Game Theoretic Study of Protecting MIMO Transmissions Against Smart Attacks

被引:0
|
作者
Li, Yanda [1 ]
Xiao, Liang [1 ]
Dai, Huaiyu [2 ]
Poor, H. Vincent [3 ]
机构
[1] Xiamen Univ, Dept Commun Engn, Xiamen, Peoples R China
[2] North Carolina State Univ, Dept Elect & Comp Engn, Raleigh, NC 27695 USA
[3] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
MIMO; smart attacks; power control; game theory; learning;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Multiple-input multiple-output (MIMO) systems are threatened by smart attackers, who apply programmable radio devices such as software defined radios to perform multiple types of attacks such as eavesdropping, jamming and spoofing. In this paper, MIMO transmission in the presence of smart attacks is formulated as a noncooperative game, in which a MIMO transmitter chooses its transmit power level and a smart attacker determines its attack type accordingly. A Nash equilibrium of this secure MIMO transmission game is derived and conditions assuring its existence are provided to reveal the impact of the number of antennas and the costs of the attacker to launch each type of attack. A power control strategy based on Q-learning is proposed for the MIMO transmitter to suppress the attack motivation of smart attackers in a dynamic version of MIMO transmission game without being aware of the attack and the radio channel model. Simulation results show that our proposed scheme can reduce the attack rate of smart attackers and improve the secrecy capacity compared with the benchmark strategy.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Adaptive topologies against jamming attacks in wireless networks: A game-theoretic approach
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 121 : 44 - 58
  • [32] Game Theoretic Study on Channel-Based Authentication in MIMO Systems
    Xiao, Liang
    Chen, Tianhua
    Han, Guoan
    Zhuang, Weihua
    Sun, Limin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (08) : 7474 - 7484
  • [33] Information-Theoretic Attacks in the Smart Grid
    Sun, Ke
    Esnaola, Inaki
    Perlaza, Samir M.
    Poor, H. Vincent
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2017, : 455 - 460
  • [34] Protecting Obfuscation against Algebraic Attacks
    Barak, Boaz
    Garg, Sanjam
    Kalai, Yael Tauman
    Paneth, Omer
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 221 - 238
  • [35] A Recipe for Protecting Against Speculation Attacks
    Sherwood, Timothy
    COMMUNICATIONS OF THE ACM, 2021, 64 (12) : 104 - 104
  • [36] Protecting users against phishing attacks
    Kirda, Engin
    Kruegel, Christopher
    COMPUTER JOURNAL, 2006, 49 (05): : 554 - 561
  • [37] Comparative study of game theoretic approaches to mitigate network layer attacks in VANETs
    Ilavendhan, A.
    Saruladha, K.
    ICT EXPRESS, 2018, 4 (01): : 46 - 50
  • [38] Stochastic detection against deception attacks in CPS: Performance evaluation and game-theoretic analysis
    Li, Yuzhe
    Yang, Yake
    Chai, Tianyou
    Chen, Tongwen
    AUTOMATICA, 2022, 144
  • [39] Securing NextG Systems against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution
    Sagduyu, Yalin E.
    Erpek, Tugba
    Shi, Yi
    MILCOM 2023 - 2023 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2023,
  • [40] Protecting against attacks on open systems
    Dalrymple, PW
    I&CS-INSTRUMENTATION & CONTROL SYSTEMS, 1998, 71 (02): : 51 - 55