• Electronics Optics & Control
  • Vol. 25, Issue 1, 104 (2018)
HE Chun-yan, GAO Fei, and ZHANG Hui
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3969/j.issn.1671-637x.2018.01.022 Cite this Article
    HE Chun-yan, GAO Fei, ZHANG Hui. A Power Allocation Mechanism Combining Relay with Jammer Based on Stackelberg Game[J]. Electronics Optics & Control, 2018, 25(1): 104 Copy Citation Text show less
    References

    [1] HOU W K,WANG X B,REFAEY A.Misbehavior detection in amplify-and-forward cooperative OFDM systems[C]//IEEE International Conference on Communications(ICC),2013:5345-5349.

    [2] CHEN M H,LIN S C,HONG Y W P,et al.On cooperative and malicious behaviors in multi-relay fading channels[J].IEEE Transactions on Information Forensics & Security,2013,8(7):1126-1139.

    [3] JARROLD S L,MOORE D,POTTER U.Intrusion detection system to detect malicious misbehavior nodes in MANET[C]//International Conference on Acoustics,Speech,& Signal Processing,ICASSP,1996:6-7.

    [4] WANG X J,ZHANG H,DUONG T Q,et al.Secure cooperative communication with Nth best relay selection[C]//IEEE 79th Vehicular Technology Conference (VTC Spring), 2014:23-27.

    [5] CHANGIZ R,HALABIAN H,YU F R,et al.Trust management in wireless mobile networks with cooperative communications[C]//IEEE/IFIP International Conference on Embedded and Ubiquitous Computing,IEEE Computer Society,2010:498-503.

    [6] ABDELAZIZ K C,LAGRAA N,LAKAS A.Trust model with delayed verification for message relay in VANETs[C]//IEEE Wireless Communications and Mobile Computing Conference,2014:700-705.

    [7] ZHANG R Q,SONG L Y,ZHU H,et al.Physical layer security for two-way untrusted relaying with friendly jammers[J].IEEE Transactions on Vehicular Technology, 2012,61(8):3693-3704.

    [8] HYNEK T,SYKORA J.Wireless physical layer network coding in potential presence of malicious relays-incomplete information game approach[J].Electronics Letters,2015, 51(16):1292-1294.

    [9] WANG L F,ELKASHLAN M,HUANG J,et al.Secure transmission with optimal power allocation in untrusted relay networks[J].IEEE Wireless Communication Letters, 2014,3(3):289-292.

    [10] JEON H,MCLAUGHLIN S W,KIM I M,et al.Secure communications with untrusted secondary nodes in cognitive radio networks[J].IEEE Transactions on Wireless Communications,2014,13(4):1790-1805.

    [11] ABRAMSON G,KUPERMAN M.Social games in a social network[J].Physical Review E Statistical Nonlinear & Soft Matter Physics,2000,63(3):339-347.

    HE Chun-yan, GAO Fei, ZHANG Hui. A Power Allocation Mechanism Combining Relay with Jammer Based on Stackelberg Game[J]. Electronics Optics & Control, 2018, 25(1): 104
    Download Citation