Defend Jamming Attacks: How to Make Enemies Become Friends

被引:0
作者
Dinh Thai Hoang [1 ]
Abu Alsheikh, Mohammad [2 ]
Gong, Shimin [3 ]
Niyato, Dusit [4 ]
Han, Zhu [5 ]
Liang, Ying-Chang [6 ]
机构
[1] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, NSW, Australia
[2] Univ Canberra, Fac Sci & Technol, Canberra, ACT, Australia
[3] Sun Yat Sen Univ, Sch Intelligent Syst Engn, Guangzhou, Peoples R China
[4] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore, Singapore
[5] Univ Houston, Dept Elect & Comp Engn, Houston, TX 77004 USA
[6] Univ Elect Sci & Technol, Ctr Intelligent Networking & Commun, Chengdu, Peoples R China
来源
2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2019年
关键词
Ambient backscatter; smart jamming; deep Q-learning; energy harvesting; MDP; deception; Q-learning; COMMUNICATION;
D O I
10.1109/globecom38437.2019.9014094
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider a smart jammer that only attacks the channel if it detects activities of legitimate devices on that channel. To cope with such smart jamming attacks, we propose an intelligent deception strategy in which the legitimate transmitter sends fake transmissions to lure the jammer. Then, if the jammer launches attacks to the channel, the legitimate transmitter can either backscatter the jamming signals to transmit data or harvest energy from the jamming signals for future active transmissions. In this way, we can not only undermine the attack ability of the jammer, but also leverage jamming signals as means to enhance system performance. In addition, to find an optimal defense strategy for the legitimate device under uncertainty of wireless environment as well as incomplete information from the jammer, we develop Q-learning and deep Q-learning algorithms based on the Markov decision process. Through simulation results, we demonstrate that our proposed solution is able to not only deal with smart jamming attacks, but also successfully leverage jamming attacks to improve the system performance.
引用
收藏
页数:6
相关论文
共 13 条
[1]   A Learning Theoretic Approach to Energy Harvesting Communication System Optimization [J].
Blasco, Pol ;
Guenduez, Deniz ;
Dohler, Mischa .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (04) :1872-1882
[2]  
Goodfellow I, 2016, ADAPT COMPUT MACH LE, P1
[3]   Internet of Things (IoT): A vision, architectural elements, and future directions [J].
Gubbi, Jayavardhana ;
Buyya, Rajkumar ;
Marusic, Slaven ;
Palaniswami, Marimuthu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1645-1660
[4]   Exploiting Adversarial Jamming Signals for Energy Harvesting in Interference Networks [J].
Guo, Jing ;
Zhao, Nan ;
Yu, F. Richard ;
Liu, Xin ;
Leung, Victor C. M. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (02) :1267-1280
[5]   Joint Adaptation of Frequency Hopping and Transmission Rate for Anti-Jamming Wireless Systems [J].
Hanawal, Manjesh K. ;
Abdel-Rahman, Mohammad J. ;
Krunz, Marwan .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2016, 15 (09) :2247-2259
[6]  
Huynh N. V., 2019, ARXIV190403897
[7]   Ambient Backscatter: Wireless Communication Out of Thin Air [J].
Liu, Vincent ;
Parks, Aaron ;
Talla, Vamsi ;
Gollakota, Shyamnath ;
Wetherall, David ;
Smith, Joshua R. .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04) :39-50
[8]   Human-level control through deep reinforcement learning [J].
Mnih, Volodymyr ;
Kavukcuoglu, Koray ;
Silver, David ;
Rusu, Andrei A. ;
Veness, Joel ;
Bellemare, Marc G. ;
Graves, Alex ;
Riedmiller, Martin ;
Fidjeland, Andreas K. ;
Ostrovski, Georg ;
Petersen, Stig ;
Beattie, Charles ;
Sadik, Amir ;
Antonoglou, Ioannis ;
King, Helen ;
Kumaran, Dharshan ;
Wierstra, Daan ;
Legg, Shane ;
Hassabis, Demis .
NATURE, 2015, 518 (7540) :529-533
[9]   A Survey on Jamming Attacks and Countermeasures in WSNs [J].
Mpitziopoulos, Aristides ;
Gavalas, Damianos ;
Konstantopoulos, Charalampos ;
Pantziou, Grammati .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (04) :42-56
[10]   Ambient Backscatter Communications: A Contemporary Survey [J].
Nguyen Van Huynh ;
Dinh Thai Hoang ;
Lu, Xiao ;
Niyato, Dusit ;
Wang, Ping ;
Kim, Dong In .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :2889-2922