Notification:
We are currently experiencing intermittent issues impacting performance. We apologize for the inconvenience.
By Topic

Physical-Layer Security in Distributed Wireless Networks Using Matching Theory

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Bayat, S. ; Center of Excellence in Telecommun., Univ. of Sydney, Sydney, NSW, Australia ; Louie, R.H.Y. ; Zhu Han ; Vucetic, B.
more authors

We consider the use of physical-layer security in a wireless communication system where multiple jamming nodes assist multiple source-destination nodes in combating unwanted eavesdropping from a single eavesdropper. In particular, we propose a distributed algorithm that matches each source-destination pair with a particular jammer. Our algorithm caters for three channel state information (CSI) assumptions: global CSI, local CSI, and local CSI without the eavesdropper channel. We prove that our algorithm has many desirable properties. First, the outcome of the proposed algorithm results in a stable matching, which is important if the source and jamming nodes are selfish. Second, the secrecy rate of the proposed algorithm converges to the secrecy rate of a centralized optimal solution, if the price step-number is sufficiently small. Third, our algorithm converges only after a small number of iterations, and its overhead is relatively small. Fourth, our algorithm has a significantly lower complexity than a centralized optimal approach.

Published in:

Information Forensics and Security, IEEE Transactions on  (Volume:8 ,  Issue: 5 )