{"id":"https://openalex.org/W2786596538","doi":"https://doi.org/10.1109/pimrc.2017.8292331","title":"Robust secrecy competition in wireless networks","display_name":"Robust secrecy competition in wireless networks","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2786596538","doi":"https://doi.org/10.1109/pimrc.2017.8292331","mag":"2786596538"},"language":"en","primary_location":{"id":"doi:10.1109/pimrc.2017.8292331","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc.2017.8292331","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037838330","display_name":"Xiao Tang","orcid":"https://orcid.org/0000-0001-8971-5413"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiao Tang","raw_affiliation_strings":["School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China","Shaanxi Smart Networks and Ubiquitous Access Research Center, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Shaanxi Smart Networks and Ubiquitous Access Research Center, Xi'an, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060549116","display_name":"Pinyi Ren","orcid":"https://orcid.org/0000-0002-0147-3673"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pinyi Ren","raw_affiliation_strings":["School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China","Shaanxi Smart Networks and Ubiquitous Access Research Center, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Shaanxi Smart Networks and Ubiquitous Access Research Center, Xi'an, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043891563","display_name":"Datong Xu","orcid":"https://orcid.org/0000-0003-1080-0872"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Datong Xu","raw_affiliation_strings":["School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China","Shaanxi Smart Networks and Ubiquitous Access Research Center, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Shaanxi Smart Networks and Ubiquitous Access Research Center, Xi'an, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100734239","display_name":"Dongyang Xu","orcid":"https://orcid.org/0000-0002-6401-0545"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongyang Xu","raw_affiliation_strings":["School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China","Shaanxi Smart Networks and Ubiquitous Access Research Center, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Shaanxi Smart Networks and Ubiquitous Access Research Center, Xi'an, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5037838330"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19391887,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7804443836212158},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7537627220153809},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.6960448622703552},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.692491888999939},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.601019024848938},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.5631611943244934},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5615952014923096},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5469380617141724},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.49240195751190186},{"id":"https://openalex.org/keywords/competition","display_name":"Competition (biology)","score":0.4908207356929779},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4738861918449402},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.46407559514045715},{"id":"https://openalex.org/keywords/stackelberg-competition","display_name":"Stackelberg competition","score":0.4566797614097595},{"id":"https://openalex.org/keywords/wireless-security","display_name":"Wireless security","score":0.43164199590682983},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.42178624868392944},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.41320982575416565},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.19360673427581787},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15853431820869446},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11281093955039978},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.07445687055587769},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.07438141107559204}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7804443836212158},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7537627220153809},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.6960448622703552},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.692491888999939},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.601019024848938},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5631611943244934},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5615952014923096},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5469380617141724},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.49240195751190186},{"id":"https://openalex.org/C91306197","wikidata":"https://www.wikidata.org/wiki/Q45767","display_name":"Competition (biology)","level":2,"score":0.4908207356929779},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4738861918449402},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.46407559514045715},{"id":"https://openalex.org/C199510392","wikidata":"https://www.wikidata.org/wiki/Q1184602","display_name":"Stackelberg competition","level":2,"score":0.4566797614097595},{"id":"https://openalex.org/C2776946656","wikidata":"https://www.wikidata.org/wiki/Q1655812","display_name":"Wireless security","level":4,"score":0.43164199590682983},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.42178624868392944},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.41320982575416565},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.19360673427581787},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15853431820869446},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11281093955039978},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.07445687055587769},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.07438141107559204},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pimrc.2017.8292331","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc.2017.8292331","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1957358593","https://openalex.org/W2051696221","https://openalex.org/W2146107742","https://openalex.org/W2171006634","https://openalex.org/W2248823781","https://openalex.org/W2286312980","https://openalex.org/W2295744331","https://openalex.org/W2350167977","https://openalex.org/W2509004749","https://openalex.org/W2518686002","https://openalex.org/W2553698314","https://openalex.org/W2560696315","https://openalex.org/W2566316543","https://openalex.org/W2570305685","https://openalex.org/W2615771123","https://openalex.org/W2625395117","https://openalex.org/W3105108969","https://openalex.org/W4210985493","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2765236478","https://openalex.org/W4360996312","https://openalex.org/W2529506699","https://openalex.org/W2316257850","https://openalex.org/W1747611275","https://openalex.org/W3036307543","https://openalex.org/W2797005565","https://openalex.org/W2460691506","https://openalex.org/W2963815763","https://openalex.org/W1499142163"],"abstract_inverted_index":{"Physical":[0],"layer":[1,24],"security":[2,13,25,37],"has":[3],"emerged":[4],"as":[5,56,102],"a":[6,28,45,57],"promising":[7],"technique":[8],"to":[9,89,105,130,148,157],"safeguard":[10],"the":[11,22,42,50,61,65,72,76,81,85,91,96,103,106,111,118,122,139,145,150],"information":[12,74,79],"in":[14],"wireless":[15,29],"networks.":[16],"In":[17],"this":[18],"paper,":[19],"we":[20,40,83,114],"investigate":[21],"physical":[23],"issue":[26],"for":[27,126,144],"network":[30],"where":[31],"there":[32],"coexist":[33],"multiple":[34],"users":[35,55],"with":[36],"concerns.":[38],"Specifically,":[39],"tackle":[41],"problem":[43],"from":[44],"distributed":[46,140],"perspective":[47],"and":[48,120],"formulate":[49],"secure":[51],"transmissions":[52],"at":[53],"different":[54],"non-cooperative":[58],"game.":[59],"Consider":[60],"practical":[62],"situation":[63],"that":[64],"legitimate":[66],"transmitter":[67],"may":[68],"not":[69],"always":[70],"have":[71],"perfect":[73],"regarding":[75],"channel":[77],"state":[78],"of":[80,117],"eavesdropper,":[82],"adopt":[84],"robust":[86,97,134],"secrecy":[87,135],"rate":[88],"combat":[90],"potential":[92],"worst":[93],"cases.":[94],"Accordingly,":[95],"Nash":[98],"equilibrium":[99,119],"is":[100,142],"employed":[101],"solution":[104],"resource":[107],"competition":[108,147],"game":[109],"among":[110],"users.":[112],"Further,":[113],"analyze":[115],"properties":[116],"derive":[121],"optimal":[123],"transmission":[124],"strategy":[125],"each":[127],"individual":[128],"user":[129],"maximize":[131],"its":[132],"own":[133],"rate,":[136],"following":[137],"which":[138],"algorithm":[141],"proposed":[143],"network-wide":[146],"reach":[149],"equilibrium.":[151],"Finally,":[152],"simulation":[153],"results":[154],"are":[155],"provided":[156],"corroborate":[158],"our":[159],"theoretical":[160],"findings.":[161]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
