Secure Degrees of Freedom in Networks with User Misbehavior

We investigate the secure degrees of freedom (s.d.o.f.) of three new channel models: broadcast channel with combating helpers, interference channel with selfish users, and multiple access wiretap channel with deviating users. The goal of introducing these channel models is to investigate various mal...

Full description

Bibliographic Details
Main Authors: Karim Banawan, Sennur Ulukus
Format: Article
Language:English
Published: MDPI AG 2019-09-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/21/10/945
_version_ 1811185007849373696
author Karim Banawan
Sennur Ulukus
author_facet Karim Banawan
Sennur Ulukus
author_sort Karim Banawan
collection DOAJ
description We investigate the secure degrees of freedom (s.d.o.f.) of three new channel models: broadcast channel with combating helpers, interference channel with selfish users, and multiple access wiretap channel with deviating users. The goal of introducing these channel models is to investigate various malicious interactions that arise in networks, including active adversaries. That is in contrast with the common assumption in the literature that the users follow a certain protocol altruistically and transmit both message-carrying and cooperative jamming signals in an optimum manner. In the first model, over a classical broadcast channel with confidential messages (BCCM), there are two helpers, each associated with one of the receivers. In the second model, over a classical interference channel with confidential messages (ICCM), there is a helper and users are selfish. By casting each problem as an extensive-form game and applying recursive real interference alignment, we show that, for the first model, the combating intentions of the helpers are neutralized and the full s.d.o.f. is retained; for the second model, selfishness precludes secure communication and no s.d.o.f. is achieved. In the third model, we consider the multiple access wiretap channel (MAC-WTC), where multiple legitimate users wish to have secure communication with a legitimate receiver in the presence of an eavesdropper. We consider the case when a subset of users deviate from the optimum protocol that attains the exact s.d.o.f. of this channel. We consider two kinds of deviation: when some of the users stop transmitting cooperative jamming signals, and when a user starts sending intentional jamming signals. For the first scenario, we investigate possible responses of the remaining users to counteract such deviation. For the second scenario, we use an extensive-form game formulation for the interactions of the deviating and well-behaving users. We prove that a deviating user can drive the s.d.o.f. to zero; however, the remaining users can exploit its intentional jamming signals as cooperative jamming signals against the eavesdropper and achieve an optimum s.d.o.f.
first_indexed 2024-04-11T13:22:06Z
format Article
id doaj.art-1a3296020041406c84c3a973ca3fb041
institution Directory Open Access Journal
issn 1099-4300
language English
last_indexed 2024-04-11T13:22:06Z
publishDate 2019-09-01
publisher MDPI AG
record_format Article
series Entropy
spelling doaj.art-1a3296020041406c84c3a973ca3fb0412022-12-22T04:22:10ZengMDPI AGEntropy1099-43002019-09-01211094510.3390/e21100945e21100945Secure Degrees of Freedom in Networks with User MisbehaviorKarim Banawan0Sennur Ulukus1Faculty of Engineering, Alexandria University, Alexandria 21544, EgyptDepartment of ECE, University of Maryland, College Park, MD 20742, USAWe investigate the secure degrees of freedom (s.d.o.f.) of three new channel models: broadcast channel with combating helpers, interference channel with selfish users, and multiple access wiretap channel with deviating users. The goal of introducing these channel models is to investigate various malicious interactions that arise in networks, including active adversaries. That is in contrast with the common assumption in the literature that the users follow a certain protocol altruistically and transmit both message-carrying and cooperative jamming signals in an optimum manner. In the first model, over a classical broadcast channel with confidential messages (BCCM), there are two helpers, each associated with one of the receivers. In the second model, over a classical interference channel with confidential messages (ICCM), there is a helper and users are selfish. By casting each problem as an extensive-form game and applying recursive real interference alignment, we show that, for the first model, the combating intentions of the helpers are neutralized and the full s.d.o.f. is retained; for the second model, selfishness precludes secure communication and no s.d.o.f. is achieved. In the third model, we consider the multiple access wiretap channel (MAC-WTC), where multiple legitimate users wish to have secure communication with a legitimate receiver in the presence of an eavesdropper. We consider the case when a subset of users deviate from the optimum protocol that attains the exact s.d.o.f. of this channel. We consider two kinds of deviation: when some of the users stop transmitting cooperative jamming signals, and when a user starts sending intentional jamming signals. For the first scenario, we investigate possible responses of the remaining users to counteract such deviation. For the second scenario, we use an extensive-form game formulation for the interactions of the deviating and well-behaving users. We prove that a deviating user can drive the s.d.o.f. to zero; however, the remaining users can exploit its intentional jamming signals as cooperative jamming signals against the eavesdropper and achieve an optimum s.d.o.f.https://www.mdpi.com/1099-4300/21/10/945secure degrees of freedominterference alignmentextensive-form games
spellingShingle Karim Banawan
Sennur Ulukus
Secure Degrees of Freedom in Networks with User Misbehavior
Entropy
secure degrees of freedom
interference alignment
extensive-form games
title Secure Degrees of Freedom in Networks with User Misbehavior
title_full Secure Degrees of Freedom in Networks with User Misbehavior
title_fullStr Secure Degrees of Freedom in Networks with User Misbehavior
title_full_unstemmed Secure Degrees of Freedom in Networks with User Misbehavior
title_short Secure Degrees of Freedom in Networks with User Misbehavior
title_sort secure degrees of freedom in networks with user misbehavior
topic secure degrees of freedom
interference alignment
extensive-form games
url https://www.mdpi.com/1099-4300/21/10/945
work_keys_str_mv AT karimbanawan securedegreesoffreedominnetworkswithusermisbehavior
AT sennurulukus securedegreesoffreedominnetworkswithusermisbehavior