Network formation games for wireless multi-hop networks in the presence of eavesdroppers

Walid Saad, Are Hjørungnes, Zhu Han, M Tamer Basar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Physical layer security has recently attracted an increasing attention in wireless networks. While existing work on physical layer security focuses on the information theoretic aspects, this paper studies the impact of the presence of eavesdroppers on the topology and dynamics of wireless multi-hop networks. In this context, we investigate the problem of the distributed formation of a hierarchical tree topology among a number of nodes that seek to send data in the uplink to a central base station through multi-hop in the presence of multiple eavesdroppers. We model the problem as a network formation game where the nodes engage in pairwise negotiations to form the path that connects them to the central base station, while maximizing their utility in terms of the minimum secrecy capacity achieved. For forming the topology, we propose a myopic best response algorithm that enables the wireless nodes to self-organize into a Nash tree structure. Simulation results show that the proposed algorithm presents significant gains in terms of average achieved expected utility per node compared to a best-neighbor algorithm.

Original languageEnglish (US)
Title of host publicationCAMSAP 2009 - 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing
Pages1-4
Number of pages4
DOIs
StatePublished - 2009
Event2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing, CAMSAP 2009 - Aruba, Netherlands
Duration: Dec 13 2009Dec 16 2009

Publication series

NameCAMSAP 2009 - 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing

Other

Other2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing, CAMSAP 2009
Country/TerritoryNetherlands
CityAruba
Period12/13/0912/16/09

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Software

Fingerprint

Dive into the research topics of 'Network formation games for wireless multi-hop networks in the presence of eavesdroppers'. Together they form a unique fingerprint.

Cite this