Fight jamming with jamming - A game theoretic analysis of jamming attack in wireless networks and defense strategy

被引:27
|
作者
Chen, Lin [1 ,2 ]
Leneutre, Jean [3 ]
机构
[1] Univ Paris 11, LRI, CNRS, F-91405 Orsay, France
[2] INRIA, F-91405 Orsay, France
[3] TELECOM ParisTech LTCI CNRS 5141, Dept Comp Sci & Networking, F-75013 Paris, France
基金
美国国家卫生研究院;
关键词
Jamming; Security game; Wireless network; Game theory;
D O I
10.1016/j.comnet.2011.03.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless networks, jamming is an easily mountable attack with detrimental effects on the victim network. Existing defense strategies mainly consist of retreating from the jammer or rerouting traffic around the jammed area. In this paper, we tackle the problem from a different angle. Motivated by the high energy-consuming nature of jamming, we propose our defense strategy to defeat the jammer by draining its energy as fast as possible. To gain an in-depth insight on jamming and to evaluate the proposed defense strategy, we model the interaction between the jammer and the victim network as a non-cooperative game which is proven to admit two equilibria. We demonstrate analytically that the proposed defense strategy can eliminate the undesirable equilibrium from the network's perspective and increase the jammer's energy consumption at the remaining equilibrium without degrading the performance of the victim network. We also investigate the game dynamics by developing the update mechanism for the players to adjust their strategies based on only observable channel information. Numerical study is then conducted to evaluate the performance of the proposed strategy. Results demonstrate its effectiveness in defeating jamming, especially when the jammer is aggressive. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:2259 / 2270
页数:12
相关论文
共 50 条
  • [21] Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks
    Li, Mingyan
    Koutsopoulos, Iordanis
    Poovendran, Radha
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (08) : 1119 - 1133
  • [22] Optimal jamming attack strategies and network defense policies in wireless sensor networks
    Boeing Research and Technology, Boeing Company, MC 7L-69, PO Box 3707, Seattle, WA 98124-2207, United States
    不详
    不详
    不详
    IEEE Trans. Mob. Comput., 8 (1119-1133):
  • [23] A Survey of Jamming Attack Prevention Techniques in Wireless Networks
    Sowmya, S.
    Malarchelvi, P. D. Sheba Kezia
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [24] Jamming ACK Attack to Wireless Networks and a Mitigation Approach
    Zhang, Zhiguo
    Wu, Jingqi
    Deng, Jing
    Qiu, Meikang
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [25] Distributed Detection of Jamming and Defense in Wireless Sensor Networks
    Lin, Ying
    Li, Mingyan
    2009 43RD ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2, 2009, : 829 - +
  • [26] Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach
    Coordinated Science Laboratory, University of Illinois, Urbana-Champaign, IL, United States
    不详
    不详
    不详
    Proc IEEE Mil Commun Conf MILCOM, 2010, (119-124):
  • [27] Eavesdropping and Jamming in Next-Generation Wireless Networks: A Game-Theoretic Approach
    Zhu, Quanyan
    Saad, Walid
    Han, Zhu
    Poor, H. Vincent
    Basar, Tamer
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 119 - 124
  • [28] Adaptive topologies against jamming attacks in wireless networks: A game-theoretic approach
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 121 : 44 - 58
  • [29] Jamming and anti-jamming techniques in wireless networks: a survey
    Grover, Kanika
    Lim, Alvin
    Yang, Qing
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2014, 17 (04) : 197 - 215
  • [30] Multiact Dynamic Game Strategy for Jamming Attack in Electricity Market
    Ma, Jinghuan
    Liu, Yuting
    Song, Lingyang
    Han, Zhu
    IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (05) : 2273 - 2282