Fight jamming with jamming - A game theoretic analysis of jamming attack in wireless networks and defense strategy

被引:28
作者
Chen, Lin [1 ,2 ]
Leneutre, Jean [3 ]
机构
[1] Univ Paris 11, LRI, CNRS, F-91405 Orsay, France
[2] INRIA, F-91405 Orsay, France
[3] TELECOM ParisTech LTCI CNRS 5141, Dept Comp Sci & Networking, F-75013 Paris, France
基金
美国国家卫生研究院;
关键词
Jamming; Security game; Wireless network; Game theory;
D O I
10.1016/j.comnet.2011.03.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless networks, jamming is an easily mountable attack with detrimental effects on the victim network. Existing defense strategies mainly consist of retreating from the jammer or rerouting traffic around the jammed area. In this paper, we tackle the problem from a different angle. Motivated by the high energy-consuming nature of jamming, we propose our defense strategy to defeat the jammer by draining its energy as fast as possible. To gain an in-depth insight on jamming and to evaluate the proposed defense strategy, we model the interaction between the jammer and the victim network as a non-cooperative game which is proven to admit two equilibria. We demonstrate analytically that the proposed defense strategy can eliminate the undesirable equilibrium from the network's perspective and increase the jammer's energy consumption at the remaining equilibrium without degrading the performance of the victim network. We also investigate the game dynamics by developing the update mechanism for the players to adjust their strategies based on only observable channel information. Numerical study is then conducted to evaluate the performance of the proposed strategy. Results demonstrate its effectiveness in defeating jamming, especially when the jammer is aggressive. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:2259 / 2270
页数:12
相关论文
共 21 条
[1]  
Altman E, 2007, LECT NOTES COMPUT SC, V4465, P1
[2]  
ALTMAN E, 2009, JAMMING WIRELESS NET
[3]  
AWERBUCH B, 2008, ACM PODC TOR CAN
[4]  
Bayraktaroglu E., 2008, PERFORMANCE IEEE 802
[5]  
Buttyan L., 2008, SECURITY COOPERATION
[6]   Wormhole-based antijamming techniques in sensor networks [J].
Cagalj, Mario ;
Capkun, Srdjan ;
Hubaux, Jean-Pierre .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2007, 6 (01) :100-114
[7]  
HALL SGH, 2005, IEEE MILCOM
[8]  
HEUSSE M, 2005, ACM SIGCOMM PHIL US
[9]  
LI M, 2007, IEEE INFOCOM ANCH US
[10]   On link layer denial of service in data wireless LANs [J].
Lin, GL ;
Noubir, G .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2005, 5 (03) :273-284