Resilience of LTE eNode B against smart jammer in infinite-horizon asymmetric repeated zero-sum game

被引:4
作者
Aziz, Farhan M. [1 ,2 ]
Li, Lichun [3 ]
Shamma, Jeff S. [4 ,5 ]
Stuber, Gordon L. [2 ]
机构
[1] Intel Corp, Commun & Devices Grp iCDG, San Diego, CA 92131 USA
[2] Georgia Inst Technol, Sch Elect & Comp Engn ECE, WSL, Atlanta, GA 30332 USA
[3] FAMU FSU, Coll Engn, Dept Ind & Mfg Engn IME, Tallahassee, FL 32310 USA
[4] KAUST, Robot Intelligent Syst & Control RISC Lab Elect E, Thuwal, Saudi Arabia
[5] KAUST, Ctr Excellence NEOM Res, Comp Elect & Math Sci & Engn Div, Thuwal, Saudi Arabia
关键词
LTE/LTE-A; Smart jamming; lambda-discounted repeated games; Asymmetric information; Linear programming; UNCERTAINTY;
D O I
10.1016/j.phycom.2019.100989
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It has been proposed to use Long Term Evolution (LTE)/LTE-Advanced (LTE-A) networks for mission critical and public safety applications. However, LTE/LTE-A networks are known to be vulnerable to denial-of-service (DOS) and loss-of-service attacks from smart jammers. This article deals with the resilience of LTE/LTE-A eNode B against smart jamming attacks in an infinite-horizon asymmetric repeated zero-sum game and introduces algorithms for constructing efficient strategies for both players (smart jammer and eNode B) in such a game. It has been shown in game-theoretic literature that security strategies provide optimal solution in zero-sum games and that both players' security strategies in an infinite-horizon asymmetric repeated zero-sum game depend only on the history of informed player's actions. However, fixed-sized sufficient statistics are needed for both players to solve an infinite-horizon game efficiently with memory constraints. Smart jammer (informed player) uses its evolving belief state as the fixed-sized sufficient statistic for the repeated game. Whereas, LTE eNode B (uninformed player) uses worst-case regret of its security strategy and its anti-discounted update as the fixed-sized sufficient statistic. Although fixed-sized sufficient statistics are exploited by both players, optimal security strategy computation in lambda-discounted asymmetric games is still hard to compute because of non-convexity. Hence, the problem is convexified by devising suboptimal security strategies with guaranteed performance for both players that are based on approximated optimal game value. However, "approximated" strategies require full monitoring. Therefore, a simplistic yet effective "expected" strategy is also constructed for LTE eNode B (uninformed player) that does not require full monitoring. The simulation results show that smart jammer maintains its dominance at a long range of prior probability values by playing non-revealing and misleading strategies against the network for its long-term advantage. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:16
相关论文
共 37 条
[1]   A survey on networking games in telecommunications [J].
Altman, E ;
Boulogne, T ;
El-Azouzi, R ;
Jiménez, T ;
Wynter, L .
COMPUTERS & OPERATIONS RESEARCH, 2006, 33 (02) :286-311
[2]  
[Anonymous], 1991, Game Theory
[3]  
[Anonymous], 2006, GAME THEORY WIRELESS
[4]  
Aumann R. J., 1992, HDB GAME THEORY, V1
[5]  
Aumann Robert J, 1995, Repeated Games with Incomplete Information
[6]  
Aziz F.M., 2015, P IEEE 26 INT S PERS, P1534
[7]  
Aziz F.M., 2017, THESIS
[8]   Jammer-Type Estimation in LTE With a Smart Jammer Repeated Game [J].
Aziz, Farhan M. ;
Shamma, Jeff S. ;
Stuber, Gordon L. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (08) :7422-7431
[9]  
Aziz FM, 2014, IEEE GLOB COMM CONF, P734, DOI 10.1109/GLOCOM.2014.7036895
[10]   Infrastructure security games [J].
Baykal-Guersoy, Melike ;
Duan, Zhe ;
Poor, H. Vincent ;
Garnaev, Andrey .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2014, 239 (02) :469-478