A Colonel Blotto Game for Anti-jamming in the Internet of Things

被引:38
作者
Labib, Mina [1 ]
Ha, Sean [1 ]
Saad, Walid [1 ]
Reed, Jeffrey H. [1 ]
机构
[1] Virginia Tech, Bradley Dept Elect & Comp Engn, Wireless VT, Blacksburg, VA 24061 USA
来源
2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2015年
基金
美国国家科学基金会;
关键词
Internet of Things (IoT); network vulnerability; jamming; distributed detection; zero-sum game; Colonel Blotto game; FUSION;
D O I
10.1109/GLOCOM.2015.7417437
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things (IoT) is envisioned to be a large-scale system that interconnects sensors, mundane objects, and other physical devices via an effective communication infrastructure. Given the heterogeneous and large-scale nature of the IoT, security has emerged as a key challenge. This challenge is further exacerbated by the fact that security solutions for the IoT must account for the limited computational capabilities of the IoT's nodes. That makes enhancing the security at the physical layer level an attractive solution for IoT networks. In this paper, a novel anti-jamming mechanism is proposed to enable a fusion center to defend the IoT from a malicious radio jamming attack. The problem is formulated as a Colonel Blotto game in which the fusion center, acting as defender, aims to detect the jamming attack by increasing the number of bits allocated to certain nodes for reporting their measured interference level, while the jammer aims to disturb the network performance and still be undetected. To solve this game, an algorithm based on fictitious play is proposed to reach the equilibrium of the game. Simulation results show that the proposed mechanism outperforms the mechanism of allocating the available bits in a random manner for two different cases of network architecture.
引用
收藏
页数:6
相关论文
共 16 条
  • [1] [Anonymous], 2010, INTERNET THINGS
  • [2] Decentralized detection in sensor networks
    Chamberland, JF
    Veeravalli, VV
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2003, 51 (02) : 407 - 416
  • [3] Information Fusion to Defend Intentional Attack in Internet of Things
    Chen, Pin-Yu
    Cheng, Shin-Ming
    Chen, Kwang-Cheng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (04): : 337 - 348
  • [4] General Blotto: games of allocative strategic mismatch
    Golman, Russell
    Page, Scott E.
    [J]. PUBLIC CHOICE, 2009, 138 (3-4) : 279 - 299
  • [5] Lee M. M., 2004, THESIS
  • [6] Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
    Mukherjee, Amitav
    Fakoorian, S. Ali A.
    Huang, Jing
    Swindlehurst, A. Lee
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (03): : 1550 - 1573
  • [7] N. Council, 2008, NAT INT COUNC C
  • [8] PRABHAKAR TV, 2013, PERS IND MOB RAD COM, P502
  • [9] Data fusion in the Internet of Things
    Qin, Xiaotie
    Gu, Yuesheng
    [J]. CEIS 2011, 2011, 15
  • [10] The Colonel Blotto game
    Roberson, Brian
    [J]. ECONOMIC THEORY, 2006, 29 (01) : 1 - 24