Adaptive topologies against jamming attacks in wireless networks: A game-theoretic approach

被引:6
|
作者
Anwar, Ahmed H. [1 ]
Atia, George [1 ]
Guirguis, Mina [2 ]
机构
[1] Univ Cent Florida, Dept Elect & Comp Engn, Orlando, FL 32814 USA
[2] Texas State Univ, Dept Comp Sci, San Marcos, TX 78666 USA
关键词
Security games; Game theory; Optimization; Marginal strategies; Decomposition; COGNITIVE RADIO NETWORKS; POWER-CONTROL;
D O I
10.1016/j.jnca.2018.06.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Towards securing wireless networks and ensuring their dependability under jamming attacks, this paper presents and analyzes game-theoretic formulations between an adversary and a defender. The adversary jams a subset of nodes to increase the level of interference in the network, while the defender makes judicious adjustments of the transmission power level of the nodes, thereby continuously adapting the underlying network topology to reduce the impact of the attack. The defender's strategy is based on playing Nash equilibria (NE) strategies securing a worst-case network utility. First, a discrete control set is considered in which the space of strategies of the defender grows exponentially with the network size. Scalable decomposition-based approaches are developed yielding a defense strategy whose performance closely approaches that of the non-decomposed game. Second, we develop a marginal strategy to assign the power levels while satisfying a coverage constraint thereby evading the combinatorial complexity associated with enumerating all pure actions. Third, we generalize the marginal based strategy by considering a continuous action space for both players. For this setting, we prove the existence of a unique pure Nash equilibrium. The presented numerical results show the effectiveness of the proposed defense approach against various attack policies and demonstrate the assignment strategies on a real wireless network deployed in a three-story building.
引用
收藏
页码:44 / 58
页数:15
相关论文
共 50 条
  • [31] A Game-Theoretic Approach to Connectivity Restoration in Wireless Sensor and Actor Networks
    Senturk, Izzet F.
    Yilmaz, Sabri
    Akkaya, Kemal
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [32] A Game-Theoretic Approach for Distributed Power Control in Wireless Mesh Networks
    Liu, YanBing
    Wu, Tao
    Xian, XingPing
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2011, E94B (03) : 818 - 822
  • [33] A game-theoretic approach for relay assignment over distributed wireless networks
    Liang, Xuedong
    Chen, Min
    Leung, Victor C. M.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (12): : 1646 - 1656
  • [34] A Game-Theoretic Approach to Prioritized Transmission in Wireless CSMA/CA Networks
    Galluccio, Laura
    2009 IEEE VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, 2009, : 33 - 37
  • [35] Adaptive Quantization for Distributed Estimation in Energy-Harvesting Wireless Sensor Networks: A Game-Theoretic Approach
    Liu, Hua
    Liu, Guiyun
    Liu, Yonggui
    Mo, Lei
    Chen, Hongbin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [36] A GAME THEORETIC APPROACH TO GRAY HOLE ATTACKS IN WIRELESS MESH NETWORKS
    Shila, Devu Manikantan
    Anjali, Tricha
    2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 4152 - 4158
  • [37] A Game-Theoretic and Experimental Analysis of Energy-Depleting Underwater Jamming Attacks
    Signori, Alberto
    Chiariotti, Federico
    Campagnaro, Filippo
    Zorzi, Michele
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) : 9793 - 9804
  • [38] A Game-Theoretic Analysis of Energy-Depleting Jamming Attacks with a Learning Counterstrategy
    Chiariotti, Federico
    Pielli, Chiara
    Laurenti, Nicola
    Zanella, Andrea
    Zorzi, Michele
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2020, 16 (01)
  • [39] A game-theoretic and stochastic survivability mechanism against induced attacks in Cognitive Radio Networks
    Mneimneh, Saad
    Bhunia, Suman
    Vazquez-Abad, Felisa
    Sengupta, Shamik
    PERVASIVE AND MOBILE COMPUTING, 2017, 40 : 577 - 592
  • [40] A survey of game-theoretic approaches in wireless sensor networks
    Machado, Renita
    Tekinay, Sirin
    COMPUTER NETWORKS, 2008, 52 (16) : 3047 - 3061