Abstract
Emerging wireless systems will need to address multiple, conflicting objectives: ensuring the secrecy of the communication secrecy (i.e., maximizing the un-eavesdropped throughput at the receiver), and ensuring the “security” of the communication (i.e., minimizing damage that might arise because of the possibility that there is leakage in communication). This problem presents a dilemma for system engineers since the optimal solution for one of objective might be not optimal for the other. This dilemma calls for a need for designing a trade-off solution for these objectives. In this paper, we propose the use of a Kalai-Smorodinsky bargaining solution between secrecy and security for OFDM-style communications, which allows one to select the security level of communication. In particular, this solution allows one to maintain the ratios of maximal gains for cooperative fulfilment of both objectives.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Altman, E., Avrachenkov, K., Garnaev, A.: Transmission power control game with SINR as objective function. In: Altman, E., Chaintreau, A. (eds.) NET-COOP 2008. LNCS, vol. 5425, pp. 112–120. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00393-6_14
Alvim, M.S., Chatzikokolakis, K., Palamidessi, C., Smith, G.: Measuring information leakage using generalized gain functions. In: 25th IEEE Computer Security Foundations Symposium, pp. 265–279 (2012)
Balmahoon, R., Cheng, L.: Information leakage of heterogeneous encoded correlated sequences over an eavesdropped channel. In: IEEE International Symposium on Information Theory (ISIT), pp. 2949–2953 (2015)
Bashar, S., Ding, Z.: Optimum power allocation against information leakage in wireless network. In: IEEE Global Telecommunications Conference (GLOBECOM), pp. 1–6 (2009)
Csiszár, I., Körner, J.: Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 24, 339–348 (1978)
Garnaev, A., Baykal-Gursoy, M., Poor, H.V.: Incorporating attack-type uncertainty into network protection. IEEE Trans. Inf. Forensics Secur. 9, 1278–1287 (2014)
Garnaev, A., Baykal-Gursoy, M., Poor, H.V.: A game theoretic analysis of secret and reliable communication with active and passive adversarial modes. IEEE Trans. Wirel. Commun. 15, 2155–2163 (2016)
Garnaev, A., Trappe, W.: The eavesdropping and jamming dilemma in multi-channel communications. In: IEEE International Conference on Communications (ICC), pp. 2160–2164 (2013)
Garnaev, A., Trappe, W.: Secret communication when the eavesdropper might be an active adversary. In: Jonsson, M., Vinel, A., Bellalta, B., Belyaev, E. (eds.) MACOM 2014. LNCS, vol. 8715, pp. 121–136. Springer, Heidelberg (2014). doi:10.1007/978-3-319-10262-7_12
Garnaev, A., Trappe, W.: To eavesdrop or jam, that is the question. In: Mellouk, A., Sherif, M.H., Li, J., Bellavista, P. (eds.) ADHOCNETS 2013. LNICSSITE, vol. 129, pp. 146–161. Springer, Heidelberg (2014). doi:10.1007/978-3-319-04105-6_10
Garnaev, A., Trappe, W.: Anti-jamming strategies: a stochastic game approach. In: Agüero, R., Zinner, T., Goleva, R., Timm-Giel, A., Tran-Gia, P. (eds.) MONAMI 2014. LNICSSITE, vol. 141, pp. 230–243. Springer, Heidelberg (2015). doi:10.1007/978-3-319-16292-8_17
Garnaev, A., Trappe, W.: One-time spectrum coexistence in dynamic spectrum access when the secondary user may be malicious. IEEE Trans. Inf. Forensics Secur. 10, 1064–1075 (2015)
Garnaev, A., Trappe, W.: A bandwidth monitoring strategy under uncertainty of the adversary’s activity. IEEE Trans. Inf. Forensics Secur. 11, 837–849 (2016)
Garnaev, A., Trappe, W., Kung, C.-T.: Optimizing scanning strategies: selecting scanning bandwidth in adversarial RF environments. In: 8th International Conference on Cognitive Radio Oriented Wireless Networks (CROWNCOM), pp. 148–153 (2013)
Gopala, P.K., Lai, L., El Gamal, H.: On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory 54, 4687–4698 (2008)
Ho, Z., Jorswieck, E., Engelmann, S.: Information leakage neutralization for the multi-antenna non-regenerative relay-assisted multi-carrier interference channel. IEEE J. Sel. Areas Commun. 31, 1672–1686 (2013)
Kalai, E., Smorodinsky, M.: Other solutions to Nash’s bargaining problem. Econometrica 43, 513–518 (1975)
Kim, M., Hwang, E., Kim, J.: Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas. J. Wirel. Netw. (2015). doi:10.1007/s11276-015-1160-4
Koyluoglu, O.O., El Gamal, H., Lai, L., Poor, H.V.: Interference alignment for secrecy. IEEE Trans. Inf. Theory 57, 3323–3332 (2011)
Li, Z., Yates, R., Trappe, W.: Secure communication with a fading eavesdropper channel. In: IEEE International Symposium on Information Theory (ISIT), pp. 1296–1300 (2007)
Liang, Y., Poor, H.V., Shamai, S.: Information theoretic security. Found. Trends Commun. Inf. Theory 5(4–5), 355–580 (2009)
Liang, Y., Poor, H.V., Shamai, S.: Secure communications over fading channels. IEEE Trans. Inf. Theory 54, 2470–2492 (2008)
Lin, M., Ge, J., Yang, Y.: An effective secure transmission scheme for AF relay networks with two-hop information leakage. IEEE Commun. Lett. 17, 1676–1679 (2013)
Mukherjee, A., Fakoorian, S.A.A., Huang, J., Swindlehurst, A.L.: Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tutor. 16, 1550–1573 (2014)
Negi, R., Goel, S.: Secret communication using artificial noise. In: 62nd IEEE Vehicular Technology Conference (VTC), pp. 1906–1910 (2005)
Owen, G.: Game Theory. Academic Press, New York (1982)
Wu, Y., Liu, K.J.R.: An information secrecy game in cognitive radio networks. IEEE Trans. Inf. Forensics Secur. 6, 831–842 (2011)
Xiong, Q., Liang, Y.-C., Li, K.H., Gong, Y.: An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems. IEEE Trans. Inf. Forensics Secur. 10, 932–940 (2015)
Yang, C., Li, J., Anpalagan, A.: Strategic bargaining in wireless networks: basics, opportunities and challenges. IET Commun. 8, 3435–3450 (2014)
Yang, D., Zhang, J., Fang, X., Richa, A., Xue, G.: Optimal transmission power control in the presence of a smart jammer. In: IEEE Global Communications Conference (GLOBECOM), pp. 5506–5511 (2012)
Zhu, Q., Saad, W., Han, Z., Poor, H.V., Basar, T.: Eavesdropping and jamming in next-generation wireless networks: a game-theoretic approach. In: IEEE Military Communications Conference (MILCOM), pp. 119–124 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Garnaev, A., Trappe, W. (2016). A Secrecy and Security Dilemma in OFDM Communications. In: Madsen, T., Nielsen, J., Pratas, N. (eds) Multiple Access Communications. MACOM 2016. Lecture Notes in Computer Science(), vol 10121. Springer, Cham. https://doi.org/10.1007/978-3-319-51376-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-51376-8_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51375-1
Online ISBN: 978-3-319-51376-8
eBook Packages: Computer ScienceComputer Science (R0)