{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T09:48:15Z","timestamp":1649152095756},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,11,12]],"date-time":"2014-11-12T00:00:00Z","timestamp":1415750400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2014,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>This paper proposes a bargaining-based jammer power allocation scheme for multi-source multi-destination wireless network in the presence of a friendly jammer and a malicious node which eavesdrops erratically. We formulate the erratic behavior of the eavesdropper as a novel model where the eavesdropper wiretaps the message of the legitimate sources with a certain probability in a time slot. Moreover, in order to obtain a fair and efficient solution, the jammer power allocation problem is modeled as a Nash bargaining game under the constraint of maximum transmit power of a friendly jammer, which is a convex optimization problem. Then, the closed form of the Nash bargaining solution (NBS) is derived, and a simple but effective centralized algorithm is proposed. Besides, we find that the even power allocation solution and the sum-secrecy-rate optimal solution are the special cases of the NBS, when the bargaining power is properly selected. Simulation results demonstrate that the NBS achieves a good performance in terms of both effectiveness and fairness.<\/jats:p>","DOI":"10.1186\/1687-1499-2014-186","type":"journal-article","created":{"date-parts":[[2014,11,12]],"date-time":"2014-11-12T14:21:13Z","timestamp":1415802073000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bargaining-based jammer power allocation for dynamic eavesdropping scenario"],"prefix":"10.1186","volume":"2014","author":[{"given":"Duan","family":"Bowen","sequence":"first","affiliation":[]},{"given":"Cai","family":"Yueming","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Jianchao","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Weiwei","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Wendong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,12]]},"reference":[{"key":"1001_CR1","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1109\/TIFS.2013.2263804","volume":"8","author":"ZH Awan","year":"2013","unstructured":"Awan ZH, Zaidi A, Vandendorpe L: Multiaccess channel with partially cooperating encoders and security constraints. IEEE Trans. Inform. Forensics Secur 2013, 8: 1243-1254.","journal-title":"IEEE Trans. Inform. Forensics Secur"},{"key":"1001_CR2","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1109\/TIFS.2012.2185493","volume":"7","author":"ZH Awan","year":"2012","unstructured":"Awan ZH, Zaidi A, Vandendorpe L: Secure communication over parallel relay channel. IEEE Trans. Inform. Forensics Secur 2012, 7: 359-371.","journal-title":"IEEE Trans. Inform. Forensics Secur"},{"key":"1001_CR3","doi-asserted-by":"publisher","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","volume":"7","author":"S Goel","year":"2008","unstructured":"Goel S, Negi R: Guaranteeing secrecy in wireless networks using artificial noise. IEEE Trans. Wireless Commun 2008, 7: 2180-2189.","journal-title":"IEEE Trans. Wireless Commun"},{"key":"1001_CR4","first-page":"160","volume-title":"IEEE Symposium on Security and Privacy (SP)","author":"N Tippenhauer","year":"2013","unstructured":"Tippenhauer N, Malisa L, Ranganathan A, Capkun S: On limitations of friendly jamming for confidentiality. In IEEE Symposium on Security and Privacy (SP). Berkeley, CA; 2013:160-173."},{"key":"1001_CR5","first-page":"417","volume-title":"Proceeding of IEEE Workshop on Statistical Signal Processing (SSP)","author":"L Dong","year":"2009","unstructured":"Dong L, Han Z, Petropulu A, Poor H: Cooperative jamming for wireless physical layer security. In Proceeding of IEEE Workshop on Statistical Signal Processing (SSP). Cardiff; 2009:417-420."},{"key":"1001_CR6","doi-asserted-by":"publisher","first-page":"3153","DOI":"10.1109\/TIT.2011.2121450","volume":"57","author":"X Tang","year":"2011","unstructured":"Tang X, Liu R, Spasojevic P, Poor H: Interference assisted secret communication. IEEE Trans. Inform. Theor 2011, 57: 3153-3167.","journal-title":"IEEE Trans. Inform. Theor"},{"key":"1001_CR7","first-page":"1","volume-title":"Proceedings of the IEEE International Conference on Communications (ICC)","author":"J Vilela","year":"2010","unstructured":"Vilela J, Bloch M, Barros J, McLaughlin S: Friendly jamming for wireless secrecy. In Proceedings of the IEEE International Conference on Communications (ICC). Cape Town, South Africa; 2010:1-6."},{"key":"1001_CR8","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1109\/TIFS.2011.2111370","volume":"6","author":"J Vilela","year":"2011","unstructured":"Vilela J, Bloch M, Barros J, McLaughlin S: Wireless secrecy regions with friendly jamming. IEEE Trans. Inform. Forensics Secur 2011, 6: 256-266.","journal-title":"IEEE Trans. Inform. Forensics Secur"},{"key":"1001_CR9","first-page":"442","volume-title":"5th International Conference on Mobile Ad-hoc and Sensor Networks(MSN)","author":"Z Han","year":"2009","unstructured":"Han Z, Marina N, Debbah M, Hjorungnes A: Improved wireless secrecy capacity using distributed auction theory. In 5th International Conference on Mobile Ad-hoc and Sensor Networks(MSN). Fujian; 2009:442-447."},{"key":"1001_CR10","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/INFCOMW.2011.5928805","volume-title":"IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","author":"R Zhang","year":"2011","unstructured":"Zhang R, Song L, Han Z, Jiao B: Improve physical layer security in cooperative wireless network using distributed auction games. In IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). Shanghai; 2011:18-23."},{"key":"1001_CR11","doi-asserted-by":"publisher","first-page":"452907","DOI":"10.1155\/2009\/452907","volume":"2009","author":"Z Han","year":"2010","unstructured":"Han Z, Marina N, Debbah M, Hjorungnes A: Physical layer security game: interaction between source, eavesdropper and friendly jammer. EURASIP J. Wireless Commun. Netw 2010, 2009: 452907.","journal-title":"EURASIP J. Wireless Commun. Netw"},{"issue":"5-6","key":"1001_CR12","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1515\/freq-2013-0147","volume":"68","author":"JY Qu","year":"2014","unstructured":"Qu JY, Cai YM, Wu D, Chen HL: Stackelberg game based power allocation for physical layer security of device-to-device communication underlaying cellular networks. Frequenz 2014, 68(5-6):285-295.","journal-title":"Frequenz"},{"key":"1001_CR13","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/TWC.2012.120412.112001","volume":"12","author":"I Stanojev","year":"2013","unstructured":"Stanojev I, Yener A: Improving secrecy rate via spectrum leasing for friendly jamming. IEEE Trans. Wireless Commun 2013, 12: 134-145.","journal-title":"IEEE Trans. Wireless Commun"},{"key":"1001_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/WCSP.2012.6542898","volume-title":"International Conference on Wireless Communications and Signal Processing (WCSP)","author":"JT Yue","year":"2012","unstructured":"Yue JT, Yang B, Guan XP: Fairness-guaranteed pricing and power allocation with a friendly jammer against eavesdropping. In International Conference on Wireless Communications and Signal Processing (WCSP). Huangshan; 2012:1-6."},{"key":"1001_CR15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511607950","volume-title":"Bargaining Theory with Applications","author":"A Muthoo","year":"1999","unstructured":"Muthoo A: Bargaining Theory with Applications. Cambridge University Press; 1999."},{"key":"1001_CR16","first-page":"5282","volume-title":"Proceeding of IEEE ICC","author":"J Suris","year":"2007","unstructured":"Suris J, DaSilva L, Han Z, MacKenzie A: Cooperative game theory for distributed spectrum sharing. In Proceeding of IEEE ICC. Glasgow; 2007:5282-5287."},{"key":"1001_CR17","volume-title":"Game Theory in Wireless and Communication Networks: Theory, Models, and Applications","author":"Z Han","year":"2012","unstructured":"Han Z, Niyato D, Saad W, Basar T, Hjorungnes A: Game Theory in Wireless and Communication Networks: Theory, Models, and Applications. Cambridge University Press; 2012."},{"key":"1001_CR18","volume-title":"DEC Research Report TR-301","author":"R Jain","year":"1984","unstructured":"Jain R, Chiu DM, Hawe W: A quantitative measure of fairness and discrimination for resource allocation in shared systems. DEC Research Report TR-301 1984. http:\/\/arxiv.org\/abs\/cs.NI\/9809099"},{"key":"1001_CR19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441","volume-title":"Convex Optimization","author":"S Boyd","year":"2004","unstructured":"Boyd S, Vandenberghe L: Convex Optimization. Cambridge University Press; 2004."},{"key":"1001_CR20","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/35.900644","volume":"39","author":"M Andrews","year":"2001","unstructured":"Andrews M, Kumaran K, Stolyar A, Whiting P, Vijayakumar R: Providing quality of service over a shared wireless link. IEEE Commun. Mag 2001, 39: 150-154. 10.1109\/35.900644","journal-title":"IEEE Commun. Mag"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-186.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2014-186\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-186.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T06:29:58Z","timestamp":1630564198000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2014-186"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,12]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["1001"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2014-186","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,12]]},"assertion":[{"value":"30 May 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"186"}}