Skip to main content

Resource allocation in a MAC with and without security via game theoretic learning

Abstract

In this paper, we study a K-user fading multiple access channel (F-MAC), with and without an eavesdropper (Eve). In the system without Eve, we assume that each user knows only its own channel gain and is completely ignorant about the other users’ channel state. The legitimate receiver sends a short acknowledgement message Acknowledge (ACK) if the message is correctly decoded and a No Acknowledge (NACK) if the message is not correctly decoded. Under these assumptions, we use game theoretic learning setup to make transmitters learn about the power allocation under each state. We use multiplicative weight no-regret algorithm to achieve an ε-coarse correlated equilibrium. We also consider the case where a user can receive other users’ ACK/NACK messages. Now, we can maximize a weighted sum utility and achieve Pareto optimal points. We also obtain Nash bargaining solutions, which are Pareto points that are fairer to the transmitting users. Fairness among users is quantified using Jain’s index.

With Eve, we first assume each user knows only its own channel gain to the receiver as well as to Eve. The receiver decides whether to send an ACK or a NACK to the transmitting user based on the secrecy-rate condition. We use the above developed algorithms to get the equilibrium points. Next, we study the case where each user knows only the distribution of the channel state of Eve. Finally, we also consider the system where the users do not know even the distribution of the Eve’s channel.

1 Introduction

A multiple access channel (MAC) is a basic building block in wireless networks [1]. Also, it models the uplink in a wireless cellular system. Therefore, it has been studied extensively over the years ([24]). More recent, it has also received attention from information theoretic security point of view. In this paper, we study a MAC with and without an eavesdropper using game theoretic techniques. This allows operating in the capacity region which is fair to the users and also provides distributed algorithms with local information at the users. First, we provide a literature survey on this problem.

A general M-user fading MAC is considered in [5] where the receiver has perfect channel state knowledge and broadcasts channel state information of all the users to all the transmitters. The authors prove that the capacity region of a M-user MAC has a polymatroid structure, and they exploit this structural property to find the optimal power and rate control policy. Time-varying additive white Gaussian noise (AWGN) MAC is studied in [6] where it is assumed that only the receiver can track the channel and not the transmitters. In that case, the transmitters allocate fixed powers (which satisfy the average power constraint) and transmit data over the channel.

In [7], the authors propose a distributed power allocation scheme using Game Theory. The authors assume that each user knows the channel gain of other users also, in addition to knowing his own channel gain. The authors prove that the sum-rate point on the capacity region is a Nash equilibrium when the decoding strategy of the receiver is not known to the transmitters. The authors also prove the existence of a Stackelberg equilibrium in which the receiver acts as a leader and the transmitters play a low-level game. Using repeated games, the authors prove that each point on the capacity region of a fading MAC is achieved by some power control policy. In [8], the authors prove stronger results by assuming that each user knows only its own channel gain but knows the distribution of channel gains of the other users. Under these conditions, the authors prove the existence and uniqueness of a Bayesian equilibrium. In an orthogonal multiple access channel, the authors in [9] have used evolutionary game theory to obtain a power allocation scheme, while assuming that each user knows the channel gain of all users via feedback.

With security constraints, a multiple access wiretap channel (MAC-WT) has been well studied in literature. One of the early works is reported in [10] where only one user has confidential messages to be transmitted. The authors have obtained upper bounds on the secrecy-rate regions. In [11], the authors consider a more general setup wherein they consider a discrete memoryless multiple access channel where the transmitting users receive a noisy version of each others’ conversation, and they do not trust each other. In this scenario, the authors have obtained an achievable secrecy-rate region and some outer bounds. In some special cases, this provides secrecy capacity region. A multiple access wiretap channel with feedback has been studied in [12]. An achievable region of a Gaussian multiple access wiretap channel (G-MAC-WT) was obtained in [13] (the secrecy capacity region is still an open problem).

In the above work, weak secrecy criterion is used. A strong secrecy-based achievable rate region for a MAC-WT is reported in [14]. In [15], the authors find secure degrees of freedom for a MAC-WT. More recently in [16], the authors have studied a compound MAC-WT and have characterized inner and outer bounds on the secrecy capacity region. In [17], the authors have studied a fading MAC-WT with full Channel State Information (CSI) of Eve and also when each user knows the channel state of all the users to the receiver but is ignorant of the instantaneous value of channel state to the eavesdropper (only its distribution is known). But knowing other users’ channel gains to the legitimate receiver may also not be practical: it needs a lot of signalling overhead and feedback information. Hence, in this paper, we present a game-theoretic solution to the resource allocation scheme under the hypothesis that each user only knows its own channel gain and is completely ignorant of other users’ channels (not even the distributions).

In interference channel model [18], the authors use learning algorithms to study a stochastic game and learn optimal power allocation policies. The authors use no-regret algorithm to prove the existence of a correlated equilibrium. It is assumed that each user knows power allocation policy of other users, which is not always realistic. The same authors extend this work to the case where each user knows only his own channel gain and does not know the power levels used by other users. The authors prove the existence of a coarse correlated equilibrium using multiplicative weights no-regret algorithm [19].

In this paper, we first consider a fading MAC (F-MAC) without security constraint. We assume each user knows only its individual channel gain (unlike [8], we do not assume that it knows the distributions of channel gains of others). Since the receiver is receiving data from all the users, it is quite practical to assume that the receiver has channel state information of all the transmitting users. Once a user sends a codeword corresponding to a particular message, the receiver sends an ACK if it decodes it successfully, else it sends a NACK. Each user computes a utility based on the ACK/NACK. We use multiplicative weight no-regret algorithm to obtain a coarse correlated equilibrium (CCE). We also assume in the later part of the paper that each user can decode ACK/NACK of other users and hence knows their utility. Then we aim to maximize the sum utility and propose an algorithm to obtain a Pareto point (PP). We also find a Nash bargaining solution (NBS) which provides a Pareto point and ensures fairness among users. We also study the case where users can transmit at multiple rates rather than fixed rates.

Next, we consider a fading MAC-WT where we first assume that each user knows its channel gains to the receiver and Eve. In this case, we repeat all the algorithms which we used for a F-MAC (without security), i.e. multiplicative weight (MW), PP, and NBS, and also consider the multiple rates case. Since it is not practical to assume instantaneous channel gain of the eavesdropper to be known at the transmitter and the receiver, we next consider the case where the receiver only knows the distribution of the Eve’s channel gains. The receiver calculates secrecy outage and sends an ACK/NACK based on that. We again obtain a CCE, PP and a NBS. To the best of our knowledge, this is the first paper which is using game theory on MAC-WT.

Finally, we compare the sum rates obtained via all these algorithms to the global CSI case and also with the sum rate obtained in [17].

The rest of the paper is organized as follows. In Section 2, we describe the channel model for F-MAC without the security constraint and formulate the problem. In Section 2.1, we use multiplicative weight algorithm to obtain a CCE. In Sections 2.2 and 2.3, we obtain Pareto optimal points and NBS. In Section 3, we consider a fading MAC-WT. First, we consider the case when CSI of Eve is available at the transmitters. In Section 3.1, we consider the case when CSI of Eve is not available at the transmitters (only its distribution is known) and obtain a CCE, a NBS and a PP for both the scenarios. Section 4 generalizes these results to multirate scenario. In Section 5, we compare the various schemes on an example. Finally, in Section 6, we conclude the paper.

2 Fading MAC: without security constraint

A time-slotted F-MAC channel is considered with K-users who have messages to be transmitted to a receiver. Let \(\{\widetilde {H}_{i}(t)\}\) be the channel gain process from user i to the receiver at time t. It includes path loss, fading and shadowing. User i transmits \(\widetilde {X}_{i}(t)\) and the receiver receives

$$ \widetilde{Y}(t)=\sum\limits_{i=1}^{K}\widetilde{H}_{i}(t)\widetilde{X}_{i}(t)+\widetilde{\eta}_{b}(t), $$
(1)

at time t, where \(\widetilde {\eta }_{b}(t)\) is white Gaussian noise with mean zero and variance \(\sigma _{b}^{2}\), denoted by \(\mathcal {N}\left (0,\sigma _{b}^{2}\right)\), an d independent of \(\{\widetilde {X}_{i}(t)\}\) and \(\{\tilde {H}_{i}(t)\}\). We transform the input-output relationship of F-MAC in (1) by appropriate scaling:

$$\begin{array}{*{20}l} Y(t)&=\sum\limits_{i=1}^{K}\widehat{H}_{i}(t)X_{i}(t)+\eta_{b}(t), \end{array} $$
(2)

where

  • \(X(t)=\frac {1}{\sigma _{b}}\widetilde {X}(t)\)

  • \(\widehat {H}(t)=\frac {1}{\sigma _{b}}\widetilde {H}(t)\)

  • \(\eta _{b}=\frac {1}{\sigma _{b}}\widetilde {\eta }(t)\), where now \(\eta (t) \sim \mathcal {N}(0,1)\)

Let \(H_{i}(t)\triangleq \left |\widehat {H}_{i}(t)\right |^{2}\). The channel gains are assumed discrete valued, in the sets \(\mathcal {H}_{i} \triangleq \{h_{i}^{(1)}, \ldots, h_{i}^{(M)}\}\), where M is the number of possible states. Also, {H i (t),t≥0} are independent and identically distributed (iid) sequences with distributions \(\left \{\alpha _{i}^{(1)}, \ldots, \alpha _{i}^{(M)}\right \}\). To transmit any codeword, user i can choose any power level from the set \(\mathcal {P}_{i} \triangleq \left \{P_{i}^{(1)},\ldots, P_{i}^{(M)}\right \}\). Also, user i has average power constraint \(\overline {P}_{i}\).

Assumption of discrete channel states Before we describe our game model, we first clarify our assumptions of discrete channel states. The assumption that the channel states take values from discrete sets is based on two observations: (1) In practice, the channel gains are estimated by transmitting known pilots from the transmitter to receiver (a base station in case of uplink scenario), and then the receiver feeds back the estimated value of channel gains up to some precision level. Hence, if n bits are used to represent the value of channel gains (as in digital communication, the information is represented by a finite number of bits), the total possible number of channel states is 2n [8]. (2) The continuous state of a channel (e.g. Rayleigh distribution) can be quantized to obtain any level of accuracy by a finite set. Also, algorithms in game theory require a finite set. This finite CSI is a commonly made assumption in literature [8, 20, 21].

User i transmits at a fixed rate r i (to be generalized later) via a usual point to point channel encoder. If the receiver successfully decodes a message, it sends an ACK to that particular user. Otherwise, it sends a NACK. We assume that the NACK and ACK are transmitted at low rates so that these can be received with negligible error at the intended transmitter. The goal of each user is to maximize its probability of successful transmission.

Each user i is assumed to know its own channel gain H i (t) at time t. Since the receiver can estimate the channel gain of all the users (either by receiving known pilots or by using initial data received), the receiver can use successive cancellation decoding strategy to decode all the users.

Let π(i) be the user which has the ith highest channel gain (in case of a tie, we arbitrarily order them). The decoder first decodes the user π(1) with the best channel gain first, taking the transmissions from the other users as noise. Then it removes it from the received signal Y(t) and then decodes the next best user, taking the other users as noise and so on. Let

$$\begin{array}{*{20}l} C_{b}&\left(P_{\pi(i)},P_{-\pi(i)},H_{\pi(i)}\right) \\ &\triangleq \frac{1}{2}\log\left(1+\frac{H_{\pi(i)}P_{\pi(i)}(H_{\pi(i)})}{1+{\sum\nolimits}_{j=i+1}^{K} H_{\pi(j)}P_{\pi(j)}(H_{\pi(j)})}\right). \end{array} $$
(3)

Then the receiver will send an ACK to the transmitting user π(i) if

$$\begin{array}{*{20}l} r_{\pi(i)} &\leq C_{b}\left(P_{\pi(i)},H_{\pi(i)}\right). \end{array} $$
(4)

The above constraint follows from the successive cancellation decoding scheme chosen. Each user i takes action (allocating power) \(P_{i}^{(j)}\) when its channel gain is \(H_{i}^{(j)}\) to transmit at its rate. We define feasible action space for user i as

$$ \begin{aligned} \!\!\mathcal{P}_{i}= \left\{{\vphantom{\sum\limits_{j=1}^{M}}}\mathbf{P}_{i}=\left(P_{i}^{(1)},\ldots,P_{i}^{(M)}\right): P_{i}^{(k)}\in \left\{p_{i}^{(1)},\ldots,p_{i}^{(M)}\right\}, \right. &\\ &\left. \qquad \qquad \qquad \sum\limits_{j=1}^{M} \alpha_{i}(j)P_{i}^{(j)}\leq \overline{P}_{i} \right\}. \end{aligned} $$

We define \(\left |\mathcal {P}_{i}\right | \triangleq M_{i}\) (where |A| denotes the cardinality of set A) and index the elements of set \(\mathcal {P}_{i}\) as {1,…,M i }. Let a i denotes a feasible power policy of user i, i.e. a i takes a value from \(\mathcal {P}_{i}\), and a i (h) is the power level used by user i when its channel gain is \(h\in \mathcal {H}\) under policy a i . The action space of K-users is denoted as

$$ \mathcal{P}=\prod_{i=1}^{K}\mathcal{P}_{i}, $$
(5)

and the action space of users, other than user i, is

$$ \mathcal{P}_{-i}=\prod_{j=1, j\neq i}^{K}\mathcal{P}_{j}, $$
(6)

where \(\prod _{i=1}^{K}A_{i}=A_{1} \times A_{2} \ldots \times A_{K}\). The action profile of all the users is denoted as a=(a 1,…,a K ). A probability distribution ψ(i) on \(\mathcal {P}_{i}\) is called a strategy of user i. When a certain action is chosen with probability one, it is called a pure strategy. The objective of each transmitter is to maximize its probability of successful transmission. Since the actions chosen by one user may influence the outcome for the other users in terms of probability of successful transmission, this can be formulated as a stochastic game. Let, for user i, the channel gain in time slot t be H i (t) and the action profile chosen is \(a_{i}^{(t)}\). Also, let \(a^{(t)}=\left (a_{1}^{(t)},\ldots,a_{K}^{(t)}\right)\) and H(t)=(H 1(t),…,H K (t)). We define the reward of user i,

$$ \omega_{i}^{(t)}\left(a^{(t)},H(t)\right)= \left\{\begin{array}{ll} 1,~\text{if user}~i~\text{receives an ACK}, \\ 0,~\text{otherwise}. \end{array}\right. $$
(7)

We are interested in the time average of the reward process, for a=(a (1), a (2),…),

$$ \nu_{i}\left(a \right)\triangleq \limsup_{T\rightarrow \infty}\frac{1}{T}\sum\limits_{t=1}^{T} \omega_{i}^{(t)}\left(a^{(t)},H(t)\right). $$
(8)

We will restrict ourselves to Markov stationary policies, i.e. action of user i at time t depends only on its current state H i (t). Then {ω i (a (t),H(t))} are iid across time t. Hence, by strong law of large numbers, the average reward \(\nu _{i}(a)=\mathrm {E}\left [\omega _{i}^{(t)}\left (a^{(t)},H(t) \right)\right ]\) is the same as the probability of successful transmission. In terms of a mixed strategy ψ=(ψ i ,ψ i ), the average reward is

$$\begin{array}{*{20}l} \nu_{i}&\left(\psi_{i},\psi_{-i}\right) =\sum\limits_{a\in \mathcal{P}}\left[\prod_{j=1}^{K} \psi_{j}\left(a_{j}\right)\right]\nu_{i}\left(a_{i},a_{-i}\right). \end{array} $$
(9)

Hence, this stochastic game can be modelled as a one-shot game in which player i maximizes its utility (9). In the rest of the paper, we develop algorithms to compute equilibrium points for this game.

2.1 Multiplicative weight algorithm for learning CCE

In this section, we use MW algorithm [22] to compute coarse correlated equilibrium (CCE). The cost of each user can be defined as \(\mathfrak {C}_{i}((a_{i},a_{-i})\triangleq -\nu _{i}(a_{i},a_{-i})\). A coarse correlated equilibrium is defined as follows:

Definition 2.1

A joint distribution ψ on \(\mathcal {P}\)is called a CCE if

$$ \mathsf{E}_{a \sim \psi}\left[\mathfrak{C}_{i}(a)\right]\leq \mathsf{E}_{a \sim \psi}\left[\mathfrak{C}_{i}\left(\hat{a}_{i},a_{-i}\right)\right], $$
(10)

for all \(\hat {a}_{i}\) and for all users i, when the expectation on the RHS is with respect to the joint distribution with \(a_{i}=\hat {a}_{i}\). A joint distribution ψ on \(\mathcal {P}\)is called an ε-CCE if

$$ \mathsf{E}_{a \sim \psi}\left[\mathfrak{C}_{i}(a)\right]\leq \mathsf{E}_{a \sim \psi}\left[\mathfrak{C}_{i}\left(\hat{a}_{i},a_{-i}\right)\right] {+}~\epsilon, $$
(11)

for all \(\hat {a}_{i}\) and for all users i.

A coarse correlated equilibrium exists for any finite game unlike a Nash equilibrium. A CCE is a generalization of a mixed strategy. A Nash equilibrium and every mixed strategy Nash equilibrium is also a CCE. We now define external regret that plays a key role in the MW algorithm.

Definition 2.2

Arora et al. [22] The external regret of user i given the blackaction sequence \(a_{i}^{(1)}, a_{i}^{(2)}, \ldots,a_{i}^{(T)}\) with respect to an action a i is

$$ \begin{aligned} \mathcal{R}(a_{i}) \triangleq &\\ &\!\!\!\frac{1}{T}\sum\limits_{t=1}^{T} \mathsf{E}_{a_{-i\sim \psi_{-i}}} \left[\mathfrak{C}_{i}^{(t)}\left(a_{i}^{(t)},a_{-i}\right) -\mathfrak{C}_{i}^{(t)}\!\!\left(a_{i},a_{-i}\right) \right]. \end{aligned} $$
(12)

The MW algorithm is a no-regret algorithm, meaning that the users update their strategies based on the received cost such that the external regret converges to zero ([22, 23]). The MW algorithm is presented in Algorithm 1.

2.1.1 Explanation of Algorithm 1

We provide a brief explanation of Algorithm 1. In each iteration t, a i is the action chosen by user i with probability \(\Phi _{i}^{t}(a_{i})=\frac {w_{i}^{(t)}(a_{i})}{\sum _{a_{i}}w_{i}^{(t)}(a_{i})}\), and then it pays an average cost \(c_{i}^{(t)}(a_{i})\). Based on the cost incurred, the users update their weight as \(w_{i}^{(t+1)}(a_{i})=w_{i}^{(t)}(a_{i})[1-\epsilon ^{\prime }]^{c_{i}^{(t)}(a_{i})}\). Number of iterations needed to get an ε-approximate point is \(T>2^{(\ln (n)/\epsilon ^{2})-1}\), as given by Theorem 2.1 below.

Theorem 2.1

(Remark 2.3 of chapter 17 from [24]) After T iterations, where \(T>2^{\frac {\ln n}{\epsilon ^{2}}-1}\), of no-regret dynamics (MW algorithm), every player of a cost minimization game has regret (12) at most ε for each of its strategies. Let \(\psi ^{(t)}=\prod _{i=1}^{K} \Phi _{i}^{(t)}\) denote the outcome distribution at time t and \(\psi =\frac {1}{T}\sum _{t=1}^{T} \psi ^{(t)}\), the time averaged history of these distributions. Then ψ is an ε-coarse correlated equilibrium.

2.2 Pareto optimal points

In a wireless environment, it is realistic to assume that the ACK/NACK bits sent to a particular user can be successfully decoded by all the other users also (because these are sent at a low rate using robust codes). In that case, all users can learn about the utility of each other at time t. We show in this section that this information can be used to get a socially optimal Pareto point which generally provides a better performance than a CCE.

Definition 2.3

An action profile \(a\in \mathcal {P}\) is a Pareto point if there does not exist another profile \(\tilde {a}\) such that \(\nu _{i}(\tilde {a})\geq \nu _{i}(a), \forall ~i\in \mathcal {K}\) and \(\nu _{j}(\tilde {a})>\nu _{i}(a)\) for some ji.

Define

$$ \Omega(a)=\sum\limits_{i=1}^{K} \gamma_{i} \nu_{i}(a), $$
(13)

for fixed γ i ≥0, i=1,…,K. Then a solution to the optimization problem

$$\begin{array}{*{20}l} \max_{a} & \: \Omega(a), \,\,\text{subject to} & a\in \mathcal{P}, \end{array} $$

is a Pareto point [25].

In Algorithm 2 below, we provide a distributed algorithm in which the users update their strategies in a sequential fashion so as to improve Ω(a). This distributed algorithm is the variation of a heuristic stochastic local search algorithm. In this algorithm, each user chooses a random action and uses it for a fixed number of time slots (say T). Then each user finds weighted sum of the utilities (since each user receives ACK/NACK of other users, it can calculate this quantity). After T slots, a user experiments randomly with probability say, ρ, and then with some probability updates the action profile according to its channel state. Now, one user uses this action for next T slots and the other users use the previous action. Based on the weighted sum of utilities, the particular user defines a benchmark. The details of algorithm in the scenario of interference channel can be found in [18].

2.3 Nash bargaining solution

The Pareto points obtained in Section 4 are socially optimal but may not be fair to all users: some users may get much more rates than others. To obtain fair Pareto points, we use the concept of Nash Bargaining Solution (NBS) [26].

In NBS, we need to specify a disagreement strategy Δ and the corresponding outcome δ=(δ 1,…,δ K ) that specifies the utility of each user that it receives by playing the disagreement strategy whenever there is no improvement over this utility in playing the bargaining outcome. Thus, each user i is guaranteed with δ i if it is feasible. We define the set of all possible utilities as

$$ \mathcal{V}=\left\{\left(\nu_{1}(a),\ldots,\nu_{K}(a)\right): a\in \mathcal{P}\right\}. $$
(14)

This bargaining problem is denoted by \((\mathcal {V},\delta)\).

The aim of the bargaining problem is to find a bargaining solution which is Pareto optimal and satisfies the axioms of symmetry, invariance and independence of irrelevant alternatives [27].

Theorem 2.2

Nash[26] There exists a unique bargaining solution (provided the feasible region is non-empty) and it is given by the solution of the optimization problem:

$$\begin{array}{*{20}l} &\max ~\prod_{i=1}^{K}(\nu_{i}-\delta_{i}) \\ &\mathsf{subject~ to}~ \nu_{i}\geq \delta_{i}, i=1,\ldots,K,~(\nu_{1},\ldots,\nu_{K})\in\mathcal{V}.\square \end{array} $$
(15)

A crucial part of a Nash bargaining problem is to choose the disagreement outcome. It is common to consider an equilibrium point as a disagreement outcome. In our problem, we can consider the utility vector at a correlated equilibrium as the disagreement outcome. We can also choose δ i =0 for each i. If we choose the disagreement outcome to be a correlated equilibrium, each user needs to evaluate a correlated equilibrium first before running the algorithm to find a solution of (15), which requires more computations. Rather, we obtain the disagreement outcome for our problem by the following procedure

  • Each user chooses an action that gives higher power level to the channel state that has higher probability of occurrence. In other words, among the set of feasible actions, choose a subset of pure strategies that gives the highest power level to the channel state with highest probability of occurrence. We shrink the subset by considering the actions that give higher power level to the second frequently occurring channel state, and we repeat this process until we get a single strategy.

  • If all the channel states occur with equal probability, we follow the above procedure by considering the value of the channel gain instead of the probabilities of occurrence of the channel gains.

Let a i denote the pure strategy chosen by the ith user, and let T δ be the number of time slots over which this strategy is used. Then the disagreement value for user i is

$$ \delta_{i}=\frac{1}{T_{\delta}}\sum\limits_{t=1}^{T_{\delta}}\omega_{i}^{(t)}\left(a_{i},H_{i}(t)\right). $$
(16)

We modify Algorithm 2 to obtain a distributed solution of (15), with the objective function defined as

$$ \Omega(a)=\prod_{i=1}^{K}\left(\nu_{i}(a)-\delta_{i}\right). $$
(17)

Hence, the algorithm for NBS is the following Algorithm 3.

From [26], if the set of utilities \(\mathcal {V}\) is convex, then a Nash bargaining solution is also proportionally fair. In our problem, \(\mathcal {V}\) is convex, and hence, the solution is proportionally fair also.

2.3.1 Fairness comparison via Jain’s index

We use Jain’s index to quantify the fairness in the allocation of rates to multiple users [28]. Let \(\mathbf {r}\triangleq (r_{1},\ldots,r_{K})\) be the rates allocated to the K-users in the F-MAC via the algorithms described in Sections 2.1, 2.3 and 2.2. Jain’s index is defined as [28]

$$\begin{array}{*{20}l} \mathcal{J(\mathbf{r})}=\frac{\left[{\sum\nolimits}_{i=1}^{K}r_{i}\right]^{2}}{K{\sum\nolimits}_{i=1}^{K}r_{i}^{2}} \end{array} $$
(18)

It can be easily shown that \(1/K \leq \mathcal {J}(\mathbf {r})\leq 1\). An allocation policy is fair if \(\mathcal {J}(\mathbf {r})\) is close to 1, and policy is called unfair if it is close to 1/K.

3 Fading MAC: with security constraints

In this section, we consider a time-slotted fading MAC-WT channel with K-users who have messages to transmit confidentially to a legitimate receiver (Bob), while a passive eavesdropper (Eve) is listening to the conversation and trying to decode. The notation corresponding to Bob is same as in the previous sections. Here, we define the notation for the channel to Eve. Let \(\{\widetilde {G}_{i}(t)\}\) be the channel gain process from user i to Eve (Table 1). At time t, Eve receives

$$\begin{array}{*{20}l} \widetilde{Z}(t)=\sum\limits_{i=1}^{K}\widetilde{G}_{i}(t)\widetilde{X}_{i}(t)+\widetilde{\eta}_{e}(t), \end{array} $$
(19)
Table 1 Nomenclature

where \(\widetilde {\eta }_{e}(t)\) is white Gaussian noise, with distribution \(\mathcal {N}(0,\sigma _{e}^{2})\) and independent of \(\{\widetilde {\eta }_{b}(t)\}\) and the channel gain processes and \(\{\widetilde {X}_{i}(t)\}\).

We transform this relation in the same way as was done in transforming (1) to (2). We get

$$\begin{array}{*{20}l} Z(t)=\sum\limits_{i=1}^{K}\widehat{G}_{i}(t)X_{i}(t)+\eta_{e}(t), \end{array} $$
(20)

where \(X(t)=\widetilde {X}(t)/\sigma _{e}\), \(\widehat {G}(t)=\widetilde {G}(t)/\sigma _{e}\) and \(\eta _{e}(t)=\widetilde {\eta }_{e}(t)/\sigma _{e}\).

We define \(G_{i}(t)\triangleq \left |\widehat {G}_{i}(t)\right |^{2}\). The channel gains of Eves’ channels are assumed discrete valued, in the set \(\mathcal {G}_{i} \triangleq \left \{g_{i}^{(1)},\ldots,g_{i}^{(M)}\right \}\). Also, {G i (t),t≥0} are iid independent of each other and also of the sequences {H i (t)}, with distribution \(\left \{\beta _{i}^{(1)},\ldots,\beta _{i}^{(M)}\right \}\) respectively. User i transmits at a fixed rate r i via wiretap coding. If the receiver successfully decodes (see details below in this subsection), it sends an ACK to that particular user. Otherwise, it sends a NACK. We assume that the NACK and ACK are transmitted at low rates so that these can be received with negligible error at the intended transmitter. The goal of each user is to maximize the probability of successful transmission.

Each user i is assumed to know its own channel gains H i (t) and G i (t) at time t. Since the receiver can estimate the channel gain of all the users (either by receiving known pilots or by using initial data received), the receiver can use successive decoding strategy to decode all the users.

We define

$$ \begin{aligned} &C_{e}\left(P_{\pi(i)},P_{-\pi(i)},H_{\pi(i)},G_{\pi(i)}\right) &\\ &\quad\triangleq \frac{1}{2}\log\left(1+\frac{G_{\pi(i)}P_{\pi(i)}\left(H_{\pi(i)},G_{\pi(i)}\right)}{1+{\sum\nolimits}_{j\neq i}^{K} G_{\pi(j)}P_{\pi(j)}\left(H_{\pi(j)},G_{\pi(j)}\right)}\right) \end{aligned} $$
(21)

Then the receiver will send an ACK to the transmitting user π(i) if

$$ r_{\pi(i)} \leq \left(C_{b}(P_{\pi(i)},H_{\pi(i)},G_{\pi(i)})-C_{e}(P_{\pi(i)},H_{\pi(i)},G_{\pi(i)})\right)^{+}, \\ $$
(22)

otherwise a NACK, where (a)+= max(0,a). The above constraint follows from the achievable secrecy-rate region of a Gaussian MAC-WT as discussed in [13]. Each user i takes action (allocating power) \(P_{i}^{(j)}\) when its channel gains are \(H_{i}^{(j)}\) and \(G_{i}^{(j)}\) to transmit at its rate.

Now, we can use all the algorithms of Sections 2.1, 2.2 and 2.3 to obtain a CCE, PP and NBS.

3.1 Fading MAC-WT with individual main channel CSI only

We consider now the case where the users as well as the receiver do not know Eve’s channel gain, but only its distribution. Also, the transmitters do not know even the distribution of Eve’s channel gains. In this scenario, the natural metric for the receiver to decide whether to send an ACK or a NACK will be outage based. First, we define the secrecy outage, when H 1,…,H K are given, as

$$\begin{array}{*{20}l} & P_{O}^{S}(\pi(i))\triangleq \\ & Pr\left\{r_{\pi(i)}> \log\left(1+ \frac{H_{\pi(i)}P_{\pi(i)}\left(H_{\pi(i)}\right)}{1+{\sum\nolimits}_{j=i+1}^{K} H_{\pi(j)}P_{\pi(j)}\left(H_{\pi(i)}\right)}\right) \right. \\ & \left. -\log\left(1+ \frac{G_{\pi(i)}P_{\pi(i)}\left(H_{\pi(i)}\right)}{1+{\sum\nolimits}_{j\neq i}^{K} G_{\pi(j)}P_{\pi(j)}\left(H_{\pi(j)}\right)}\right)\right\}, \end{array} $$
(23)

where probability is over the channel gains G π(i). The receiver sends an ACK if \(P_{o}^{S}<\epsilon \), else the receiver sends a NACK. Hence, we define utility of user i as

where \(\mathbbm {1}_{\{C\}}\) is an indicator function. With these utility functions, we can use the algorithms provided in Sections 2.1, 2.2 and 2.3.

3.2 Avoiding security breach

In the previous sections, we assumed that when the legitimate receiver cannot securely decode the message, it sends a NACK. This is useful for the transmitters to learn the equilibrium point. But the messages transmitted during those slots may be decoded by Eve (with probability >ε in Section 3.1). Now, we modify the system a little so as to use the above coding scheme but mitigate this secrecy loss also.

We assume that each slot is comprised of two subslots. The channel gain does not change during the whole slot. In the first part of the slot, we transmit a dummy (random) message. If Bob sends an ACK to user i, then the actual confidential message can be transmitted by user i in the second subslot at the same power. If Bob sends a NACK, then user i should not use the second subslot. We can make the second subslot much larger than the first subslot so that the rate loss due to the dummy messages is minimal.

4 Transmission at multiple rates

Till now, we have considered the case where the users are transmitting at fixed rates. Now, we consider the more realistic scenario where the users can transmit at different rates, depending on their channel gains. We assume that user i can choose any rate from the rate set \(\mathcal {R}_{i}=\left \{r_{i}^{(1)},\ldots, r_{i}^{(M_{R})}\right \}\). We now define a new strategy set such that choosing the rate of transmission becomes part of the action taken along with the power chosen. Hence, we define the modified strategy set for F-MAC as

$$ \begin{aligned} &\mathcal{A}_{i}\triangleq \left\{{\vphantom{\sum\limits_{j=1}^{M}}}\left(r_{i},P_{i}^{(1)},\ldots,P_{i}^{(M)}\right): \right. &\\ &\quad\left. r_{i} \in \mathcal{R}_{i}, P_{i}^{(k)}\in \left\{p_{i}^{(1)},\ldots,p_{i}^{(M)}\right\}, \sum\limits_{j=1}^{M} \alpha_{i}^{(j)}P_{i}^{(j)}\leq \overline{P}_{i} \right\} \end{aligned} $$
(25)

and for F-MAC-WT as

$$ \begin{aligned} &\mathcal{A}_{i}\triangleq \left\{{\vphantom{\sum\limits_{j=1}^{M}}}\left(r_{i},P_{i}^{(1)},\ldots,P_{i}^{(M)}\right): \right. &\\ &\quad \left.r_{i}\! \in\!\! \mathcal{R}_{i}, P_{i}^{(k)}\!\!\in\!\! \left\{p_{i}^{(1)},\!\ldots,p_{i}^{(M)}\!\right\}\!, \sum\limits_{j=1}^{M} \alpha_{i}^{(j)}\beta_{i}^{(j)}P_{i}^{(j)}\!\!\leq \overline{P}_{i} \right\}. \end{aligned} $$
(26)

We can now use all the existing algorithms to compute CCE, PP and NBS.

5 Numerical results

In this section, we provide several examples using the algorithms developed in this paper. We divide our examples into two parts: (1) F-MAC (without security constraint) and (2) F-MAC-WT.

We first discuss the quantization of channel gains from various continuous fading distributions.

5.1 General distribution

Suppose that we want to quantize the channel state to n states, such that the quantized channel state value takes values from a known probability mass function {α 1,α 2,…,α n }. Let \(\widehat {H}_{1}, \ldots, \widehat {H}_{n}\) denote the quantized values of channel state H. We can compute these from the following equations:

$$\begin{array}{*{20}l} \int_{\widehat{H}_{i-1}}^{\widehat{H}_{i}}f_{H}(h)dh&=\alpha_{i},~\text{for }i=2,3,\ldots,n-1 \end{array} $$
(27)

Now, the required values for channel gain coefficients are

$$\begin{array}{*{20}l} H_{i}&=\int_{\widehat{H}_{i-1}}^{\widehat{H}_{i}} |h|\, f_{H}(h)dh,~i=2,3,\ldots,n-1, \end{array} $$
(28)
$$\begin{array}{*{20}l} H_{n}&=\int_{\widehat{H}_{n-1}}^{\infty} |h|\, f_{H}(h)dh. \end{array} $$
(29)

By taking n large enough, we can have the solution obtained by quantization, accurate to any degree. For Rayleigh distribution,

$$ f_{H}(h)=\frac{h}{\mu}e^{-h^{2}/2\mu},~h\geq 0 $$
(30)

where μ is the mean of the fading process. For lognormal shadowing,

$$\begin{array}{*{20}l} f_{H}(h)=\frac{1}{h\sigma \sqrt{2\pi}}e^{-\frac{\ln(x)-\mu}{2\sigma^{2}}} \end{array} $$
(31)

with mean e μ and variance \(e^{\mu +\sigma ^{2}/2}\).

5.1.1 F-MAC (without security constraint)

We first consider a fading MAC where we take \(\mathcal {H}=\{0.1,0.5,0.9\}\) chosen with uniform distribution over the set, for all users, and we assume that a user can choose any power from the power set {1,5,…,100}. In this scenario, we first consider the case when users are transmitting at fixed rate, 1 bit/sec. In this scenario, we compare the sum rate obtained by our three algorithms, i.e. Algorithm 1 for CCE, Algorithm 2 for PP and Algorithm 3 for NBS (see Fig. 1). We note that NBS and PP are better than CCE in terms of sum rate. Also, regarding the fairness among the users, we see from Fig. 2 that NBS is fairer than PP, since the Jain’s index of the rate pair for NBS is close to 1 and that of PP is away from 1. From this, we conclude that NBS is the best scheme to use, as it achieves a much higher sum rate than CCE and each user individually gets better rates than via CCE and PP.

Fig. 1
figure 1

Sum-rate comparison: CCE vs NBS vs PP (F-MAC, fixed rate case)

Fig. 2
figure 2

Fairness comparison for FMAC fixed rate

Next, we consider a more practical case where users can choose transmission rates from the set {0.4, 0.8, 1, 1.5, 2, 2.3}. Here also, we compare the sum rate obtained via CCE, PP and NBS. To get the result for CCE, all users use Algorithm 1. For finding Pareto points, all users use Algorithm 2, with the weights γ i =1. For obtaining Nash Bargaining solution, all users use Algorithm 3. As expected, we observe that PP and NBS give much better rates than CCE (Fig. 3). From Fig. 4, we also observe that here also, NBS is fairer among the three algorithms.

Fig. 3
figure 3

Sum-rate comparison for FMAC: multiple transmission rates

Fig. 4
figure 4

Fairness comparison for F-MAC: multiple transmission rates

Finally, to compare the performance with the existing schemes, we take an example where we assume \(\mathcal {H}=\{0.1,~0.9\}\) and the power set is {1,5,…,100}. Also, as in the previous example, the users can choose transmission rates from the set {0.4, 0.8, 1, 1.5, 2, 2.3}. We compare our algorithms (viz. CCE, PP and NBS) with the case where global knowledge of CSI is assumed. We also compare our schemes with that of [8], where each user knows its own channel and distribution of other users’ channel gains. The authors in [8] posed the problem of power allocation as a Bayesian game and obtained a Bayesian equilibrium. We observe that our PP and NBS give sum rates close to this scheme (Fig. 5).

Fig. 5
figure 5

F-MAC: sum-rate comparison for our scheme vs existing schemes

We also observe the following behaviours of the three schemes (Figs. 2 and 4). At any given SNR, the three schemes allocate resources (power, rate) to each user. In CCE, each user optimizes its own objective function (here probability of successful transmission), without worrying about the other users. Hence, Jain’s index will be sometimes fair and sometimes unfair. Thus, there will be fluctuations. In Pareto policy, the sum throughput of all the users is optimized. But the allocation of resources to individual users can often be unfair. This is a known weakness of Pareto points. Hence, Jain’s index is above 0.5. Nash Bargaining is designed to be a fairer scheme. Hence, Jain’s index for it is close to 1. At any given SNR, we expect it to provide a fairer solution than the CCE and a Pareto point.

5.1.2 F-MAC-WT (with security constraint)

Next, we consider a 2-user fading MAC-WT with full CSI. We let \(\mathcal {H}=\{0.1,0.5,0.9\}\) and \(\mathcal {G}=\{0.05,0.4,0.8\}\) for both the users. We assume that the probability with which any state can occur is equal, i.e. \(\alpha _{i}^{(j)}=\beta _{i}^{(j)}=1/3\) for i=1,2 and j=1,2,3. A user can choose any power from the power set {1,5,…,100}. We first consider a fixed rate scenario. Each user knows its channel gain to Bob and Eve. We again use Algorithm 1 for obtaining CCE, Algorithm 2 for PP and Algorithm 3 for NBS. We observe that the PP and the NBS obtain much higher sum rate than the CCE (Fig. 6). Also, we observe that the NBS is fairer than the PP (Fig. 7), by observing that Jains’ index is close to 1 in NBS and away from a in case of PP.

Fig. 6
figure 6

Sum rate with security constraints: comparison of CCE, PP and NBS at fixed transmission rate (with CSI of Eve)

Fig. 7
figure 7

Fairness of CCE, PP and NBS at fixed transmission rate (with CSI of Eve)

Next, we consider the case where the users do not have CSI of Eve available but only the distribution is known, which is more realistic as Eve is passive. Here also, with modified utility, we compute CCE, PP and NBS via Algorithms 1, 2 and 3, respectively. As in previous cases, the same trend is observed, i.e. NBS and PP give better rates than CCE and NBS is fairer than PP (Figs. 8 and 9).

Fig. 8
figure 8

Comparison of CCE, PP and NBS for F-MAC-WT, with no CSI of Eve (fixed transmission rate)

Fig. 9
figure 9

Comparing fairness of CCE, PP and NBS for F-MAC-WT, with no CSI of Eve (fixed transmission rate)

Next, we consider the case when users have CSI of Eve available to them and can transmit at multiple rates choosing from {0.1, 0.2, 0.3, 0.4, 0.5, 0.6}. From Fig. 10, we note that PP and NBS give better secrecy sum rates, and from Fig. 11, we observe fairness of NBS.

Fig. 10
figure 10

FMAC-WT: sum rate comparison of CCE, PP and NBS for multiple rate case (with CSI of Eve)

Fig. 11
figure 11

F-MAC-WT: fairness comparison of CCE, PP and NBS for multiple rate case (with CSI of Eve)

We take one more example with \(\mathcal {H}=\{0.1,.9\}\) and \(\mathcal {G}=\{0.05,0.8\}\). We compare the NBS and the PP with the case when CSI of the transmitters is known globally but only the distribution of Eve’s channel gains are known at all transmitters. This case is studied in [17] for continuous channel states and a centralized solution which maximizes the sum rate is found. We also find the Bayesian equilibrium (BE) for the case when each user knows the distribution of all the channel gains to Eve, as done in [8] for F-MAC without security constraints. Here, we observe that the NBS and the PP outperform BE at high SNR (Fig. 12). At low SNR, the sum rate for the NBS and the PP are quite close to that of BE. We also observe here that the CCE performs the worst.

Fig. 12
figure 12

F-MAC-WT: Comparison with existing schemes

6 Conclusions

In this paper, a K-user fading multiple access channel with and without security constraints is studied. First, we consider a F-MAC without the security constraints. Under the assumption of individual CSI of users, we propose the problem of power allocation as a stochastic game when the receiver sends an ACK or a NACK depending on whether it was able to decode the message or not. We have used multiplicative weight no-regret algorithm to obtain a coarse correlated equilibrium (CCE). Then we consider the case when the users can decode ACK/NACK of each other. In this scenario, we provide an algorithm to maximize the weighted sum utility of all the users and obtain a Pareto optimal point. PP is socially optimal but may be unfair to individual users. Next, we consider the case where the users can cooperate with each other so as to disagree with the policy which will be unfair to individual user. We then obtain a Nash bargaining solution, which in addition to being Pareto optimal is also fair to each user. We use Jain’s index to quantify the fairness between different algorithms.

Next, we study a K-user fading multiple access wiretap channel with CSI of Eve available to the users. We use the previous algorithms to obtain a CCE, PP and NBS. Next, we consider the case where each user does not know the CSI of Eve but only its distribution. In that case, we use secrecy outage as the criterion for the receiver to send an ACK or a NACK. Here also, we use the previous algorithms to obtain a CCE, PP or NBS. Finally, we show that our algorithms can be extended to the case where a user can transmit at different rates. At the end, we provide a few examples to compute different solutions and compare them under different CSI scenarios.

References

  1. TM Cover, JA Thomas, Elements of information theory (John Wiley & Sons, 2012).

  2. R Ahlswede, in Second International Symposium on Information Theory: Tsahkadsor, Armenia, USSR, Sept. 2–8, 1971. Multi-way communication channels, (1973).

  3. HH-J Liao, Multiple access channels. Technical report, DTIC Document (1972).

  4. A El Gamal, Y-H Kim, Network information theory (Cambridge University Press, 2011).

  5. DNC Tse, SV Hanly, Multiaccess fading channels. i. polymatroid structure, optimal resource allocation and throughput capacities. Inform. Theory, IEEE Trans. 44(7), 2796–2815 (1998).

    Article  MathSciNet  MATH  Google Scholar 

  6. S Shamai, AD Wyner, Information-theoretic considerations for symmetric, cellular, multiple-access fading channels. i. Inform. Theory, IEEE Trans. 43(6), 1877–1894 (1997).

    Article  MathSciNet  MATH  Google Scholar 

  7. L Lai, H El Gamal, The water-filling game in fading multiple-access channels. Inform. Theory, IEEE Trans. 54(5), 2110–2122 (2008).

    Article  MathSciNet  MATH  Google Scholar 

  8. G He, M Debbah, E Altman, A Bayesian game-theoretic approach for distributed resource allocation in fading multiple access channels. EURASIP J. Wirel. Commun. Netw. 2010:, 8 (2010).

    Google Scholar 

  9. P Mertikopoulos, EV Belmega, AL Moustakas, S Lasaulce, Distributed learning policies for power allocation in multiple access channels. Sel. Areas Commun. IEEE J. 30(1), 96–106 (2012).

    Article  Google Scholar 

  10. R Liu, I Maric, RD Yates, P Spasojevic, in Information Theory, 2006 IEEE International Symposium On. The discrete memoryless multiple access channel with confidential messages, (2006), pp. 957–961. doi:10.1109/ISIT.2006.261801.

  11. Y Liang, HV Poor, Multiple-access channels with confidential messages. Inform. Theory, IEEE Trans. 54(3), 976–1002 (2008).

    Article  MathSciNet  MATH  Google Scholar 

  12. X Tang, R Liu, P Spasojević, HV Poor, in Information Theory Workshop, 2007. ITW’07. IEEE. Multiple access channels with generalized feedback and confidential messages (IEEE, Bergen, 2007), pp. 608–613.

    Chapter  Google Scholar 

  13. E Tekin, A Yener, The Gaussian multiple access wire-tap channel. Inform. Theory, IEEE Trans. 54(12), 5747–5755 (2008).

    Article  MathSciNet  MATH  Google Scholar 

  14. MH Yassaee, MR Aref, in Information Theory Workshop (ITW), 2010 IEEE. Multiple access wiretap channels with strong secrecy (IEEE, Cairo, 2010), pp. 1–5.

    Google Scholar 

  15. G Bagherikaram, AS Motahari, AK Khandani, in Information Theory Proceedings (ISIT), 2010 IEEE International Symposium On. On the secure dof of the single-antenna mac (IEEE, Austin, 2010), pp. 2588–2592.

    Chapter  Google Scholar 

  16. H Zivari-Fard, B Akhbari, M Ahmadian-Attari, MR Aref, in Communications (ICC), 2014 IEEE International Conference On. Compound multiple access channel with confidential messages (IEEE, Sydney, 2014), pp. 1922–1927.

    Chapter  Google Scholar 

  17. SM Shah, V Kumar, V Sharma, in Signal Processing and Communications (SPCOM), 2012 International Conference On. Achievable secrecy sum-rate in a fading MAC-WT with power control and without CSI of eavesdropper (IEEE, Bangalore, 2012), pp. 1–5.

    Google Scholar 

  18. AK Chaitanya, U Mukherji, V Sharma, in International Conference on Network Games, Control, and Optimization. Learning equilibria of a stochastic game on gaussian interference channels with incomplete information (SpringerAvignon, 2016), pp. 159–167.

    Google Scholar 

  19. KA Chaitanya, V Sharma, U Mukherji, in Signal Processing Advances in Wireless Communications (SPAWC), 2015 IEEE 16th International Workshop On. Distributed learning of equilibria for a stochastic game on interference channels (IEEE, Stockholm, 2015), pp. 650–654.

    Google Scholar 

  20. S Adlakha, R Johari, A Goldsmith, Competition in wireless systems via Bayesian interference games. arXiv preprint arXiv:0709.0516 (2007).

  21. T Alpcan, H Boche, ML Honig, HV Poor, Mechanisms and games for dynamic spectrum allocation (Cambridge University Press, 2013).

  22. S Arora, E Hazan, S Kale, The multiplicative weights update method: a meta-algorithm and applications. Theory Comput. 8(1), 121–164 (2012).

    Article  MathSciNet  MATH  Google Scholar 

  23. N Cesa-Bianchi, G Lugosi, Prediction, learning, and games (Cambridge University Press, 2006).

  24. T Roughgarden, Lectures notes on algorithmic game theory (Stanford University, 2014).

  25. K Miettinen, Nonlinear multiobjective optimization, vol. 12 (Springer, 2012).

  26. JF Nash Jr, The bargaining problem. Econometrica: J. Econometric Soc, 155–162 (1950).

  27. H Boche, M Schubert, Nash bargaining and proportional fairness for wireless systems. Netw. IEEE/ACM Trans. 17(5), 1453–1466 (2009).

    Article  Google Scholar 

  28. R Jain, D-M Chiu, WR Hawe, A quantitative measure of fairness and discrimination for resource allocation in shared computer system, vol. 38 (Eastern Research Laboratory, Digital Equipment Corporation Hudson, MA, 1984).

Download references

Acknowledgements

The first author would like to thank Deekshit PK for the useful discussions.

Authors’ contributions

The author names are in order of contribution, i.e. first author has the major contribution, second author helped in writing the algorithms and third author is a research advisor. All authors read and approved the final manuscript.

Competing interests

The authors declare that they have no competing interests.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shahid M. Shah.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shah, S.M., A., K.C. & Sharma, V. Resource allocation in a MAC with and without security via game theoretic learning. J Wireless Com Network 2017, 116 (2017). https://doi.org/10.1186/s13638-017-0901-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13638-017-0901-8

Keywords