Network formation games for wireless multi-hop networks in the presence of eavesdroppers

Walid Saad, Are Hjørungnes, Zhu Han, Tamer Başar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Physical layer security has recently attracted an increasing attention in wireless networks. While existing work on physical layer security focuses on the information theoretic aspects, this paper studies the impact of the presence of eavesdroppers on the topology and dynamics of wireless multi-hop networks. In this context, we investigate the problem of the distributed formation of a hierarchical tree topology among a number of nodes that seek to send data in the uplink to a central base station through multi-hop in the presence of multiple eavesdroppers. We model the problem as a network formation game where the nodes engage in pairwise negotiations to form the path that connects them to the central base station, while maximizing their utility in terms of the minimum secrecy capacity achieved. For forming the topology, we propose a myopic best response algorithm that enables the wireless nodes to self-organize into a Nash tree structure. Simulation results show that the proposed algorithm presents significant gains in terms of average achieved expected utility per node compared to a best-neighbor algorithm.

Original languageEnglish
Title of host publicationCAMSAP 2009 - 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing
Pages1-4
Number of pages4
DOIs
StatePublished - Dec 1 2009
Event2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing, CAMSAP 2009 - Aruba, Netherlands
Duration: Dec 13 2009Dec 16 2009

Other

Other2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing, CAMSAP 2009
CountryNetherlands
CityAruba
Period12/13/0912/16/09

Fingerprint

Topology
Base stations
Wireless networks

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Software

Cite this

Saad, W., Hjørungnes, A., Han, Z., & Başar, T. (2009). Network formation games for wireless multi-hop networks in the presence of eavesdroppers. In CAMSAP 2009 - 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (pp. 1-4). [5413303] https://doi.org/10.1109/CAMSAP.2009.5413303

Network formation games for wireless multi-hop networks in the presence of eavesdroppers. / Saad, Walid; Hjørungnes, Are; Han, Zhu; Başar, Tamer.

CAMSAP 2009 - 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing. 2009. p. 1-4 5413303.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Saad, W, Hjørungnes, A, Han, Z & Başar, T 2009, Network formation games for wireless multi-hop networks in the presence of eavesdroppers. in CAMSAP 2009 - 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing., 5413303, pp. 1-4, 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing, CAMSAP 2009, Aruba, Netherlands, 12/13/09. https://doi.org/10.1109/CAMSAP.2009.5413303
Saad W, Hjørungnes A, Han Z, Başar T. Network formation games for wireless multi-hop networks in the presence of eavesdroppers. In CAMSAP 2009 - 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing. 2009. p. 1-4. 5413303 https://doi.org/10.1109/CAMSAP.2009.5413303
Saad, Walid ; Hjørungnes, Are ; Han, Zhu ; Başar, Tamer. / Network formation games for wireless multi-hop networks in the presence of eavesdroppers. CAMSAP 2009 - 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing. 2009. pp. 1-4
@inproceedings{53679e7f58b24c22be0736b649bad688,
title = "Network formation games for wireless multi-hop networks in the presence of eavesdroppers",
abstract = "Physical layer security has recently attracted an increasing attention in wireless networks. While existing work on physical layer security focuses on the information theoretic aspects, this paper studies the impact of the presence of eavesdroppers on the topology and dynamics of wireless multi-hop networks. In this context, we investigate the problem of the distributed formation of a hierarchical tree topology among a number of nodes that seek to send data in the uplink to a central base station through multi-hop in the presence of multiple eavesdroppers. We model the problem as a network formation game where the nodes engage in pairwise negotiations to form the path that connects them to the central base station, while maximizing their utility in terms of the minimum secrecy capacity achieved. For forming the topology, we propose a myopic best response algorithm that enables the wireless nodes to self-organize into a Nash tree structure. Simulation results show that the proposed algorithm presents significant gains in terms of average achieved expected utility per node compared to a best-neighbor algorithm.",
author = "Walid Saad and Are Hj{\o}rungnes and Zhu Han and Tamer Başar",
year = "2009",
month = "12",
day = "1",
doi = "10.1109/CAMSAP.2009.5413303",
language = "English",
isbn = "9781424451807",
pages = "1--4",
booktitle = "CAMSAP 2009 - 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing",

}

TY - GEN

T1 - Network formation games for wireless multi-hop networks in the presence of eavesdroppers

AU - Saad, Walid

AU - Hjørungnes, Are

AU - Han, Zhu

AU - Başar, Tamer

PY - 2009/12/1

Y1 - 2009/12/1

N2 - Physical layer security has recently attracted an increasing attention in wireless networks. While existing work on physical layer security focuses on the information theoretic aspects, this paper studies the impact of the presence of eavesdroppers on the topology and dynamics of wireless multi-hop networks. In this context, we investigate the problem of the distributed formation of a hierarchical tree topology among a number of nodes that seek to send data in the uplink to a central base station through multi-hop in the presence of multiple eavesdroppers. We model the problem as a network formation game where the nodes engage in pairwise negotiations to form the path that connects them to the central base station, while maximizing their utility in terms of the minimum secrecy capacity achieved. For forming the topology, we propose a myopic best response algorithm that enables the wireless nodes to self-organize into a Nash tree structure. Simulation results show that the proposed algorithm presents significant gains in terms of average achieved expected utility per node compared to a best-neighbor algorithm.

AB - Physical layer security has recently attracted an increasing attention in wireless networks. While existing work on physical layer security focuses on the information theoretic aspects, this paper studies the impact of the presence of eavesdroppers on the topology and dynamics of wireless multi-hop networks. In this context, we investigate the problem of the distributed formation of a hierarchical tree topology among a number of nodes that seek to send data in the uplink to a central base station through multi-hop in the presence of multiple eavesdroppers. We model the problem as a network formation game where the nodes engage in pairwise negotiations to form the path that connects them to the central base station, while maximizing their utility in terms of the minimum secrecy capacity achieved. For forming the topology, we propose a myopic best response algorithm that enables the wireless nodes to self-organize into a Nash tree structure. Simulation results show that the proposed algorithm presents significant gains in terms of average achieved expected utility per node compared to a best-neighbor algorithm.

UR - http://www.scopus.com/inward/record.url?scp=77951123138&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77951123138&partnerID=8YFLogxK

U2 - 10.1109/CAMSAP.2009.5413303

DO - 10.1109/CAMSAP.2009.5413303

M3 - Conference contribution

SN - 9781424451807

SP - 1

EP - 4

BT - CAMSAP 2009 - 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing

ER -