Rate allocation for strategic users in Gaussian multiple access wiretap channels

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

We consider a set of users communicating over a Gaussian multiple access channel in the presence of an eavesdropper. The information theoretic secrecy rates for such settings have been well studied under the assumptions that all users are cooperative. In more recent work, a game theoretic model was studied in which each user selected its own rate. This game was shown to have multiple possible equilibria. Here, we consider a related question in which a mechanism is used to solicit information from the users and then allocate secrecy rates among them. We study three simple mechanisms and analyze the performance of each for a small set of users (N = 2, 3) in terms of their worst-case efficiency. For N = 2, we give a closed form lower bound on the efficiency for each scheme and show one mechanism, which generalizes the well-known Kelly mechanism, has the best efficiency. We then consider N = 3 users and give numerical results for different user utility functions.

Original languageEnglish (US)
Title of host publication2017 IEEE International Conference on Communications, ICC 2017
EditorsMerouane Debbah, David Gesbert, Abdelhamid Mellouk
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467389990
DOIs
StatePublished - Jul 28 2017
Event2017 IEEE International Conference on Communications, ICC 2017 - Paris, France
Duration: May 21 2017May 25 2017

Publication series

NameIEEE International Conference on Communications
ISSN (Print)1550-3607

Other

Other2017 IEEE International Conference on Communications, ICC 2017
Country/TerritoryFrance
CityParis
Period5/21/175/25/17

Funding

This work was supported in part by the National Science Foundation grant TWC-1314620.

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Rate allocation for strategic users in Gaussian multiple access wiretap channels'. Together they form a unique fingerprint.

Cite this