides a distributed and interactive price-searching procedure that can be applied for multiple-jammer scenarios and geometrically converges to an optimal price; and
- shows that Alice by a greedy selection policy achieves a certain diversity gain, which increases log-linearly as the number of (potential) jammers grows.
The remainder of the paper is organized as follows. The system model that includes the collaboration condition and signal representations in the collaboration is provided in Section 1, In Section 2, optimal pricing and power allocation are provided for a single-jammer case. An optimal price is presented in closed-form for both scenarios: with and without CAS, respectively. Section 3 extends the result with a single jammer to a case of multiple jammers. When Alice selects the best jammer among potential jammers, it is shown that it enjoys a certain diversity gain that log-linearly increases as the number of jammers grows. In order to cope with a more practical problem in which Alice cannot gather the whole channel information in the network, a distributed and interactive collaboration search procedure (ICSP) is also provided in Section 3. The convergence of ICSP is numerically investigated in Section 4, in which a variety of other numerical examples is also discussed. Finally, conclusions are presented in Section 5. The main notations used in this paper are listed in Table 1.
Table 1.
Notations.
2. System Model
2.1. Collaboration Model
We first consider a wireless network that consists of two source-destination pairs and an eavesdropper: , and E, respectively, as shown in Figure 1a. The system with multiple jammers (in Figure 1b) is investigated in Section 4. Alice (A) and Bob (B) are primary legitimate users where primary source Alice is allocated radio resources such as a unit time slot and transmit power to send its own data to Bob. On the other hand, secondary source Jack (J) has been partly allowed to access the time slot only if it does not degrade communication quality between the primary users by certain collaboration to be defined below. Eve (E) is another party that is eavesdropping the primary communication. We assume that Eve does not care about Jack’s messages and treats it as interference.
Figure 1.
The system models: (a) single-jammer model; (b) multiple-jammer model.
Jack seeks an opportunity to send signals to by jamming Eve to prevent it from eavesdropping Alice’s signal. Let be a secrecy rate target desired by Alice. Alice allows Jack to access the time slot if Jack has sufficient jamming power by which can be maintained and pays (dollars) per power unit that is used to send Jack’s own data. In summary, the collaboration between Alice and Jack could be established if:
- the collaboration would not have dropped the secrecy rate between the primary users below ;
- Jack would pay to Alice for a unit power that it allocates to its own signal during the collaboration; and
- the benefit expected by the collaboration would be positive for both Alice and Jack.
We assume that Jack has transmit power . For a given , Jack would maximize its utility of by deciding whether it joins the collaboration and how much power it will use to send its own data and pay the charge. Alice wants to attract Jack and maximize its revenue by setting an adequate price .
Alice is often called a price-leader and Jack is a price-follower in Stackelberg games. Our main interest lies in finding optimal that maximizes Alice’s revenue and Jack’s optimal power allocation strategies.
2.2. Signal Model for the Collaboration
Let , , , , and (shown in Figure 1) be the complex channel coefficients between A-B, A-E, J-E, J-B, J- and A- links, respectively. The channels are assumed to be static during the collaboration. Let and be complex symbol vectors for the message transmitted by Alice to Bob and Jack to , respectively. If Alice and Jack (also ) have common artificial signals (CASs), Jack designates them as specific jamming signals denoted by . Otherwise, is not used. When CAS exits, Jack transmits a superimposed signal where represents a power allocation factor between message signal and artificial signal . If CAS does not exist, (it is also shown to be optimal shortly). Let be noise power at the receivers. The signals received at Bob and are:
respectively. Eve also receives the signals simultaneously such that:
We assume that the transmitted symbols have zero mean and unit power. The complex additive Gaussian noises with zero mean and variance are assumed for and , respectively. For notational brevity, let for all i. We assume that Alice and Jack know the relevant channel information perfectly.
3. Optimal Pricing and Power Allocation
3.1. When CAS Exists
3.1.1. With Fixed
When CAS exits, is known to Bob, as well as and can be canceled at the respective receivers. Thus, the channel capacities over A-B and A-E are given by:
respectively, where only is the interfering power from Jack at Bob since can be removed using an interference cancellation technique. Secrecy rate on A-B is then defined by [12]:
The collaboration is then possible if:
which is referred to as the collaboration allowance condition (CAC) in this paper.
Substituting (4) and (5) into (7), we obtain a collaboration-allowable power range:
where:
is a maximally-allowable fraction of Jack’s power to its own signals while keeping CAC. If , CAC cannot be held with any positive power allocation, and then, the collaboration fails.
In the collaboration with Alice and Bob, Jack can achieve data rate:
Let Jack have positive return (dollars) per the achieved data rate. The net revenue (utility) of Jack then can be modeled as:
For given , and , Jack finds an optimal power allocation by solving:
By investigating the Karush–Kuhn–Tucker condition for (12), analogous to the method found in [13], we can have the following optimal power allocation.
Lemma 1 (Jack’s optimal power allocation).
where:
For Alice and Bob, the payment by Jack can be regarded as compensation for the collaboration. If Jack optimizes its revenue with the power allocation in (13), the incentive for the primary users is then given by:
If we assume that Alice further knows and , Alice can maximize its incentive in (15). Obviously, is maximized at .
Lemma 2 (Optimal pricing by Alice).
When Jack allocates transmit power to maximize its own revenue in (11), an optimal pricing policy by Alice is , and the maximum incentive for Alice is .
3.1.2. Optimal
It is noted that Jack’s optimal power allocation is always if Alice maximizes its incentive by disseminating an optimal price and CAC holds. Keeping CAC, is equivalent to:
By substituting into (11) and letting , we have a new problem to determine for Jack:
for which an optimal solution is given by:
Furthermore, let us denote the maximum available power at Jack by . An optimal is thus obtained by equating :
3.2. When CAS Does Not Exist
In this case, Jack’s signals cannot be distinguished between jamming and data signals, and Alice assumes that the whole power from Jack is used to deliver Jack’s signal and hence sets . For Jack, it is also optimal to set , since it should pay if it uses power . Let us denote the secrecy rate on A-B with by . Then, CAC gives a quadratic inequality on with interim constants and c such that:
where , , and . Since , if , CAC cannot hold for any real ; otherwise, letting and ( where the equality holds if be the two real roots of (20), should be:
in order to keep CAC. We assume in this paper that to ensure the given problem is feasible.
For given , Jack is now solving:
under the constraint in (21). An optimal solution can be obtained by:
where and:
For Alice, referring to (15), an optimal pricing policy is with , which gives:
where . Putting (25) into (24), we can have .
Lemma 3 (Optimal pricing and power allocation when CAS is not available).
When CAS is not available, an optimal pricing policy by Alice is , and an optimal transmit power by Jack is if feasible. The corresponding incentive for Alice is now
4. Extension to Multiple Jammers
4.1. Greedy Jammer Selection
Let and denote sets of jammers who have CASs or not, respectively, and let us assume . For jammer , we assume that each of them transmits at a maximum power level . Hereafter, superscript is used to denote the respective jammers. For , we assume that each jammer has real roots for (20), and the greater one is denoted by ; further assume that without loss of generality.
When is given by Alice, jammers compute and according to (13) and (23), respectively. Let the payment by each of the jammers be denoted by . Then:
Let us define:
Thus, optimal price for multiple jammers is given by:
In (27), it can be seen that there exists at least one such that for given . Let us denote by k a jammer that provides . Thus, jammer k offers a maximum payment to Alice. Alice maximizes its utility by choosing jammer k, which is referred to as a greedy selection in this paper. Ties, if any, could be broken arbitrarily. Selected jammer k determines its optimal power allocation according to either (13) or (23).
4.2. Asymptotic Analysis
When there are K jammers, Alice can select one of them as a friendly jammer, which may provide a maximum payment. Let be the maximum payment by jammer j, which is determined when an optimal price is offered by Alice. Then, Alice’s maximum utility with K cooperative jammers can be:
obviously increases as K increases, which means that Alice enjoys the benefit from the diversity of potential jammers with the greedy selection principle. To quantify this benefit, let us assume that Alice has a utility target and suffers from a utility outage when . The probability of utility outage is then defined by:
We assume that for brevity. It is easy to show that the following observation is analogously valid for .
As goes to infinity, decreases and converges to:
where . Additionally, also converges to:
When further goes to infinity, where . An asymptotic expression of is given by:
where . Let:
Then, the asymptotic outage probability becomes (if we assume that every jammer has the same for brevity):
where and represent the PDF of and the CDF of , respectively.
We assume that and () have the exponential distribution with mean and mean , respectively, and that all the channels are mutually independent. Then, the PDF of is given by , and the PDF of is given by . The CDF of is then given by:
where and .
Lemma 4.
achieves full diversity gain in the sense that the log of utility outage probability decreases as an order of K when every and the channel gain is known and fixed.
Proof.
Let us denote the fixed by , and we assume independent and identical ’s (), so that for all j. By using approximation in (36), when , with given becomes:
Thus,
☐
When Alice wants to keep its utility from dropping below a threshold , the increasing number of cooperative jammers probabilistically helps to reduce the probability of utility outage. Lemma 4 tells us how the number of jammers contributes to diminishing the outage probability. It tells us that when the channel between Jack and its receiver becomes relatively very good compared to the interfering links: Alice to and Jack to Bob, both of which are unwanted signal paths, the outage probability decreases log-linearly. This property also holds for jammers in even without assuming fixed . For the utility provided in Lemma 3, it is seen that only the ratio / matters in achieving the full diversity gain for jammers in .
4.3. Distributed Collaboration Protocol for Multiple Jammers
For a single jammer, Alice and Jack can share the whole channel knowledge by adequate feedback channels. However, if there are multiple (potential) jammers, it is hard for Alice and the jammers to have the wide-range channel information over the whole network. In this subsection, we assume that Alice has only the channel information on and , and each jammer has its own channel information on , , and .
Looking for the collaboration, Alice initially broadcasts with channel information , and secrecy rate target (and also if it is not known to the jammers in advance). Each jammer j that has some message to send and also seeks the collaboration opportunity then computes either or according to (13) and (23), respectively. Of course, each jammer has prior knowledge of and . Each jammer sends either or with , if needed, which could be already known to Alice by previous communications. Jammers send the power allocation as an agreement of the collaboration when the power allocation is positive. Alice receives the response from the jammers and tries to determine whether it will send a new price or stop sending the price and choose the best jammer with the feedbacks so far.
According to (13), is not dependent on if . However, it decreases if . Let us denote by the i-th price successively sent by Alice looking for the collaboration. By using two successive designated prices and (), Alice can have partial information on power allocation by jammer from the responses such that if , then and . Getting and a lower bound on by the above reasoning, Alice can also have an upper bound on by a response , which means .
For jammer , its response on power allocation will be one of , , and . When Alice increases , the response finally reaches either or : If , it eventually becomes ; Otherwise, . When Alice increases , regarding the sequence of responses, jammer falls into one of three classes: the first type that responds with either fixed power or , the second type that increases its power from to and the third type that increases its power from to . Since Alice knows from the feedback, it finally understands whether the jammer allocates or .
Motivated by the above findings, an interactive and iterative collaboration search procedure (ICSP) is provided in Table 2. It is primarily based on the bisectional search that guides Alice’s pricing trials to find or . In this procedure, and represent a lower and an upper limit of the price in practice, respectively, which are set by Alice. ICSP tries to find the collaboration starting with the smallest possible price , by which Alice can attract as many as friendly jammers possible. In ICSP, if for a predefined threshold , it is regarded that the price is sufficiently exploited for jammer j. If every potential jammer satisfies the condition, ICSP terminates with an individual pricing range of the jammers, and then, the most plausible jammer is selected for the collaboration. Otherwise, further improvement in the payment by jammer j is expected by and the biggest jammer is selected for the next price-searching. Since replaces either or for some j, ICSP converges geometrically and terminates within , where N represents the total number of potential jammers in .
Table 2.
Interactive collaboration search procedure (ICSP).
5. Numerical Examples
5.1. A Single Jammer
To illustrate the pricing mechanism proposed in this paper, we use the network configurations shown in Figure 2. The location of a communication node appears in a Euclidean coordinate. Alice, Bob, Eve and are fixed at and , respectively. Jack is assumed to move either from to along with the horizontal line (as shown in Figure 2a) or from to along with the vertical line (as shown in Figure 2b). The position of Jack is denoted by or . We assume a geometric path loss law of / where is the distance of the respective link, is a path loss exponent and represents the effect of the other fading components. We also assume that // dB, and .
Figure 2.
Network models used in the simulation: (a) the jammer moves horizontally; (b) the jammer moves vertically.
Figure 3a,b illustrates the optimal prices obtained in this paper when Jack moves horizontally from Alice to Bob and vertically from to , respectively. In Figure 3a, Jack in can be attracted to the collaboration with a relatively low price, for example less than 0.8940, until it reaches . Beyond this point, higher prices can be possible. Jack in allows a relatively high price compared to the price for . However, in Figure 3b, Jack in mostly requires a low price for collaboration. When Jack moves along with the vertical line, the price goes down immediately after it is closer to Eve than to , which means that the transmitting power contributes to jamming greatly, and hence, the price would be low.
Figure 3.
Optimal prices. (a) the jammer moves horizontally; (b) the jammer moves vertically.
In Figure 4a,b, the resulting power allocation is provided for similar scenarios used (and thus, for the prices obtained) in drawing Figure 3a,b, respectively. In Figure 4a, it is seen that around position , the whole power is allocated to send Jack’s own signal for which the prices might be low. In Figure 4b, after Jack gets closer to Eve, the power allocated to send Jack’s own signal is increased with relatively low prices as described in Figure 3b. This is because the power is more efficiently used for jamming, and Jack enjoys low prices for sending its signal. However, if Jack goes too far from (for example, above ), it is hard to enjoy the above favorable circumstances.
Figure 4.
Power allocation for the collaboration: (a) the jammer moves horizontally; (b) the jammer moves vertically.
Figure 5a,b provides the utility values obtained by the collaboration, which is established by the prices obtained in Figure 3a,b, respectively. In both of the figures, it is seen that if Alice and jammers share CAS, then they have a significantly positive benefit at more positions than without CAS. For Figure 5a, significantly positive benefit for the collaboration without CAS is possible if it is between and . With CAS, the range is widened to and in the tested scenario. In Figure 5b, the collaboration without CAS cannot achieve a positive benefit if Jack is closer to than to Eve. With CAS, there is no limitation on the collaboration. It is noted that the absolute values of the utilities are hardly compared since scale factors for the rate and the power are given arbitrarily for the simulation.
Figure 5.
Utilities obtained by the collaboration: (a) the jammer moves horizontally; (b) the jammer moves vertically.
5.2. Multiple Jammers
To illustrate the behavior of optimal pricing, we randomly generate four jammers in (i.e., with CAS) and let each of them, at each time instant, move in the respective random direction of with fixed distance r. Between two successive time instants (i.e., two successive movements), the moving directions are designated to have a correlation of 0.8. The distance step distinguishes two classes of jammers: slow speed with and high speed with . To test and compare, we use exactly the same trajectories for jammers in with those simulated for jammers in . That is, along with a trajectory generated in the simulation, two jammers (one from the other from ) move together.
In Figure 6a,b, optimal with each jammer at each time instant is illustrated. Jammers tested are indexed as and , among which are low-speed jammers and are high-speed jammers. In Figure 6a, as time elapses from one to 20, optimal payed by the jammers with CAS is plotted according to the movement. At the beginning, Jammer 2 is the best one that is willing to pay the most, and Alice would agree to the collaboration with Jammer 1. At Time Instant 5, Jammer 1 would pay more than Jammer 2 and be possibly selected as the collaboration partner until Time Instant 18. Jammers 3 and 4 have no chance in participating in the collaboration and to access the channel to send their own data. In Figure 6b, the payment by jammers without CAS, but with the same trajectories used, is plotted. In this group of jammers, Jammer 6 (on the same path with Jammer 2) enjoys the collaboration until Time 16, and Jammer 8 takes it from Time 17 to 20. Even on the same trajectories, the selection looks different. Jammer 1, the most frequently selected one if it has CAS, hardly has found a chance for collaboration without CAS.
Figure 6.
Comparison of payment to Alice from different jammers: (a) jammers from ; (b) jammers from .
Figure 7a,b summarizes the selection result from Jammers 1 through 8 investigated in Figure 6a,b. In Figure 7a, the selected jammer is illustrated at each time instant. Until Time 3, Jammer 6 without CAS is selected. After Time 4, Jammer 1 and then Jammer 2 are selected, both of which have CAS. The resulting payment is illustrated in Figure 7b. It shows a , and increase of the utility by Alice compared with a single jammer case of Jammers 1, 2 and 6, respectively.
Figure 7.
Multiple-jammer effects: (a) selected jammer by the greedy policy; (b) utility achieved by Alice with multiple jammers.
Figure 8a,b illustrates the convergence behavior of ICSP. ICSP with potential jammers is tested, respectively. In Figure 8a, (an updating variable that indicates the current greatest payment) is shown as iteration proceeds. , as expected, monotonically increases and almost approaches its maximum within around 15, 50 and 82 iterations with 8, 12 and 16 jammers, respectively. It is also seen that the increasing number of jammers provides a greater , which is increased by and with a 50% and 100% increase of jammers from eight, respectively. Figure 8b shows the maximum of convergence-testing metric used in ICSP. If , then ICSP terminates. It is seen that all three examples tested are terminated within around 23 iterations for and around 30 iterations for with eight jammers.
Figure 8.
Convergence behavior of ICSP: (a) payment behavior; (b) convergence speed.
Figure 9a,b provides the CDF of the number of iterations required to achieve target ’s. Figure 9a,b tests the different numbers of jammers, 20 and 40, respectively, half of which are jammers with CAS and the other half without CAS. Instant collaborations from 10,000 random samples are used for each of the CDFs. With 20 jammers, more than 90% of tests are terminated within 78 and 401 iterations for and , respectively. Furthermore, with 40 jammers, more than of tests are terminated within 113 and 734 iterations, respectively.
Figure 9.
CDF of the number of iterations required for convergence of ICSP: (a) 20 jammers (b) 40 jammers.
5.3. Comparative Result
In this subsection, we numerically compare the proposed method with an existing method that provides an optimal power allocation for friendly jammers [5] (referred to as OPF in the following) in terms of sum-rate (the sum of Alice’s secrecy rate and Jack’s data rate). The proposed method does not intend to maximize the sum-rate, but provides data rates that are determined by an optimal price. On the other hand, the method in [5] maximizes the secrecy rate between Alice and Bob, but does not allow Jack’s usage of the bandwidth. A direct comparison between the two methods is not fair. Thus, the purpose of this comparison is to provide an insight about how the proposed pricing allocates the limited radio resource between Alice and Jack compared with the existing optimal power allocation that just maximizes Alice’s data rate.
Figure 10a,b compares the sum-rates provided by the optimal price given in this paper and OPF in [5]. For Figure 10a, Jack moves horizontally from Alice to Bob as used in Figure 3a. In this case, OPF provides its maximal rate of 0.12 at , from which the rate goes down since Jack approaches Bob. The proposed pricing achieves maximal sum rates of 2.81 and 2.57 at and with and without CAS, respectively, when the secrecy rate target . When , the proposed method achieves maximal sum rates of 2.69 and 2.14 at and with and without CAS, respectively. It is thus seen that the sum-rate achieved by the proposed method is significantly greater than the sum-rate by the optimal power allocation if the collaboration is established. The collaboration however can fail when large is required especially without CAS. For Figure 10b, Jack moves vertically from to as used in Figure 3b. In this case, OPF provides its maximal rate of 0.39 at , to which the rate goes up since Jack gets close to Eve. The proposed pricing achieves maximal sum rates of 1.89 and 2.28 at and with and without CAS, respectively, when the secrecy rate target . When , the proposed method achieves maximal sum rates of 1.15 and 0.65 at and with and without CAS, respectively. In this figure, it is also seen that the proposed method can achieve the greater sum-rates if the collaboration is possible.
Figure 10.
Comparison of sum-rates with a single jammer. (a) The jammer moves horizontally; (b) the jammer moves vertically.
Figure 11a,b compares the sum-rates when multiple jammers exist, which randomly move according to the similar principle described in Subsection 5.2. In the simulation, we assume . In Figure 11a, the number of jammers is assumed to be four with and without CAS, respectively. OPF provides its maximal rate of 0.79 at the elapsing of Time 6, at which the proposed method achieves 0.79 and 0.58 with and without CAS, respectively. On the other hand, the proposed method achieves the maximum sum-rate of 2.8 and 1.05 at Times 20 and 13 with and without CAS, respectively. In Figure 11b, the number of jammers is assumed to be 10 with and without CAS, respectively. In this figure, OPF provides its maximal rate of 0.82 at the elapsing of Time 11, at which the proposed method achieves 2.09 and 1.19 with and without CAS, respectively. The proposed method achieves the maximum sum-rate of 3.05 and 1.28 at Times 17 and 14 with and without CAS, respectively. In comparison with Figure 10a,b and Figure 11a,b, it is seen that both of the methods enjoy a diversity gain from multiple friendly jammers. If the number of friendly jammers increases, the probability of collaboration also increases, and the proposed method could have a greater chance to achieve a greater sum-rate since it allows secondary usage of the radio resource by the jammers.
Figure 11.
Comparison of sum-rates with multiple jammers. (a) When the number of jammers is four; (b) when the number of jammers is 10.
6. Conclusions
This paper has provided a pricing model to explain and encourage the proposed collaboration between Alice and friendly jammers. Optimal price and power allocation are analyzed and presented in closed-form. In wireless sensor networks, distributed sensor nodes often suffer from a lack of bandwidth and then can work as a jammer to share the bandwidth by the proposed collaboration. Greedy use of the bandwidth by jammers is limited by pricing the power used to send their own signal. For a multiple-jammer scenario, ICSP is provided for a practical implementation of the price-searching. The convergence is reached within 78 to 734 iterations depending on the number of participating jammers and the termination condition. To reduce the speed of finding a price, we limit the iterations by 10 and 20, respectively, motivated by Figure 8a and find that the average utility loss is only around 6% for both cases. Especially when the number of jammers is 40, the loss is 1.7% and 1.6%, respectively. This implies that the early termination does not cause significant loss in Alice’s utility and can be a promising method for massive sensor networks where a number of friendly jammers can exist. When considering 5 ms to be a typical period of radio scheduling in modern communication systems, a new good price can be searched within 50 to 100 ms for distributed multiple jammers. Finally, the channel assumption used in the simulation is somewhat limited, and we leave it for future study to apply more realistic fading environments such as, for example, correlated composite Nakagami-m/Gamma fading channels used in [14].
Acknowledgments
This work was supported by the research fund of Signal Intelligence Research Center supervised by the Defense Acquisition Program Administration and the Agency for Defense Development of Korea.
Author Contributions
Dae-Kyo Jeong summarized the model and did the experiments. Insook Kim prepared an initial draft. Dongwoo Kim wrote the Introduction and investigations.
Conflicts of Interest
The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
| CAS | Common artificial signal |
| Eves | Eavesdroppers |
| ICSP | Iterative collaboration search procedure |
References
- Wyner, A.D. The Wire-Tap Channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
- Leung-Yan-Cheong, S.K.; Hellman, M.E. The Gaussian Wiretap Channel. IEEE Trans. Inf. Theory 1978, 24, 451–456. [Google Scholar] [CrossRef]
- Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef]
- Vilela, J.P.; Bloch, M.; Barros, J.; McLaughlin, S.W. Wireless Secrecy Regions with Friendly Jamming. IEEE Trans. Inf. Forensics Secur. 2011, 6, 256–266. [Google Scholar] [CrossRef]
- Cumanan, K.; Alexandropoulos, G.C.; Ding, Z.; Karagiannidis, G.K. Secure Communications with Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis. IEEE Trans. Veh. Technol. 2017, 66, 7495–7505. [Google Scholar] [CrossRef]
- Tekin, E.; Yener, A. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming. IEEE Trans. Inf. Theory 2008, 54, 2735–2751. [Google Scholar] [CrossRef]
- Lai, L.; El Gamal, H. The Relay-Eavesdropper Channel: Cooperation for Secrecy. IEEE Trans. Inf. Theory 2008, 54, 4005–4019. [Google Scholar] [CrossRef]
- Wang, K.; Yuan, L.; Miyazaki, T.; Zeng, D.; Guo, S.; Sun, Y. Strategic Antieavesdropping Game for Physical Layer Security in Wireless Cooperative Networks. IEEE Trans. Veh. Technol. 2017, 66, 9448–9457. [Google Scholar] [CrossRef]
- Li, Z.; Jing, T.; Ma, L.; Huo, Y.; Qian, J. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks. Sensors 2016, 16, 339. [Google Scholar] [CrossRef] [PubMed]
- Liu, Y.; Li, L.; Alexandropoulos, G.C.; Pesavento, M. Securing Relay Networks with Artificial Noise: An Error Performance-Based Approach. Entropy 2017, 19, 384. [Google Scholar] [CrossRef]
- Han, Z.; Marina, N.; Debbah, M.; Hjørungnes, A. Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer. EURASIP J. Wirel. Commun. Netw. 2010, 2009, 452907. [Google Scholar] [CrossRef]
- Barros, J.; Rodrigues, M.R.D. Secrecy Capacity of Wireless Channnels. In Proceedings of the 2006 IEEE International Symposium on Information Theory, Seattle, WA, USA, 9–14 July 2006; pp. 356–360. [Google Scholar]
- Kim, I.; Kim, D. Pricing and Optimal Power Allocation in Collaborative Primary-Secondary Transmission using Superposition Coding. In Proceedings of the 2010 IEEE Region 10 Conference (TENCON 2010), Hukuoka, Japan, 21–24 November 2010; pp. 857–861. [Google Scholar]
- Alexandropoulos, G.C.; Peppas, K.P. Secrecy Outage Analysis over Correlated Composite Nakagami-m/ Gamma Fading Channels. IEEE Commun. Lett. 2017, PP. [Google Scholar] [CrossRef]
© 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).