Sadegh Bamohabbat Chafjiri
Rate secrecy of networks with game theory approach
Bamohabbat Chafjiri, Sadegh; Tebbi, Mohammad Ali; Karimian, Yasser
Authors
Mohammad Ali Tebbi
Yasser Karimian
Contributors
Garry Lee
Editor
Abstract
In this paper, we introduce a three-way discrete memoryless Broadcast channel (T-DMBC) between a transmitter (Alice), a receiver (Bob), and an intruder (Eve). We represent a protocol for secret key establishment (SKE) between Alice and Bob so that Eve can also participate in the second round of the secret key establishment. We assume that the intruder cannot act as an initiator (under the conditions that the FCC acts as a dictator of the game). Thus, any transmission by an intruder as his activity in the first round must not make the protocol vulnerable to the DOS attack. We use the Nash Equilibrium (NE) of the game between the receiver and the intruder to prove that there is no guarantee for achievable secure rate stabilization toward the main receiver by using passive intruder protocols for DMC or 2DMBC. In order to achieve secure rate stabilization, we modify the passive model for the secrecy of 2DMBC with a noise-forwarding strategy and post-computations in a game model.
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | International Conference on Mechanical Engineering and Technology (ICMET-London 2011) |
Start Date | Nov 24, 2011 |
End Date | Nov 25, 2011 |
Publication Date | 2011 |
Deposit Date | Dec 7, 2022 |
Publisher | American Society of Mechanical Engineers |
Pages | 833-837 |
Series ISSN | 9780791859896 |
Book Title | Proceedings of the 2011 International Conference on Mechanical Engineering and Technology (ICMET 2011) |
Chapter Number | 173 |
ISBN | 9780791859896 |
DOI | https://doi.org/10.1115/1.859896.paper172 |
Keywords | Computation, Equilibrium, Physics, Noise, Sound |
Public URL | https://uwe-repository.worktribe.com/output/10223585 |
Publisher URL | https://asmedigitalcollection.asme.org/ebooks/book/141/chapter-abstract/27902/Rate-Secrecy-of-Networks-with-Game-Theory-Approach?redirectedFrom=fulltext |
Related Public URLs | https://asmedigitalcollection.asme.org/ebooks/book/141/International-Conference-on-Mechanical-Engineering |
Additional Information | Proceedings of the 2011 International Conference on Mechanical Engineering and Technology (ICMET 2011) held in London, UK, November 24–25, 2011. ICMET 2011 is a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in Mechanical Engineering and related interdisciplinary subjects in Computer Science and Technology. Those who attended the conference were engineers, scientists, managers of various companies, and professors of universities from about 24 different countries and regions. This proceeding covers the subject areas of Mechanical Engineering and covers interdisciplinary subject areas of Computer Science and Technology. |
You might also like
Stop at the red-light is no longer boring
(2022)
Presentation / Conference Contribution
Related-key impossible differential cryptanalysis of full-round HIGHT
(2013)
Presentation / Conference Contribution
Improving search space analysis of fuzzing mutators using cryptographic structures
(2024)
Presentation / Conference Contribution
Vulnerability detection through machine learning-based fuzzing: A systematic review
(2024)
Journal Article
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search