Skip to main content

An Eavesdropping Game with SINR as an Objective Function

  • Conference paper
Security and Privacy in Communication Networks (SecureComm 2009)

Abstract

We examine eavesdropping over wireless channels, where secret communication in the presence of an eavesdropper is formulated as a zero-sum game. In our problem, the legitimate receiver does not have complete knowledge about the environment, i.e. does not know the exact values of the channels gains, but instead knows just their distribution. To communicate secretly, the user must decide how to transmit its information across subchannels under a worst-case condition and thus, the legal user faces a max-min optimization problem. To formulate the optimization problem, we pose the environment as a secondary player in a zero-sum game whose objective is to hamper communication by the user. Thus, nature faces a min-max optimization problem. In our formulation, we consider signal-to-interference ratio (SINR) as a payoff function. We then study two specific scenarios: (i) the user does not know the channels gains; and (ii) the user does not know how the noise is distributed among the main channels. We show that in model (i) in his optimal behavior the user transmits signal energy uniformly across a subset of selected channels. In model (ii), if the user does not know the eavesdropper’s channel gains he/she also employs a strategy involving uniformly distributing energy across a subset of channels. However, if the user acquires extra knowledge about environment, e.g. the eavesdropper’s channel gains, the user may better tune his/her power allocation among the channels. We provide criteria for selecting which channels the user should transmit on by deriving closed-form expressions for optimal strategies for both players.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, X., Chen, M., Ratazzi, E.P.: Space-time transmissions for wireless secret-key agreement with information-theoretic secrecy. In: Proc. IEEE SPAWC 2005, June 2005, pp. 811–815 (2005)

    Google Scholar 

  2. Koorapaty, H., Hassan, A.A., Chennakeshu, S.: Secure Information Transmission for Mobile Radio. IEEE Trans. Wireless Commun., 52–55 (July 2003)

    Google Scholar 

  3. Hero, A.E.: Secure Space-Time Communication. IEEE Trans. Info. Theory, 3235–3249 (December 2003)

    Google Scholar 

  4. Li, Z., Yates, R., Trappe, W.: Secrecy Capacity of Independent Parallel Channels. In: Allerton Conference on Communication, Control, and Computing (2006)

    Google Scholar 

  5. Li, Z., Xu, W., Miller, R., Trappe, W.: Securing wireless systems via lower layer enforcements. In: WiSe 2006: Proceedings of the 5th ACM workshop on Wireless security, pp. 33–42 (2006)

    Google Scholar 

  6. Liang, Y., Poor, H.V., Shamai, S.: Secure Communication over Fading Channels. IEEE Transactions on Information Theory, Special issue on Information Theoretic Security 54(6), 2470–2492 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  7. Gopala, P., Lai, L., El Gamal, H.: On the secrecy capacity of fading channels. IEEE Trans. Inform. Theory (accepted for publication)

    Google Scholar 

  8. Wyner, A.: The wire-tap channel. Bell. Syst. Tech. J. 54(8), 1355–1387 (1975)

    Article  MathSciNet  MATH  Google Scholar 

  9. Csiszár, I., Körner, J.: Broadcast channels with confidental messages. IEEE Trans. on Inf. Theory 24(3), 339–348 (1978)

    Article  MATH  Google Scholar 

  10. Maurer, U.M., Wolf, S.: Information-theoretic key agreement: From weak to strong secrecy for free. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 351–368. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  11. Bennett, C., Brassard, G., Crepeau, C., Maurer, U.M.: Generalized privacy amplification. IEEE Trans. on Information Theory 41, 1915–1923 (1995)

    Article  MathSciNet  MATH  Google Scholar 

  12. Van Dijk, M.: On a special class of broadcast channels with confidential messages. IEEE Trans. on Information Theory 43(2), 712–714 (1997)

    Article  MATH  Google Scholar 

  13. Leung-Yan-Cheong, S.K., Hellman, M.: The gaussian wire-tap channel. IEEE Transactions on Information Theory 24(4), 451–456 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  14. Altman, E., Avrachenkov, K., Garnaev, A.: A jamming game in wireless networks with transmission cost. In: Chahed, T., Tuffin, B. (eds.) NET-COOP 2007. LNCS, vol. 4465, pp. 1–12. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  15. Altman, E., Avrachenkov, K., Garnaev, A.: Transmission power control game with SINR as objective function. In: Altman, E., Chaintreau, A. (eds.) NET-COOP 2008. LNCS, vol. 5425, pp. 112–120. Springer, Heidelberg (2009)

    Google Scholar 

  16. Altman, E., Kamble, V., Kameda, H.: A Braess Type Paradox in Power Control over Interference Channels. In: Physicomnet workshop, Berlin, April 4 (2008)

    Google Scholar 

  17. Ji, H., Huang, C.-Y.: Non-cooperative uplink power control in cellular radio systems. Wireless Networks 4, 233–240 (1998)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Garnaev, A., Trappe, W. (2009). An Eavesdropping Game with SINR as an Objective Function. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds) Security and Privacy in Communication Networks. SecureComm 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 19. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05284-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-05284-2_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-05283-5

  • Online ISBN: 978-3-642-05284-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics