Please wait a minute...
Chin. Phys. B, 2015, Vol. 24(9): 090209    DOI: 10.1088/1674-1056/24/9/090209
GENERAL Prev   Next  

Improving the secrecy rate by turning foes to allies: An auction scheme

Ma Ya-Yan (马亚燕), Wang Bao-Yun (王保云)
College of Communication and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
Abstract  Security against eavesdroppers is a critical issue in cognitive radio networks (CRNs). In this paper, a scenario consisting of one primary pair and multiple secondary pairs is considered. The secondary transmitters (STs) work in half-duplex mode and they are potential eavesdroppers on the primary transmission unless they are allowed to simultaneously transmit with the primary transmitter (PT). A modified second-price sealed-bid auction scheme is employed to model the interaction between the PT and STs. With the proposed auction scheme, the hostile relationship between the PT and STs is transformed into a cooperative relationship. An iterative algorithm based on the max-min criteria is proposed to find the optimal bidding power of the STs for an access chance in the presence of multiple eavesdroppers. Numerical results show that the proposed auction scheme not only improves the PT's security but also increases the access opportunities of the STs.
Keywords:  security      auction      cooperation      cognitive radio networks  
Received:  13 February 2015      Revised:  22 April 2015      Accepted manuscript online: 
PACS:  02.50.Le (Decision theory and game theory)  
  03.67.Dd (Quantum cryptography and communication security)  
Fund: Project supported by the National Natural Science Foundation of China (Grant Nos. 61271232 and 61372126) and the University Postgraduate Research and Innovation Project in Jiangsu Province, China (Grant No. CXZZ12-0472).
Corresponding Authors:  Wang Bao-Yun     E-mail:  bywang@njupt.edu.cn

Cite this article: 

Ma Ya-Yan (马亚燕), Wang Bao-Yun (王保云) Improving the secrecy rate by turning foes to allies: An auction scheme 2015 Chin. Phys. B 24 090209

[1] Goldsmith A, Jafar S A, Maric I and Srinivasa S 2009 IEEE Proceedings 97 894
[2] Qi P H, Li Z, Si J B and Gao R 2014 Chin. Phys. B 23 128401
[3] Yang J, Yang D, Huang B, et al. 2014 Acta Phys. Sin. 63 020501 (in Chinese)
[4] Wu C, Jiang H and You X J 2014 Acta Phys. Sin. 63 088801 (in Chinese)
[5] Stanojev I and Aylin Y 2013 IEEE Trans. Wireless Communications 12 134
[6] Zhang N, Lu N, Cheng N, Mark J W and Shen X S 2013 IEEE Trans. Selected Areas in Communications 31 2453
[7] He X and Yener A 2010 IEEE Trans. Inf. Theory 56 3807
[8] Yuksel M, Liu X and Erkip E 2011 IEEE Trans. Inf. Forens. Security 6 818
[9] Hyoungsuk J, Steven W M, Il-Min K and Jeongseok H 2014 IEEE Trans. Wireless Communications 13 1970
[10] Frédéric G, Li N, Nicolas S, Maksym G, Lars K R and Mikael S 2014 IEEE Trans. Selected Areas in Communications 32 451
[11] Karim K and Eylem E 2013 in Proc. Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), Tsukuba Science City, May 13-17, 2013, p. 194
[12] Klemperer P 1999 J. Economics Surveys 13 227
[13] Wang T, Song L, Han Z, Cheng X and Jiao B 2012 in Proc. International Conference on Communications, Ottawa, Canada, June 10-15, 2012, p. 1683
[14] Osborne M J and Rubenstein A 1994 A Course in Game Theory (Cambridge: MIT Press) pp. 18-30
[15] Stephen B and Lieven V 2004 Convex Optimization (Cambridge: Cambridge University Press) pp. 95-103
[1] Experimental study on age and gender differences in microscopic movement characteristics of students
Jiayue Wang(王嘉悦), Maik Boltes, Armin Seyfried, Antoine Tordeux, Jun Zhang(张俊), and Wenguo Weng(翁文国). Chin. Phys. B, 2021, 30(9): 098902.
[2] Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme
Jing-Wen Zhang(张静文), Xiu-Bo Chen(陈秀波), Gang Xu(徐刚), and Yi-Xian Yang(杨义先). Chin. Phys. B, 2021, 30(7): 070309.
[3] Reputational preference and other-regarding preference based rewarding mechanism promotes cooperation in spatial social dilemmas
Huayan Pei(裴华艳), Guanghui Yan(闫光辉), and Huanmin Wang(王焕民). Chin. Phys. B, 2021, 30(5): 050203.
[4] Three-party reference frame independent quantum key distribution protocol
Comfort Sekga and Mhlambululi Mafu. Chin. Phys. B, 2021, 30(12): 120301.
[5] Simulation study on cooperation behaviors and crowd dynamics in pedestrian evacuation
Ya-Ping Ma(马亚萍), Hui Zhang(张辉). Chin. Phys. B, 2020, 29(3): 038901.
[6] The evolution of cooperation in public good game with deposit
Xian-Jia Wang(王先甲), Wen-Man Chen(陈文嫚). Chin. Phys. B, 2019, 28(8): 080201.
[7] Methodical review of the literature referred to the dye-sensitized solar cells: Bibliometrics analysis and road mapping
Karwan Wasman Qadir, Qayyum Zafar, Nader Ale Ebrahim, Zubair Ahmad, Khaulah Sulaiman, Rizwan Akram, Mohammad Khaja Nazeeruddin. Chin. Phys. B, 2019, 28(11): 118401.
[8] Benefit community promotes evolution of cooperation in prisoners' dilemma game
Jianwei Wang(王建伟), Jialu He(何佳陆), Fengyuan Yu(于逢源), Wei Chen(陈伟), Rong Wang(王蓉), Ke Yu(于可). Chin. Phys. B, 2019, 28(10): 108703.
[9] Controlling a sine wave gating single-photon detector by exploiting its filtering loophole
Lin-Xi Feng(冯林溪), Mu-Sheng Jiang(江木生), Wan-Su Bao(鲍皖苏), Hong-Wei Li(李宏伟), Chun Zhou(周淳), Yang Wang(汪洋). Chin. Phys. B, 2018, 27(8): 080305.
[10] Evacuation flow of pedestrians considering compassion effect
Yu-Zhang Chen(陈煜章), Ming Li(李明), Rui Jiang(姜锐), Mao-Bin Hu(胡茂彬). Chin. Phys. B, 2018, 27(8): 088901.
[11] On fairness, full cooperation, and quantum game with incomplete information
Zhen-Zhou Lei(雷振州), Bo-Yang Liu(刘博阳), Ying Yi(易英), Hong-Yi Dai(戴宏毅), Ming Zhang(张明). Chin. Phys. B, 2018, 27(3): 030202.
[12] A novel image encryption scheme based on Kepler's third law and random Hadamard transform
Yu-Ling Luo(罗玉玲), Rong-Long Zhou(周戎龙), Jun-Xiu Liu(刘俊秀), Sen-Hui Qiu(丘森辉), Yi Cao(曹弋). Chin. Phys. B, 2017, 26(12): 120504.
[13] Relating Maxwell's demon and quantitative analysis of information leakage for practical imperative programs
Kushal Anjaria, Arun Mishra. Chin. Phys. B, 2017, 26(10): 100507.
[14] A self-cited pixel summation based image encryption algorithm
Guo-Dong Ye(叶国栋), Xiao-Ling Huang(黄小玲), Leo Yu Zhang(张愉), Zheng-Xia Wang(王政霞). Chin. Phys. B, 2017, 26(1): 010501.
[15] Intercept-resend attack on six-state quantum key distribution over collective-rotation noise channels
Kevin Garapo, Mhlambululi Mafu, Francesco Petruccione. Chin. Phys. B, 2016, 25(7): 070303.
No Suggested Reading articles found!