TY - GEN
T1 - Network formation games for wireless multi-hop networks in the presence of eavesdroppers
AU - Saad, Walid
AU - Hjørungnes, Are
AU - Han, Zhu
AU - Basar, M Tamer
PY - 2009
Y1 - 2009
N2 - Physical layer security has recently attracted an increasing attention in wireless networks. While existing work on physical layer security focuses on the information theoretic aspects, this paper studies the impact of the presence of eavesdroppers on the topology and dynamics of wireless multi-hop networks. In this context, we investigate the problem of the distributed formation of a hierarchical tree topology among a number of nodes that seek to send data in the uplink to a central base station through multi-hop in the presence of multiple eavesdroppers. We model the problem as a network formation game where the nodes engage in pairwise negotiations to form the path that connects them to the central base station, while maximizing their utility in terms of the minimum secrecy capacity achieved. For forming the topology, we propose a myopic best response algorithm that enables the wireless nodes to self-organize into a Nash tree structure. Simulation results show that the proposed algorithm presents significant gains in terms of average achieved expected utility per node compared to a best-neighbor algorithm.
AB - Physical layer security has recently attracted an increasing attention in wireless networks. While existing work on physical layer security focuses on the information theoretic aspects, this paper studies the impact of the presence of eavesdroppers on the topology and dynamics of wireless multi-hop networks. In this context, we investigate the problem of the distributed formation of a hierarchical tree topology among a number of nodes that seek to send data in the uplink to a central base station through multi-hop in the presence of multiple eavesdroppers. We model the problem as a network formation game where the nodes engage in pairwise negotiations to form the path that connects them to the central base station, while maximizing their utility in terms of the minimum secrecy capacity achieved. For forming the topology, we propose a myopic best response algorithm that enables the wireless nodes to self-organize into a Nash tree structure. Simulation results show that the proposed algorithm presents significant gains in terms of average achieved expected utility per node compared to a best-neighbor algorithm.
UR - http://www.scopus.com/inward/record.url?scp=77951123138&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77951123138&partnerID=8YFLogxK
U2 - 10.1109/CAMSAP.2009.5413303
DO - 10.1109/CAMSAP.2009.5413303
M3 - Conference contribution
AN - SCOPUS:77951123138
SN - 9781424451807
T3 - CAMSAP 2009 - 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing
SP - 1
EP - 4
BT - CAMSAP 2009 - 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing
T2 - 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing, CAMSAP 2009
Y2 - 13 December 2009 through 16 December 2009
ER -