Adaptive topologies against jamming attacks in wireless networks: A game-theoretic approach

被引:6
|
作者
Anwar, Ahmed H. [1 ]
Atia, George [1 ]
Guirguis, Mina [2 ]
机构
[1] Univ Cent Florida, Dept Elect & Comp Engn, Orlando, FL 32814 USA
[2] Texas State Univ, Dept Comp Sci, San Marcos, TX 78666 USA
关键词
Security games; Game theory; Optimization; Marginal strategies; Decomposition; COGNITIVE RADIO NETWORKS; POWER-CONTROL;
D O I
10.1016/j.jnca.2018.06.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Towards securing wireless networks and ensuring their dependability under jamming attacks, this paper presents and analyzes game-theoretic formulations between an adversary and a defender. The adversary jams a subset of nodes to increase the level of interference in the network, while the defender makes judicious adjustments of the transmission power level of the nodes, thereby continuously adapting the underlying network topology to reduce the impact of the attack. The defender's strategy is based on playing Nash equilibria (NE) strategies securing a worst-case network utility. First, a discrete control set is considered in which the space of strategies of the defender grows exponentially with the network size. Scalable decomposition-based approaches are developed yielding a defense strategy whose performance closely approaches that of the non-decomposed game. Second, we develop a marginal strategy to assign the power levels while satisfying a coverage constraint thereby evading the combinatorial complexity associated with enumerating all pure actions. Third, we generalize the marginal based strategy by considering a continuous action space for both players. For this setting, we prove the existence of a unique pure Nash equilibrium. The presented numerical results show the effectiveness of the proposed defense approach against various attack policies and demonstrate the assignment strategies on a real wireless network deployed in a three-story building.
引用
收藏
页码:44 / 58
页数:15
相关论文
共 50 条
  • [1] Dynamic Game-Theoretic Defense Approach against Stealthy Jamming Attacks in Wireless Networks
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2017, : 252 - 258
  • [2] JAMMING IN MOBILE NETWORKS: A GAME-THEORETIC APPROACH
    Bhattacharya, Sourabh
    Gupta, Abhishek
    Basar, Tamer
    NUMERICAL ALGEBRA CONTROL AND OPTIMIZATION, 2013, 3 (01): : 1 - 30
  • [3] Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach
    Coordinated Science Laboratory, University of Illinois, Urbana-Champaign, IL, United States
    不详
    不详
    不详
    Proc IEEE Mil Commun Conf MILCOM, 2010, (119-124):
  • [4] Eavesdropping and Jamming in Next-Generation Wireless Networks: A Game-Theoretic Approach
    Zhu, Quanyan
    Saad, Walid
    Han, Zhu
    Poor, H. Vincent
    Basar, Tamer
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 119 - 124
  • [5] Smart Meter Data Aggregation Against Wireless Attacks: A Game-Theoretic Approach
    Cao, Yang
    Duan, Dongliang
    Yang, Liuqing
    Sun, Zhi
    Zhang, Haochuan
    Yu, Rong
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, : 80 - 85
  • [6] Game-Theoretic Learning Anti-Jamming Approaches in Wireless Networks
    Jia, Luliang
    Qi, Nan
    Chu, Feihuang
    Fang, Shengliang
    Wang, Ximing
    Ma, Shuli
    Feng, Shuo
    IEEE COMMUNICATIONS MAGAZINE, 2022, 60 (05) : 60 - 66
  • [7] Game-theoretic Learning Anti-jamming Approaches in Wireless Networks
    Jia, Luliang
    Qi, Nan
    Chu, Feihuang
    Fang, Shengliang
    Wang, Ximing
    Ma, Shuli
    Feng, Shuo
    arXiv, 2022,
  • [8] Game Theoretic Defense Approach to Wireless Networks Against Stealthy Decoy Attacks
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    2016 54TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2016, : 816 - 821
  • [9] Jamming the Underwater: a Game-Theoretic Analysis of Energy-Depleting Jamming Attacks
    Signori, Alberto
    Pielli, Chiara
    Chiariotti, Federico
    Giordani, Marco
    Campagnaro, Filippo
    Laurenti, Nicola
    Zorzi, Michele
    WUWNET'19: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON UNDERWATER NETWORKS & SYSTEMS, 2019,
  • [10] A Game-Theoretic Analysis of Energy-Depleting Jamming Attacks
    Pielli, Chiara
    Chiariotti, Federico
    Laurenti, Nicola
    Zanella, Andrea
    Zorzi, Michele
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 100 - 104