Untrusted Relay Selection and Secure Transmission Optimization Based on Stackelberg Game

Rugui Yao, Guangxian Zhang, Ye Fan, Xiaoya Zuo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In this paper, considering the secure transmission of wireless communication networks with multiple untrusted relays, a relay selection method based on Stackelberg game is proposed. In this method, the source node and the untrusted relays are modeled as the buyer and the sellers, respectively. In particular, the source node can encourage the untrusted relays to forward signals by paying power price. The proposed method not only helps the source node purchase the optimal forwarding power from untrusted relays to improve the system security rate, but also helps the untrusted relays maximize their benefits through the optimal price. Further, this paper proves the existence of Nash equilibrium, and proposes a distributed iterative algorithm to obtain the equilibrium solution. The simulation results show that the proposed relay selection method can improve the system security rate effectively.

Original languageEnglish
Title of host publication2021 IEEE 6th International Conference on Intelligent Computing and Signal Processing, ICSP 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages534-539
Number of pages6
ISBN (Electronic)9780738143705
DOIs
StatePublished - 9 Apr 2021
Event6th IEEE International Conference on Intelligent Computing and Signal Processing, ICSP 2021 - Xi'an, China
Duration: 9 Apr 202111 Apr 2021

Publication series

Name2021 IEEE 6th International Conference on Intelligent Computing and Signal Processing, ICSP 2021

Conference

Conference6th IEEE International Conference on Intelligent Computing and Signal Processing, ICSP 2021
Country/TerritoryChina
CityXi'an
Period9/04/2111/04/21

Keywords

  • relay selection
  • Stackelberg game
  • untrusted relay

Fingerprint

Dive into the research topics of 'Untrusted Relay Selection and Secure Transmission Optimization Based on Stackelberg Game'. Together they form a unique fingerprint.

Cite this