Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Game Theory Based Secure Wireless Powered D2D Communications with Cooperative Jamming
Date
2017-03-31
Author
Chu, Zheng
Nguyen, Huan X.
Tuan Anh Le, Tuan Anh Le
Karamanoglu, Mehmet
Duc To, Duc To
Ever, Enver
Al-Turjman, Fadi
Yazıcı, Adnan
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
189
views
0
downloads
Cite This
In this paper, we consider a secure wireless powered device-to-device (D2D) communication in the presence of the multiple eavesdroppers, where a smart hybrid base station (BS) in cellular network not only charges for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer (CJ) to interfere with the eavesdroppers. Although the cellular networks share their own spectrum with the D2D underlay network, both of them may not belong to the same service provider. Thus, the D2D transmitter charges for the energy services released by the hybrid BS. We formulate two Stackelberg game formulations to exploit the hierarchical interaction between the BS and the D2D transmitter with/without energy trading. The associated Stackelberg equilibriums of the formulated games are derived in terms of closed-form solutions. Simulation results are provided to validate our proposed schemes.
Subject Keywords
Transmission
,
Networks
URI
https://hdl.handle.net/11511/53812
Collections
Department of Computer Engineering, Conference / Seminar
Suggestions
OpenMETU
Core
Secure Wireless Powered and Cooperative Jamming D2D Communications
Chu, Zheng; Nguyen, Huan X; Le, Tuan Anh; Karamanoglu, Mehmet; EVER, ENVER; Yazıcı, Adnan (2017-10-01)
This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer to interfere with the eavesdroppers. The cellular and D2D networks can belong to different service providers, which means that the D2D transmitter would need to pay for ...
Optimized Asymmetric Cooperation for Downlink Cloud Radio Access Network under per-Base Station Data Transfer Constraint
Kadan, Fehmi Emre; Yılmaz, Ali Özgür (2017-01-01)
Using multicell cooperation between several base stations (BSs) connected to a central processor (CP) via finite capacity digital backhaul links, the inter-cell interference, which is known to limit the standard cellular systems, can be mitigated. When all user data is sent to each BS through the CP, which is referred as the full cooperation, the interference can be perfectly eliminated, however, this may cause the capacity of backhaul links to be exceeded. In this study, it is aimed to find the optimal asy...
Evaluation of priority dependent and time scheduled MAC layer protocols for ad-hoc networks
Erdeğer, İsmail; Baykal, Buyurman; Department of Electrical and Electronics Engineering (2015)
Ad-hoc networks have very unique features, such as dynamic topologies, relatively limited bandwidth and wireless signal propagation schemes, which present various challenges for wireless communication. In this thesis, control mechanisms for channel access scheduling and topology in ad-hoc networks are evaluated, which utilize the information from two-hop neighborhood to cope with the communication difficulties in ad-hoc networks. Channel assignment is one of the most important topics for ad-hoc networks. Ch...
Mobile multi-access IP: a proposal for mobile multi-access management in future wireless IP networks
Altuntas, S; Baykal, Buyurman (Elsevier BV, 2005-03-15)
As the wireless networking technologies advance rapidly, providing mobile users with roaming freely in heterogeneous wireless access domains, the need for multi-access arises. This paper introduces the Mobile Multi-Access Management Architecture (MMA-IP) for IP-based future wireless networks. MMA-IP enables mobile users to utilize multiple access domains synchronously and to switch between different access domains. In order to handle multi-access operations, MMA-IP defines a new special mobility agent, call...
Improving performance of network intrusion detection systems through concurrent mechanisms
Atakan, Mustafa; Şener, Cevat; Department of Computer Engineering (2003)
As the bandwidth of present networks gets larger than the past, the demand of Network Intrusion Detection Systems (NIDS) that function in real time becomes the major requirement for high-speed networks. If these systems are not fast enough to process all network traffic passing, some malicious security violations may take role using this drawback. In order to make that kind of applications schedulable, some concurrency mechanism is introduced to the general flowchart of their algorithm. The principal aim is...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
Z. Chu et al., “Game Theory Based Secure Wireless Powered D2D Communications with Cooperative Jamming,” 2017, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/53812.