Power Control and Security Games for Wireless Communication Networks

نویسندگان

  • Bo Liang
  • Mustafa Cenk Gursoy
چکیده

In this thesis, game theoretic analysis of wireless communication networks has been performed. Game theory provides valuable tools can be used to solve problem of conflict and cooperation in wireless communication networks. Game theoretic tools can be applied to multiple layers of wireless networks. First, we consider power control issues at the physical layer of wireless networks. A game theoretic analysis for resource allocation policies in fading interference channels in the presence of quality of service (QoS) constraints is performed. We model a two player non-cooperative power control game and assume that both transmitters and receivers know the channel side information. The transmitters in this game are selfish and rational with QoS limitations and average power constraints. We prove that there is a unique admissible Nash equilibrium of this non-cooperative power control game. Secondly, a pseudonym change game which is used to protect location information in mobile networks has been proposed. In mobile networks, in order to track the location of mobile nodes, an adversary will monitor the pseudonym of each node. Therefore, mobile nodes are encouraged to change their pseudonyms in mix zones to increase their location security level and get rid of the tracker. However, pseudonyms are costly so some mobile nodes may not cooperate and change their pseudonyms when they already have high location security level. In order to achieve an optimal security level, game theoretical models have been used. The goal of each mobile user in this game is to maximize its location security level with a minimum pseudonym change cost. We consider non-cooperative incomplete information game, where mobile nodes do not know their opponents' payoff function and types. We numerically demonstrate that a mobile user becomes selfish when the pseudonym change cost is small. Oppositely, if the cost is high, mobile nodes cooperate more. A game-theory-based anti-tracking protocol is also proposed at the end. iv COPYRIGHT c 2011, Bo Liang v ACKNOWLEDGMENTS I would like to thank my advisor, Professor Mustafa Cenk Gursoy for his guidance throughout my graduate program. I thank him for helping me at some critic time. I also appreciate the research environment he provided, which I believe is very helpful for our creative work. I also want to thank Professors Senem Velipasalar and Wenbo He for serving on my Master thesis committee and providing many valuable suggestions which brought insightful perspectives into my research. Throughout my graduate program, I have been …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

Simulate Congestion Prediction in a Wireless Network Using the LSTM Deep Learning Model

Achieved wireless networks since its beginning the prevalent wide due to the increasing wireless devices represented by smart phones and laptop, and the proliferation of networks coincides with the high speed and ease of use of the Internet and enjoy the delivery of various data such as video clips and games. Here's the show the congestion problem arises and represent   aim of the research is t...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Quasi Random Deployment Strategy for Reliable Communication Backbones in Wireless Sensor Networks

Topology construction and topology maintenance are significant sub-problems of topology control. Spanning tree based algorithms for topology control are basically transmission range based type construction algorithms. The construction of an effective backbone, however, is indirectly related to the placement of nodes. Also, the dependence of network reliability on the communication path undertak...

متن کامل

HYREP: A Hybrid Low-Power Protocol for Wireless Sensor Networks

In this paper, a new hybrid routing protocol is presented for low power Wireless Sensor Networks (WSNs). The new system uses an integrated piezoelectric energy harvester to increase the network lifetime. Power dissipation is one of the most important factors affecting lifetime of a WSN. An innovative cluster head selection technique using Cuckoo optimization algorithm has been used in the desig...

متن کامل

Improving Bandwidth-power Efficiency of Homogeneous Wireless Networks Using On-meet Threshold Strategy (RESEARCH NOTE)

Over two decades, a problem of location dependent has been focused for improving the communication Bandwidth-Power Efficiency of homogeneous networks. The efficiencies of communication links are weakened by the Hidden Terminal Problem.  Thus we propose a Fine – Tune Strategy for analyzing the On-Off communication region. We were observed that the proposed technique had been able to track and mo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016