Abstract
We consider adding secrecy constraints to a model of information theoretic games introduced in earlier works. In these games, each user autonomously selects their encoding and decoding strategy with the objective of maximizing their own secure rate in the presence of a single eavesdropper. We study the Nash equilibrium regions for such games when the users are communicating over linear deterministic models of a multiple access channel and an interference channel. In particular, we show that for interference channels, the presence of an eavesdropper results in significantly different equilibrium properties when an eavesdropper is not present.
Original language | English (US) |
---|---|
Title of host publication | 2017 IEEE International Symposium on Information Theory, ISIT 2017 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 2123-2127 |
Number of pages | 5 |
ISBN (Electronic) | 9781509040964 |
DOIs | |
State | Published - Aug 9 2017 |
Event | 2017 IEEE International Symposium on Information Theory, ISIT 2017 - Aachen, Germany Duration: Jun 25 2017 → Jun 30 2017 |
Publication series
Name | IEEE International Symposium on Information Theory - Proceedings |
---|---|
ISSN (Print) | 2157-8095 |
Other
Other | 2017 IEEE International Symposium on Information Theory, ISIT 2017 |
---|---|
Country/Territory | Germany |
City | Aachen |
Period | 6/25/17 → 6/30/17 |
Funding
This work was supported in part by the National Science Foundation grant TWC-1314620.
ASJC Scopus subject areas
- Theoretical Computer Science
- Information Systems
- Modeling and Simulation
- Applied Mathematics