Coalition formation games for superposition modulated cooperative transmission in multiuser wireless networks

Author(s):  
Cengis Hasan ◽  
Eitan Altman ◽  
Jean-Marie Gorce ◽  
Umit Aygolu
2013 ◽  
Vol E96.B (2) ◽  
pp. 561-568 ◽  
Author(s):  
Lin SHAN ◽  
Sonia A^|^Iuml;SSA ◽  
Hidekazu MURATA ◽  
Susumu YOSHIDA ◽  
Liang ZHAO

2015 ◽  
Vol 9 (2) ◽  
pp. 31-59
Author(s):  
Weidong Yang ◽  
Liming Sun ◽  
Zhenqiang Xu

The wireless information-theoretic security from inter-session interference has attracted considerable attention recently. A prerequisite for available works is the precise distinction between legitimate nodes and eavesdroppers. However, the authentication error always exists in the node authentication process in Two-Hop wireless networks. This paper presents an eavesdropper model with authentication error and two eavesdropping ways. Then, the number of eavesdroppers can be tolerated is analyzed while the desired secrecy is achieved with high probability in the limit of a large number of relay nodes. Final, we draw two conclusions for authentication error: 1) the impersonate nodes are chosen as relay is the dominant factor of the transmitted message leakage, and the impersonation attack does seriously decrease the number of eavesdroppers can be tolerated. 2) The error authentication to legitimate nodes is almost no effect on the number of eavesdroppers can be tolerated.


Sign in / Sign up

Export Citation Format

Share Document