ترغب بنشر مسار تعليمي؟ اضغط هنا

A Game-Theoretic Approach to Covert Communications

186   0   0.0 ( 0 )
 نشر من قبل Alex Leong
 تاريخ النشر 2019
والبحث باللغة English




اسأل ChatGPT حول البحث

This paper considers a game-theoretic formulation of the covert communications problem with finite blocklength, where the transmitter (Alice) can randomly vary her transmit power in different blocks, while the warden (Willie) can randomly vary his detection threshold in different blocks. In this two player game, the payoff for Alice is a combination of the coding rate to the receiver (Bob) and the detection error probability at Willie, while the payoff for Willie is the negative of his detection error probability. Nash equilibrium solutions to the game are obtained, and shown to be efficiently computable using linear programming. For less covert requirements, our game-theoretic approach can achieve significantly higher coding rates than uniformly distributed transmit powers. We then consider the situation with an additional jammer, where Alice and the jammer can both vary their powers. We pose a two player game where Alice and the jammer jointly comprise one player, with Willie the other player. The use of a jammer is shown in numerical simulations to lead to further significant performance improvements.



قيم البحث

اقرأ أيضاً

The deployment of unmanned aerial vehicle (UAV) for surveillance and monitoring gives rise to the confidential information leakage challenge in both civilian and military environments. The security and covert communication problems for a pair of terr estrial nodes against UAV surveillance are considered in this paper. To overcome the information leakage and increase the transmission reliability, a multi-hop relaying strategy is deployed. We aim to optimize the throughput by carefully designing the parameters of the multi-hop network, including the coding rates, transmit power, and required number of hops. In the secure transmission scenario, the expressions of the connection probability and secrecy outage probability of an end-to-end path are derived and the closed-form expressions of the optimal transmit power, transmission and secrecy rates under a fixed number of hops are obtained. In the covert communication problem, under the constraints of the detection error rate and aggregate power, the sub-problem of transmit power allocation is a convex problem and can be solved numerically. Simulation shows the impact of network settings on the transmission performance. The trade-off between secrecy/covertness and efficiency of the multi-hop transmission is discussed which leads to the existence of the optimal number of hops.
A game-theoretic framework is used to study the effect of constellation size on the energy efficiency of wireless networks for M-QAM modulation. A non-cooperative game is proposed in which each user seeks to choose its transmit power (and possibly tr ansmit symbol rate) as well as the constellation size in order to maximize its own utility while satisfying its delay quality-of-service (QoS) constraint. The utility function used here measures the number of reliable bits transmitted per joule of energy consumed, and is particularly suitable for energy-constrained networks. The best-response strategies and Nash equilibrium solution for the proposed game are derived. It is shown that in order to maximize its utility (in bits per joule), a user must choose the lowest constellation size that can accommodate the users delay constraint. Using this framework, the tradeoffs among energy efficiency, delay, throughput and constellation size are also studied and quantified. The effect of trellis-coded modulation on energy efficiency is also discussed.
A game-theoretic framework is used to study the effect of constellation size on the energy efficiency of wireless networks for M-QAM modulation. A non-cooperative game is proposed in which each user seeks to choose its transmit power (and possibly tr ansmit symbol rate) as well as the constellation size in order to maximize its own utility while satisfying its delay quality-of-service (QoS) constraint. The utility function used here measures the number of reliable bits transmitted per joule of energy consumed, and is particularly suitable for energy-constrained networks. The best-response strategies and Nash equilibrium solution for the proposed game are derived. It is shown that in order to maximize its utility (in bits per joule), a user must choose the lowest constellation size that can accommodate the users delay constraint. This strategy is different from one that would maximize spectral efficiency. Using this framework, the tradeoffs among energy efficiency, delay, throughput and constellation size are also studied and quantified. In addition, the effect of trellis-coded modulation on energy efficiency is discussed.
It is known that the capacity of the intelligent reflecting surface (IRS) aided cellular network can be effectively improved by reflecting the incident signals from the transmitter in a low-cost passive reflecting way. Nevertheless, in the actual net work operation, the base station (BS) and IRS may belong to different operators, consequently, the IRS is reluctant to help the BS without any payment. Therefore, this paper investigates price-based reflection resource (elements) allocation strategies for an IRS-aided multiuser multiple-input and single-output (MISO) downlink communication systems, in which all transmissions over the same frequency band. Assuming that the IRS is composed with multiple modules, each of which is attached with a smart controller, thus, the states (active/idle) of module can be operated by its controller, and all controllers can be communicated with each other via fiber links. A Stackelberg game-based alternating direction method of multipliers (ADMM) is proposed to jointly optimize the transmit beamforming at the BS and the passive beamforming of the active modules. Numerical examples are presented to verify the proposed algorithm. It is shown that the proposed scheme is effective in the utilities of both the BS and IRS.
We consider a cellular network deployment where UAV-to-UAV (U2U) transmit-receive pairs share the same spectrum with the uplink (UL) of cellular ground users (GUEs). For this setup, we focus on analyzing and comparing the performance of two spectrum sharing mechanisms: (i) underlay, where the same time-frequency resources may be accessed by both UAVs and GUEs, resulting in mutual interference, and (ii)overlay, where the available resources are divided into orthogonal portions for U2U and GUE communications. We evaluate the coverage probability and rate of both link types and their interplay to identify the best spectrum sharing strategy. We do so through an analytical framework that embraces realistic height-dependent channel models, antenna patterns, and practical power control mechanisms. For the underlay, we find that although the presence of U2U direct communications may worsen the uplink performance of GUEs, such effect is limited as base stations receive the power-constrained UAV signals through their antenna sidelobes. In spite of this, our results lead us to conclude that in urban scenarios with a large number of UAV pairs, adopting an overlay spectrum sharing seems the most suitable approach for maintaining a minimum guaranteed rate for UAVs and a high GUE UL performance.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا