当前位置: X-MOL 学术arXiv.cs.GT › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A Two-stage Game Framework to Secure Transmission in Two-Tier UAV Networks
arXiv - CS - Computer Science and Game Theory Pub Date : 2020-09-21 , DOI: arxiv-2009.09887
Mengnian Xu, Yanjiao Chen, Wei Wang

The multi-UAV network is promising to extend conventional networks by providing broader coverage and better reliability. Nevertheless, the broadcast nature of wireless signals and the broader coverage expose multi-UAV communications to the threats of passive eavesdroppers. Recent studies mainly focus on securing a single legitimate link, or communications between a UAV and multiple ground users in one/two-UAV-aided networks, while the physical layer secrecy analysis for hierarchical multi-UAV networks is underexplored. In this paper, we investigate a general two-tier UAV network consisting of multiple UAV transmitters (UTs) and multiple UAV receivers (URs) in the presence of multiple UAV eavesdroppers (UEs). To protect all legitimate UT-UR links against UEs at the physical layer, we design a two-stage framework consisting of a UT-UR association stage and a cooperative transmission stage. Specifically, we formulate the secure transmission problem into a many-to-one matching game followed by an overlapping coalition formation (OCF) game, taking into account the limited capabilities and the throughput requirements of URs, as well as the transmission power constraints of UTs. A matching algorithm and an OCF algorithm are proposed to solve these two sequential games whose convergences and stabilities are guaranteed theoretically. Simulation results show the superiority of our algorithms and the effectiveness of our two-stage game framework in the terms of secrecy performance.

中文翻译:

在两层无人机网络中安全传输的两阶段博弈框架

多无人机网络有望通过提供更广泛的覆盖范围和更好的可靠性来扩展传统网络。然而,无线信号的广播特性和更广泛的覆盖范围使多无人机通信面临被动窃听者的威胁。最近的研究主要集中在保护单个合法链路,或一个/两个无人机辅助网络中无人机与多个地面用户之间的通信,而对分层多无人机网络的物理层保密分析尚未得到充分探索。在本文中,我们研究了在存在多个无人机窃听者 (UE) 的情况下由多个无人机发射机 (UT) 和多个无人机接收机 (UR) 组成的通用两层无人机网络。为了在物理层保护所有合法的 UT-UR 链路免受 UE 的攻击,我们设计了一个由 UT-UR 关联阶段和协作传输阶段组成的两阶段框架。具体来说,考虑到 UR 的有限能力和吞吐量要求,以及 UT 的传输功率限制,我们将安全传输问题表述为多对一匹配博弈,然后是重叠联盟形成 (OCF) 博弈. 针对这两个在理论上保证收敛性和稳定性的序列博弈,提出了匹配算法和OCF算法。仿真结果表明了我们算法的优越性和我们的两阶段博弈框架在保密性能方面的有效性。我们将安全传输问题表述为多对一匹配博弈,然后是重叠联盟形成(OCF)博弈,同时考虑到 UR 的有限能力和吞吐量要求,以及 UT 的传输功率限制。针对这两个在理论上保证收敛性和稳定性的序列博弈,提出了匹配算法和OCF算法。仿真结果表明了我们算法的优越性和我们的两阶段博弈框架在保密性能方面的有效性。我们将安全传输问题表述为多对一匹配博弈,然后是重叠联盟形成(OCF)博弈,同时考虑到 UR 的有限能力和吞吐量要求,以及 UT 的传输功率限制。针对这两个在理论上保证收敛性和稳定性的序列博弈,提出了匹配算法和OCF算法。仿真结果表明了我们算法的优越性和我们的两阶段博弈框架在保密性能方面的有效性。针对这两个在理论上保证收敛性和稳定性的序列博弈,提出了匹配算法和OCF算法。仿真结果表明了我们算法的优越性和我们的两阶段博弈框架在保密性能方面的有效性。针对这两个在理论上保证收敛性和稳定性的序列博弈,提出了匹配算法和OCF算法。仿真结果表明了我们算法的优越性和我们的两阶段博弈框架在保密性能方面的有效性。
更新日期:2020-09-22
down
wechat
bug