Games on linear deterministic channels with eavesdroppers

Ruijie Xu, Hao Ge, Randall A. Berry

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

We consider adding secrecy constraints to a model of information theoretic games introduced in earlier works. In these games, each user autonomously selects their encoding and decoding strategy with the objective of maximizing their own secure rate in the presence of a single eavesdropper. We study the Nash equilibrium regions for such games when the users are communicating over linear deterministic models of a multiple access channel and an interference channel. In particular, we show that for interference channels, the presence of an eavesdropper results in significantly different equilibrium properties when an eavesdropper is not present.

Original languageEnglish (US)
Title of host publication2017 IEEE International Symposium on Information Theory, ISIT 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2123-2127
Number of pages5
ISBN (Electronic)9781509040964
DOIs
StatePublished - Aug 9 2017
Event2017 IEEE International Symposium on Information Theory, ISIT 2017 - Aachen, Germany
Duration: Jun 25 2017Jun 30 2017

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
ISSN (Print)2157-8095

Other

Other2017 IEEE International Symposium on Information Theory, ISIT 2017
Country/TerritoryGermany
CityAachen
Period6/25/176/30/17

Funding

This work was supported in part by the National Science Foundation grant TWC-1314620.

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Information Systems
  • Modeling and Simulation
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Games on linear deterministic channels with eavesdroppers'. Together they form a unique fingerprint.

Cite this