Game Theory Based Secure Wireless Powered D2D Communications with Cooperative Jamming

Chu, Zheng
Nguyen, Huan X.
Tuan Anh Le, Tuan Anh Le
Karamanoglu, Mehmet
Duc To, Duc To
Ever, Enver
Al-Turjman, Fadi
Yazıcı, Adnan
In this paper, we consider a secure wireless powered device-to-device (D2D) communication in the presence of the multiple eavesdroppers, where a smart hybrid base station (BS) in cellular network not only charges for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer (CJ) to interfere with the eavesdroppers. Although the cellular networks share their own spectrum with the D2D underlay network, both of them may not belong to the same service provider. Thus, the D2D transmitter charges for the energy services released by the hybrid BS. We formulate two Stackelberg game formulations to exploit the hierarchical interaction between the BS and the D2D transmitter with/without energy trading. The associated Stackelberg equilibriums of the formulated games are derived in terms of closed-form solutions. Simulation results are provided to validate our proposed schemes.


Secure Wireless Powered and Cooperative Jamming D2D Communications
Chu, Zheng; Nguyen, Huan X; Le, Tuan Anh; Karamanoglu, Mehmet; EVER, ENVER; Yazıcı, Adnan (2017-10-01)
This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer to interfere with the eavesdroppers. The cellular and D2D networks can belong to different service providers, which means that the D2D transmitter would need to pay for ...
Optimized Asymmetric Cooperation for Downlink Cloud Radio Access Network under per-Base Station Data Transfer Constraint
Kadan, Fehmi Emre; Yılmaz, Ali Özgür (2017-01-01)
Using multicell cooperation between several base stations (BSs) connected to a central processor (CP) via finite capacity digital backhaul links, the inter-cell interference, which is known to limit the standard cellular systems, can be mitigated. When all user data is sent to each BS through the CP, which is referred as the full cooperation, the interference can be perfectly eliminated, however, this may cause the capacity of backhaul links to be exceeded. In this study, it is aimed to find the optimal asy...
Evaluation of priority dependent and time scheduled MAC layer protocols for ad-hoc networks
Erdeğer, İsmail; Baykal, Buyurman; Department of Electrical and Electronics Engineering (2015)
Ad-hoc networks have very unique features, such as dynamic topologies, relatively limited bandwidth and wireless signal propagation schemes, which present various challenges for wireless communication. In this thesis, control mechanisms for channel access scheduling and topology in ad-hoc networks are evaluated, which utilize the information from two-hop neighborhood to cope with the communication difficulties in ad-hoc networks. Channel assignment is one of the most important topics for ad-hoc networks. Ch...
Mobile multi-access IP: a proposal for mobile multi-access management in future wireless IP networks
Altuntas, S; Baykal, Buyurman (Elsevier BV, 2005-03-15)
As the wireless networking technologies advance rapidly, providing mobile users with roaming freely in heterogeneous wireless access domains, the need for multi-access arises. This paper introduces the Mobile Multi-Access Management Architecture (MMA-IP) for IP-based future wireless networks. MMA-IP enables mobile users to utilize multiple access domains synchronously and to switch between different access domains. In order to handle multi-access operations, MMA-IP defines a new special mobility agent, call...
Improving performance of network intrusion detection systems through concurrent mechanisms
Atakan, Mustafa; Şener, Cevat; Department of Computer Engineering (2003)
As the bandwidth of present networks gets larger than the past, the demand of Network Intrusion Detection Systems (NIDS) that function in real time becomes the major requirement for high-speed networks. If these systems are not fast enough to process all network traffic passing, some malicious security violations may take role using this drawback. In order to make that kind of applications schedulable, some concurrency mechanism is introduced to the general flowchart of their algorithm. The principal aim is...
Citation Formats
Z. Chu et al., “Game Theory Based Secure Wireless Powered D2D Communications with Cooperative Jamming,” 2017, Accessed: 00, 2020. [Online]. Available: