Game Theoretic Study of Protecting MIMO Transmissions Against Smart Attacks

被引:0
|
作者
Li, Yanda [1 ]
Xiao, Liang [1 ]
Dai, Huaiyu [2 ]
Poor, H. Vincent [3 ]
机构
[1] Xiamen Univ, Dept Commun Engn, Xiamen, Peoples R China
[2] North Carolina State Univ, Dept Elect & Comp Engn, Raleigh, NC 27695 USA
[3] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
MIMO; smart attacks; power control; game theory; learning;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Multiple-input multiple-output (MIMO) systems are threatened by smart attackers, who apply programmable radio devices such as software defined radios to perform multiple types of attacks such as eavesdropping, jamming and spoofing. In this paper, MIMO transmission in the presence of smart attacks is formulated as a noncooperative game, in which a MIMO transmitter chooses its transmit power level and a smart attacker determines its attack type accordingly. A Nash equilibrium of this secure MIMO transmission game is derived and conditions assuring its existence are provided to reveal the impact of the number of antennas and the costs of the attacker to launch each type of attack. A power control strategy based on Q-learning is proposed for the MIMO transmitter to suppress the attack motivation of smart attackers in a dynamic version of MIMO transmission game without being aware of the attack and the radio channel model. Simulation results show that our proposed scheme can reduce the attack rate of smart attackers and improve the secrecy capacity compared with the benchmark strategy.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Protecting users against phishing attacks
    Kirda, Engin
    Kruegel, Christopher
    Computer Journal, 2006, 49 (05): : 554 - 561
  • [42] Protecting the Grid Against MAD Attacks
    Soltan, Saleh
    Mittal, Prateek
    Poor, H. Vincent
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (03): : 1310 - 1326
  • [43] Dynamic Game-Theoretic Defense Approach against Stealthy Jamming Attacks in Wireless Networks
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2017, : 252 - 258
  • [44] Defending Against Stealthy Attacks on Multiple Nodes With Limited Resources: A Game-Theoretic Analysis
    Zhang, Ming
    Zheng, Zizhan
    Shroff, Ness B.
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2020, 7 (04): : 1665 - 1677
  • [45] A game-theoretic and stochastic survivability mechanism against induced attacks in Cognitive Radio Networks
    Mneimneh, Saad
    Bhunia, Suman
    Vazquez-Abad, Felisa
    Sengupta, Shamik
    PERVASIVE AND MOBILE COMPUTING, 2017, 40 : 577 - 592
  • [46] A game-theoretic approach for power systems defense against dynamic cyber-attacks
    Hasan, Saqib
    Dubey, Abhishek
    Karsai, Gabor
    Koutsoukos, Xenofon
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2020, 115
  • [47] A Game-Theoretic Defense Against Data Poisoning Attacks in Distributed Support Vector Machines
    Zhang, Rui
    Zhu, Quanyan
    2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [48] Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information
    Zhang, Chi
    Emmanuel Ramirez-Marquez, Jose
    IIE TRANSACTIONS, 2013, 45 (03) : 244 - 258
  • [49] A Game-Theoretic Approach to EDCA Remapping Attacks
    Szott, Szymon
    Konorski, Jerzy
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [50] Graph-theoretic defense mechanisms against false data injection attacks in smart grids
    Mohammad Hasan ANSARI
    Vahid Tabataba VAKILI
    Behnam BAHRAK
    Parmiss TAVASSOLI
    JournalofModernPowerSystemsandCleanEnergy, 2018, 6 (05) : 860 - 871