Jammer-Type Estimation in LTE With a Smart Jammer Repeated Game

被引:22
作者
Aziz, Farhan M. [1 ]
Shamma, Jeff S. [2 ]
Stuber, Gordon L. [1 ]
机构
[1] Georgia Inst Technol, Sch Elect & Comp Engn, Wireless Syst Lab, Atlanta, GA 30332 USA
[2] King Abdullah Univ Sci & Technol, Comp Elect & Math Sci & Engn Div, RISC Lab, Thuwal 239556900, Saudi Arabia
关键词
Bayesian games with asymmetric information; Long-term evolution (LTE)/LTE-Advanced (LTE-A); nonparametric estimation; smart jamming; threat-based mechanism; UNCERTAINTY; INFORMATION; NETWORKS; SECURITY;
D O I
10.1109/TVT.2017.2672682
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Long-term evolution (LTE)/LTE-Advanced (LTE-A) networks are known to be vulnerable to denial-of-service (DOS) and loss-of-service attacks from smart jammers. The interaction between the network and the smart jammer has been modeled as an infinite-horizon general-sum (nonzero-sum) Bayesian game with asymmetric information, with the network being the uninformed player. Although significant work has been done on optimal strategy computation and control of information revelation of the informed player in repeated asymmetric information games, it has been limited to zero-sum games with perfect monitoring. Recent progress on the strategy computation of the uninformed player is also limited to zero-sum games with perfect monitoring and is focused on expected payoff formulations. Since the proposed formulation is a general-sum game with imperfect monitoring, existing formulations cannot be leveraged for estimating true state of nature (the jammer type). Hence, a threat-based mechanism is proposed for the uninformed player (the network) to estimate the informed player's type (jammer type). The proposed mechanism helps the network resolve uncertainty about the state of nature (jammer type) so that it can compute a repeated-game strategy conditioned on its estimate. The proposed algorithm does not rely on the commonly assumed "full monitoring" premise and uses a combination of threat-based mechanism and nonparametric estimation to estimate the jammer type. In addition, it requires no explicit feedback from the network users, nor does it rely on a specific distribution (e.g., Gaussian) of test statistic. It is shown that the proposed algorithm's estimation performance is quite robust under realistic modeling and observational constraints, despite all the aforementioned challenges.
引用
收藏
页码:7422 / 7431
页数:10
相关论文
共 43 条
[1]   A survey on networking games in telecommunications [J].
Altman, E ;
Boulogne, T ;
El-Azouzi, R ;
Jiménez, T ;
Wynter, L .
COMPUTERS & OPERATIONS RESEARCH, 2006, 33 (02) :286-311
[2]  
[Anonymous], 2013, ACM Comput. Surv., DOI [10.1145/2480741.2480742, DOI 10.1145/2480741.2480742]
[3]  
[Anonymous], 2005, Wireless Communications
[4]  
[Anonymous], 2012, INTRO MATH STAT
[5]  
[Anonymous], 2006, GAME THEORY WIRELESS
[6]  
Arslan H., 2003, P IASTED INT C WIR O
[7]  
Aumann R., 1995, Repeated games with incomplete information
[8]  
Aumann R. J., 1992, HDB GAME THEORY EC A, V1
[9]  
Aziz F.M., 2015, P IEEE 26 INT S PERS, P1534
[10]  
Aziz FM, 2014, IEEE GLOB COMM CONF, P734, DOI 10.1109/GLOCOM.2014.7036895