The degraded Gaussian multiple access wiretap channel with selfish transmitters: A coalitional game theory perspective

Remi A. Chou, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations

    Abstract

    We study the degraded Gaussian multiple access wiretap channel with selfish transmitters, i.e., they are each solely interested in maximizing their individual secrecy rate. The question then arises as to whether selfish transmitters can increase their individual secrecy rate by participating in a collective, i.e, multiple access, protocol instead of operating on their own. If yes, the question arises if there is a protocol that satisfies all the participating transmitters, in the sense that no transmitter has an incentive to deviate from the protocol. We answer these questions in the positive utilizing coalitional game theory. In particular, we show that cooperation is in the best interest of all transmitters and that there exist protocols that incentivize all transmitters to participate. Furthermore, we determine a unique, fair, and stable achievable secrecy rate allocation.

    Original languageEnglish (US)
    Title of host publication2017 IEEE International Symposium on Information Theory, ISIT 2017
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages1703-1707
    Number of pages5
    ISBN (Electronic)9781509040964
    DOIs
    StatePublished - Aug 9 2017
    Event2017 IEEE International Symposium on Information Theory, ISIT 2017 - Aachen, Germany
    Duration: Jun 25 2017Jun 30 2017

    Publication series

    NameIEEE International Symposium on Information Theory - Proceedings
    ISSN (Print)2157-8095

    Other

    Other2017 IEEE International Symposium on Information Theory, ISIT 2017
    Country/TerritoryGermany
    CityAachen
    Period6/25/176/30/17

    All Science Journal Classification (ASJC) codes

    • Theoretical Computer Science
    • Information Systems
    • Modeling and Simulation
    • Applied Mathematics

    Fingerprint

    Dive into the research topics of 'The degraded Gaussian multiple access wiretap channel with selfish transmitters: A coalitional game theory perspective'. Together they form a unique fingerprint.

    Cite this