Dynamic Game-Theoretic Defense Approach against Stealthy Jamming Attacks in Wireless Networks

被引:0
|
作者
Anwar, Ahmed H. [1 ]
Atia, George [1 ]
Guirguis, Mina [2 ]
机构
[1] Univ Cent Florida, Dept Elect & Comp Engn, Orlando, FL 32816 USA
[2] Texas State Univ, Dept Comp Sci, San Marcos, TX 78666 USA
来源
2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON) | 2017年
基金
美国国家科学基金会;
关键词
COGNITIVE RADIO;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper develops a game-theoretic defense approach against jamming attacks targeting access points in a wireless network. We formulate a two-player zero-sum stochastic game between a network administrator (the defender) and a jammer (the attacker) in which the defender adapts the RF footprints of the nodes to counteract the jamming attack aimed at creating excessive interference in the network. Our formulation captures inherent tradeoffs between the ability of the attack to inflict damage and the attack exposure, and between reducing the interference level and maintaining network coverage. We obtain optimal policies for both players at Nash Equilibrium using a value-iteration based algorithm. To handle the state-space complexity for this class of games, we develop approximate policies by judiciously extracting features that are well-representative of the different states. Through numerical results, we show convergence of the used algorithm to stationary policies, and demonstrate the effectiveness of the defense mechanism and the approximate policies against such attacks.
引用
收藏
页码:252 / 258
页数:7
相关论文
共 50 条
  • [1] Game Theoretic Defense Approach to Wireless Networks Against Stealthy Decoy Attacks
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    2016 54TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2016, : 816 - 821
  • [2] Adaptive topologies against jamming attacks in wireless networks: A game-theoretic approach
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 121 : 44 - 58
  • [3] A game-theoretic approach for power systems defense against dynamic cyber-attacks
    Hasan, Saqib
    Dubey, Abhishek
    Karsai, Gabor
    Koutsoukos, Xenofon
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2020, 115
  • [4] JAMMING IN MOBILE NETWORKS: A GAME-THEORETIC APPROACH
    Bhattacharya, Sourabh
    Gupta, Abhishek
    Basar, Tamer
    NUMERICAL ALGEBRA CONTROL AND OPTIMIZATION, 2013, 3 (01): : 1 - 30
  • [5] Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach
    Coordinated Science Laboratory, University of Illinois, Urbana-Champaign, IL, United States
    不详
    不详
    不详
    Proc IEEE Mil Commun Conf MILCOM, 2010, (119-124):
  • [6] Eavesdropping and Jamming in Next-Generation Wireless Networks: A Game-Theoretic Approach
    Zhu, Quanyan
    Saad, Walid
    Han, Zhu
    Poor, H. Vincent
    Basar, Tamer
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 119 - 124
  • [7] A Game-Theoretic Learning Approach for Anti-Jamming Dynamic Spectrum Access in Dense Wireless Networks
    Jia, Luliang
    Xu, Yuhua
    Sun, Youming
    Feng, Shuo
    Yu, Long
    Anpalagan, Alagan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (02) : 1646 - 1656
  • [8] Smart Meter Data Aggregation Against Wireless Attacks: A Game-Theoretic Approach
    Cao, Yang
    Duan, Dongliang
    Yang, Liuqing
    Sun, Zhi
    Zhang, Haochuan
    Yu, Rong
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, : 80 - 85
  • [9] Game-Theoretic Learning Anti-Jamming Approaches in Wireless Networks
    Jia, Luliang
    Qi, Nan
    Chu, Feihuang
    Fang, Shengliang
    Wang, Ximing
    Ma, Shuli
    Feng, Shuo
    IEEE COMMUNICATIONS MAGAZINE, 2022, 60 (05) : 60 - 66
  • [10] Game-theoretic Learning Anti-jamming Approaches in Wireless Networks
    Jia, Luliang
    Qi, Nan
    Chu, Feihuang
    Fang, Shengliang
    Wang, Ximing
    Ma, Shuli
    Feng, Shuo
    arXiv, 2022,