On Cooperative and Malicious Behaviors in Multirelay Fading Channels

Multirelay networks exploit spatial diversity by transmitting user's messages through multiple relay paths. Most works in the literature on cooperative or relay networks assume that all terminals are fully cooperative and neglect the effect of possibly existing malicious relay behaviors. In thi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2013-07, Vol.8 (7), p.1126-1139
Hauptverfasser: Meng-Hsi Chen, Shih-Chun Lin, Hong, Y.-W P., Xiangyun Zhou
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1139
container_issue 7
container_start_page 1126
container_title IEEE transactions on information forensics and security
container_volume 8
creator Meng-Hsi Chen
Shih-Chun Lin
Hong, Y.-W P.
Xiangyun Zhou
description Multirelay networks exploit spatial diversity by transmitting user's messages through multiple relay paths. Most works in the literature on cooperative or relay networks assume that all terminals are fully cooperative and neglect the effect of possibly existing malicious relay behaviors. In this work, we consider a multirelay network that consists of both cooperative and malicious relays, and aims to obtain an improved understanding on the optimal behaviors of these two groups of relays via information-theoretic mutual information games. By modeling the set of cooperative relays and the set of malicious relays as two players in a zero-sum game with the maximum achievable rate as the utility, the optimal transmission strategies of both types of relays are derived by identifying the Nash equilibrium of the proposed game. Our main contributions are twofold. First, a generalization to previous works is obtained by allowing malicious relays to either listen or attack in Phase 1 (source-relay transmission phase). This is in contrast to previous works that only allow the malicious relays to listen in Phase 1 and to attack in Phase 2 (relay-destination transmission phase). The latter is shown to be suboptimal in our problem. Second, the impact of CSI knowledge at the destination on the optimal attack strategy that can be adopted by the malicious relays is identified. In particular, for the more practical scenario where the interrelay CSI is unknown at the destination, the constant attack is shown to be optimal as opposed to the commonly considered Gaussian attack.
doi_str_mv 10.1109/TIFS.2013.2262941
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_miscellaneous_1372658283</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6516062</ieee_id><sourcerecordid>1372658283</sourcerecordid><originalsourceid>FETCH-LOGICAL-c356t-e9b72cfd4acb630a82e642429011763d5a894e8a61c41fd6c487f4d4733930a93</originalsourceid><addsrcrecordid>eNpdkMFKAzEQhhdRsFYfQLwsiOBlaybJZpOjVquFlh6s52WazdqUNVuTbqFvb0pLD55mYL5_-PmS5BbIAICop_l49DmgBNiAUkEVh7OkB3kuMkEonJ92YJfJVQgrQjgHIXvJ68ylw7ZdG48buzUpuiqdYmO1bbuQvpglbm3rQ2pdOu2ajfWmwV06wsq673S4ROdME66TixqbYG6Os598jd7mw49sMnsfD58nmWa52GRGLQqq64qjXghGUFIjOOVUEYBCsCpHqbiRKEBzqCuhuSxqXvGCMRVxxfrJ4-Hv2re_nQmb8scGbZoGnYl1S2AFFbmkkkX0_h-6ajvvYrtICa6UkkxGCg6U9m0I3tTl2tsf9LsSSLn3Wu69lnuv5dFrzDwcP2PQ2NQenbbhFKRFXvDYIXJ3B84aY05nkYMggrI_NqR-qw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1364999838</pqid></control><display><type>article</type><title>On Cooperative and Malicious Behaviors in Multirelay Fading Channels</title><source>IEEE Electronic Library (IEL)</source><creator>Meng-Hsi Chen ; Shih-Chun Lin ; Hong, Y.-W P. ; Xiangyun Zhou</creator><creatorcontrib>Meng-Hsi Chen ; Shih-Chun Lin ; Hong, Y.-W P. ; Xiangyun Zhou</creatorcontrib><description>Multirelay networks exploit spatial diversity by transmitting user's messages through multiple relay paths. Most works in the literature on cooperative or relay networks assume that all terminals are fully cooperative and neglect the effect of possibly existing malicious relay behaviors. In this work, we consider a multirelay network that consists of both cooperative and malicious relays, and aims to obtain an improved understanding on the optimal behaviors of these two groups of relays via information-theoretic mutual information games. By modeling the set of cooperative relays and the set of malicious relays as two players in a zero-sum game with the maximum achievable rate as the utility, the optimal transmission strategies of both types of relays are derived by identifying the Nash equilibrium of the proposed game. Our main contributions are twofold. First, a generalization to previous works is obtained by allowing malicious relays to either listen or attack in Phase 1 (source-relay transmission phase). This is in contrast to previous works that only allow the malicious relays to listen in Phase 1 and to attack in Phase 2 (relay-destination transmission phase). The latter is shown to be suboptimal in our problem. Second, the impact of CSI knowledge at the destination on the optimal attack strategy that can be adopted by the malicious relays is identified. In particular, for the more practical scenario where the interrelay CSI is unknown at the destination, the constant attack is shown to be optimal as opposed to the commonly considered Gaussian attack.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2013.2262941</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Cooperative communications ; CSI ; Exact sciences and technology ; Fading ; Game theory ; Games ; Gaussian ; Jamming ; malicious relay ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Messages ; mutual information ; Networks ; Operational research and scientific management ; Operational research. Management science ; Optimization ; Radiocommunications ; Random variables ; Relay ; Relays ; Software ; Strategy ; Studies ; Systems, networks and services of telecommunications ; Telecommunications ; Telecommunications and information theory ; Terminals ; Transmission and modulation (techniques and equipments) ; Transmitters. Receivers ; Vectors</subject><ispartof>IEEE transactions on information forensics and security, 2013-07, Vol.8 (7), p.1126-1139</ispartof><rights>2014 INIST-CNRS</rights><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jul 2013</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c356t-e9b72cfd4acb630a82e642429011763d5a894e8a61c41fd6c487f4d4733930a93</citedby><cites>FETCH-LOGICAL-c356t-e9b72cfd4acb630a82e642429011763d5a894e8a61c41fd6c487f4d4733930a93</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6516062$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6516062$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=27574582$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Meng-Hsi Chen</creatorcontrib><creatorcontrib>Shih-Chun Lin</creatorcontrib><creatorcontrib>Hong, Y.-W P.</creatorcontrib><creatorcontrib>Xiangyun Zhou</creatorcontrib><title>On Cooperative and Malicious Behaviors in Multirelay Fading Channels</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>Multirelay networks exploit spatial diversity by transmitting user's messages through multiple relay paths. Most works in the literature on cooperative or relay networks assume that all terminals are fully cooperative and neglect the effect of possibly existing malicious relay behaviors. In this work, we consider a multirelay network that consists of both cooperative and malicious relays, and aims to obtain an improved understanding on the optimal behaviors of these two groups of relays via information-theoretic mutual information games. By modeling the set of cooperative relays and the set of malicious relays as two players in a zero-sum game with the maximum achievable rate as the utility, the optimal transmission strategies of both types of relays are derived by identifying the Nash equilibrium of the proposed game. Our main contributions are twofold. First, a generalization to previous works is obtained by allowing malicious relays to either listen or attack in Phase 1 (source-relay transmission phase). This is in contrast to previous works that only allow the malicious relays to listen in Phase 1 and to attack in Phase 2 (relay-destination transmission phase). The latter is shown to be suboptimal in our problem. Second, the impact of CSI knowledge at the destination on the optimal attack strategy that can be adopted by the malicious relays is identified. In particular, for the more practical scenario where the interrelay CSI is unknown at the destination, the constant attack is shown to be optimal as opposed to the commonly considered Gaussian attack.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Cooperative communications</subject><subject>CSI</subject><subject>Exact sciences and technology</subject><subject>Fading</subject><subject>Game theory</subject><subject>Games</subject><subject>Gaussian</subject><subject>Jamming</subject><subject>malicious relay</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Messages</subject><subject>mutual information</subject><subject>Networks</subject><subject>Operational research and scientific management</subject><subject>Operational research. Management science</subject><subject>Optimization</subject><subject>Radiocommunications</subject><subject>Random variables</subject><subject>Relay</subject><subject>Relays</subject><subject>Software</subject><subject>Strategy</subject><subject>Studies</subject><subject>Systems, networks and services of telecommunications</subject><subject>Telecommunications</subject><subject>Telecommunications and information theory</subject><subject>Terminals</subject><subject>Transmission and modulation (techniques and equipments)</subject><subject>Transmitters. Receivers</subject><subject>Vectors</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkMFKAzEQhhdRsFYfQLwsiOBlaybJZpOjVquFlh6s52WazdqUNVuTbqFvb0pLD55mYL5_-PmS5BbIAICop_l49DmgBNiAUkEVh7OkB3kuMkEonJ92YJfJVQgrQjgHIXvJ68ylw7ZdG48buzUpuiqdYmO1bbuQvpglbm3rQ2pdOu2ajfWmwV06wsq673S4ROdME66TixqbYG6Os598jd7mw49sMnsfD58nmWa52GRGLQqq64qjXghGUFIjOOVUEYBCsCpHqbiRKEBzqCuhuSxqXvGCMRVxxfrJ4-Hv2re_nQmb8scGbZoGnYl1S2AFFbmkkkX0_h-6ajvvYrtICa6UkkxGCg6U9m0I3tTl2tsf9LsSSLn3Wu69lnuv5dFrzDwcP2PQ2NQenbbhFKRFXvDYIXJ3B84aY05nkYMggrI_NqR-qw</recordid><startdate>20130701</startdate><enddate>20130701</enddate><creator>Meng-Hsi Chen</creator><creator>Shih-Chun Lin</creator><creator>Hong, Y.-W P.</creator><creator>Xiangyun Zhou</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope></search><sort><creationdate>20130701</creationdate><title>On Cooperative and Malicious Behaviors in Multirelay Fading Channels</title><author>Meng-Hsi Chen ; Shih-Chun Lin ; Hong, Y.-W P. ; Xiangyun Zhou</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c356t-e9b72cfd4acb630a82e642429011763d5a894e8a61c41fd6c487f4d4733930a93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Cooperative communications</topic><topic>CSI</topic><topic>Exact sciences and technology</topic><topic>Fading</topic><topic>Game theory</topic><topic>Games</topic><topic>Gaussian</topic><topic>Jamming</topic><topic>malicious relay</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Messages</topic><topic>mutual information</topic><topic>Networks</topic><topic>Operational research and scientific management</topic><topic>Operational research. Management science</topic><topic>Optimization</topic><topic>Radiocommunications</topic><topic>Random variables</topic><topic>Relay</topic><topic>Relays</topic><topic>Software</topic><topic>Strategy</topic><topic>Studies</topic><topic>Systems, networks and services of telecommunications</topic><topic>Telecommunications</topic><topic>Telecommunications and information theory</topic><topic>Terminals</topic><topic>Transmission and modulation (techniques and equipments)</topic><topic>Transmitters. Receivers</topic><topic>Vectors</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Meng-Hsi Chen</creatorcontrib><creatorcontrib>Shih-Chun Lin</creatorcontrib><creatorcontrib>Hong, Y.-W P.</creatorcontrib><creatorcontrib>Xiangyun Zhou</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Meng-Hsi Chen</au><au>Shih-Chun Lin</au><au>Hong, Y.-W P.</au><au>Xiangyun Zhou</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On Cooperative and Malicious Behaviors in Multirelay Fading Channels</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2013-07-01</date><risdate>2013</risdate><volume>8</volume><issue>7</issue><spage>1126</spage><epage>1139</epage><pages>1126-1139</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>Multirelay networks exploit spatial diversity by transmitting user's messages through multiple relay paths. Most works in the literature on cooperative or relay networks assume that all terminals are fully cooperative and neglect the effect of possibly existing malicious relay behaviors. In this work, we consider a multirelay network that consists of both cooperative and malicious relays, and aims to obtain an improved understanding on the optimal behaviors of these two groups of relays via information-theoretic mutual information games. By modeling the set of cooperative relays and the set of malicious relays as two players in a zero-sum game with the maximum achievable rate as the utility, the optimal transmission strategies of both types of relays are derived by identifying the Nash equilibrium of the proposed game. Our main contributions are twofold. First, a generalization to previous works is obtained by allowing malicious relays to either listen or attack in Phase 1 (source-relay transmission phase). This is in contrast to previous works that only allow the malicious relays to listen in Phase 1 and to attack in Phase 2 (relay-destination transmission phase). The latter is shown to be suboptimal in our problem. Second, the impact of CSI knowledge at the destination on the optimal attack strategy that can be adopted by the malicious relays is identified. In particular, for the more practical scenario where the interrelay CSI is unknown at the destination, the constant attack is shown to be optimal as opposed to the commonly considered Gaussian attack.</abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/TIFS.2013.2262941</doi><tpages>14</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2013-07, Vol.8 (7), p.1126-1139
issn 1556-6013
1556-6021
language eng
recordid cdi_proquest_miscellaneous_1372658283
source IEEE Electronic Library (IEL)
subjects Applied sciences
Computer science
control theory
systems
Cooperative communications
CSI
Exact sciences and technology
Fading
Game theory
Games
Gaussian
Jamming
malicious relay
Memory and file management (including protection and security)
Memory organisation. Data processing
Messages
mutual information
Networks
Operational research and scientific management
Operational research. Management science
Optimization
Radiocommunications
Random variables
Relay
Relays
Software
Strategy
Studies
Systems, networks and services of telecommunications
Telecommunications
Telecommunications and information theory
Terminals
Transmission and modulation (techniques and equipments)
Transmitters. Receivers
Vectors
title On Cooperative and Malicious Behaviors in Multirelay Fading Channels
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-30T18%3A07%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On%20Cooperative%20and%20Malicious%20Behaviors%20in%20Multirelay%20Fading%20Channels&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Meng-Hsi%20Chen&rft.date=2013-07-01&rft.volume=8&rft.issue=7&rft.spage=1126&rft.epage=1139&rft.pages=1126-1139&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2013.2262941&rft_dat=%3Cproquest_RIE%3E1372658283%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1364999838&rft_id=info:pmid/&rft_ieee_id=6516062&rfr_iscdi=true