Skip to main content

A Secrecy and Security Dilemma in OFDM Communications

  • Conference paper
  • First Online:
  • 503 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 10121))

Abstract

Emerging wireless systems will need to address multiple, conflicting objectives: ensuring the secrecy of the communication secrecy (i.e., maximizing the un-eavesdropped throughput at the receiver), and ensuring the “security” of the communication (i.e., minimizing damage that might arise because of the possibility that there is leakage in communication). This problem presents a dilemma for system engineers since the optimal solution for one of objective might be not optimal for the other. This dilemma calls for a need for designing a trade-off solution for these objectives. In this paper, we propose the use of a Kalai-Smorodinsky bargaining solution between secrecy and security for OFDM-style communications, which allows one to select the security level of communication. In particular, this solution allows one to maintain the ratios of maximal gains for cooperative fulfilment of both objectives.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Altman, E., Avrachenkov, K., Garnaev, A.: Transmission power control game with SINR as objective function. In: Altman, E., Chaintreau, A. (eds.) NET-COOP 2008. LNCS, vol. 5425, pp. 112–120. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00393-6_14

    Chapter  Google Scholar 

  2. Alvim, M.S., Chatzikokolakis, K., Palamidessi, C., Smith, G.: Measuring information leakage using generalized gain functions. In: 25th IEEE Computer Security Foundations Symposium, pp. 265–279 (2012)

    Google Scholar 

  3. Balmahoon, R., Cheng, L.: Information leakage of heterogeneous encoded correlated sequences over an eavesdropped channel. In: IEEE International Symposium on Information Theory (ISIT), pp. 2949–2953 (2015)

    Google Scholar 

  4. Bashar, S., Ding, Z.: Optimum power allocation against information leakage in wireless network. In: IEEE Global Telecommunications Conference (GLOBECOM), pp. 1–6 (2009)

    Google Scholar 

  5. Csiszár, I., Körner, J.: Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 24, 339–348 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  6. Garnaev, A., Baykal-Gursoy, M., Poor, H.V.: Incorporating attack-type uncertainty into network protection. IEEE Trans. Inf. Forensics Secur. 9, 1278–1287 (2014)

    Article  Google Scholar 

  7. Garnaev, A., Baykal-Gursoy, M., Poor, H.V.: A game theoretic analysis of secret and reliable communication with active and passive adversarial modes. IEEE Trans. Wirel. Commun. 15, 2155–2163 (2016)

    Article  Google Scholar 

  8. Garnaev, A., Trappe, W.: The eavesdropping and jamming dilemma in multi-channel communications. In: IEEE International Conference on Communications (ICC), pp. 2160–2164 (2013)

    Google Scholar 

  9. Garnaev, A., Trappe, W.: Secret communication when the eavesdropper might be an active adversary. In: Jonsson, M., Vinel, A., Bellalta, B., Belyaev, E. (eds.) MACOM 2014. LNCS, vol. 8715, pp. 121–136. Springer, Heidelberg (2014). doi:10.1007/978-3-319-10262-7_12

    Google Scholar 

  10. Garnaev, A., Trappe, W.: To eavesdrop or jam, that is the question. In: Mellouk, A., Sherif, M.H., Li, J., Bellavista, P. (eds.) ADHOCNETS 2013. LNICSSITE, vol. 129, pp. 146–161. Springer, Heidelberg (2014). doi:10.1007/978-3-319-04105-6_10

    Chapter  Google Scholar 

  11. Garnaev, A., Trappe, W.: Anti-jamming strategies: a stochastic game approach. In: Agüero, R., Zinner, T., Goleva, R., Timm-Giel, A., Tran-Gia, P. (eds.) MONAMI 2014. LNICSSITE, vol. 141, pp. 230–243. Springer, Heidelberg (2015). doi:10.1007/978-3-319-16292-8_17

    Google Scholar 

  12. Garnaev, A., Trappe, W.: One-time spectrum coexistence in dynamic spectrum access when the secondary user may be malicious. IEEE Trans. Inf. Forensics Secur. 10, 1064–1075 (2015)

    Article  Google Scholar 

  13. Garnaev, A., Trappe, W.: A bandwidth monitoring strategy under uncertainty of the adversary’s activity. IEEE Trans. Inf. Forensics Secur. 11, 837–849 (2016)

    Article  Google Scholar 

  14. Garnaev, A., Trappe, W., Kung, C.-T.: Optimizing scanning strategies: selecting scanning bandwidth in adversarial RF environments. In: 8th International Conference on Cognitive Radio Oriented Wireless Networks (CROWNCOM), pp. 148–153 (2013)

    Google Scholar 

  15. Gopala, P.K., Lai, L., El Gamal, H.: On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory 54, 4687–4698 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  16. Ho, Z., Jorswieck, E., Engelmann, S.: Information leakage neutralization for the multi-antenna non-regenerative relay-assisted multi-carrier interference channel. IEEE J. Sel. Areas Commun. 31, 1672–1686 (2013)

    Article  Google Scholar 

  17. Kalai, E., Smorodinsky, M.: Other solutions to Nash’s bargaining problem. Econometrica 43, 513–518 (1975)

    Article  MathSciNet  MATH  Google Scholar 

  18. Kim, M., Hwang, E., Kim, J.: Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas. J. Wirel. Netw. (2015). doi:10.1007/s11276-015-1160-4

    Google Scholar 

  19. Koyluoglu, O.O., El Gamal, H., Lai, L., Poor, H.V.: Interference alignment for secrecy. IEEE Trans. Inf. Theory 57, 3323–3332 (2011)

    Article  MathSciNet  Google Scholar 

  20. Li, Z., Yates, R., Trappe, W.: Secure communication with a fading eavesdropper channel. In: IEEE International Symposium on Information Theory (ISIT), pp. 1296–1300 (2007)

    Google Scholar 

  21. Liang, Y., Poor, H.V., Shamai, S.: Information theoretic security. Found. Trends Commun. Inf. Theory 5(4–5), 355–580 (2009)

    MATH  Google Scholar 

  22. Liang, Y., Poor, H.V., Shamai, S.: Secure communications over fading channels. IEEE Trans. Inf. Theory 54, 2470–2492 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  23. Lin, M., Ge, J., Yang, Y.: An effective secure transmission scheme for AF relay networks with two-hop information leakage. IEEE Commun. Lett. 17, 1676–1679 (2013)

    Article  Google Scholar 

  24. Mukherjee, A., Fakoorian, S.A.A., Huang, J., Swindlehurst, A.L.: Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tutor. 16, 1550–1573 (2014)

    Article  Google Scholar 

  25. Negi, R., Goel, S.: Secret communication using artificial noise. In: 62nd IEEE Vehicular Technology Conference (VTC), pp. 1906–1910 (2005)

    Google Scholar 

  26. Owen, G.: Game Theory. Academic Press, New York (1982)

    MATH  Google Scholar 

  27. Wu, Y., Liu, K.J.R.: An information secrecy game in cognitive radio networks. IEEE Trans. Inf. Forensics Secur. 6, 831–842 (2011)

    Article  Google Scholar 

  28. Xiong, Q., Liang, Y.-C., Li, K.H., Gong, Y.: An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems. IEEE Trans. Inf. Forensics Secur. 10, 932–940 (2015)

    Article  Google Scholar 

  29. Yang, C., Li, J., Anpalagan, A.: Strategic bargaining in wireless networks: basics, opportunities and challenges. IET Commun. 8, 3435–3450 (2014)

    Article  Google Scholar 

  30. Yang, D., Zhang, J., Fang, X., Richa, A., Xue, G.: Optimal transmission power control in the presence of a smart jammer. In: IEEE Global Communications Conference (GLOBECOM), pp. 5506–5511 (2012)

    Google Scholar 

  31. Zhu, Q., Saad, W., Han, Z., Poor, H.V., Basar, T.: Eavesdropping and jamming in next-generation wireless networks: a game-theoretic approach. In: IEEE Military Communications Conference (MILCOM), pp. 119–124 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrey Garnaev .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Garnaev, A., Trappe, W. (2016). A Secrecy and Security Dilemma in OFDM Communications. In: Madsen, T., Nielsen, J., Pratas, N. (eds) Multiple Access Communications. MACOM 2016. Lecture Notes in Computer Science(), vol 10121. Springer, Cham. https://doi.org/10.1007/978-3-319-51376-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-51376-8_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-51375-1

  • Online ISBN: 978-3-319-51376-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics