An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks

被引:0
作者
Anand, S. [1 ]
Sengupta, S. [2 ]
Chandramouli, R. [1 ]
机构
[1] Stevens Inst Technol, Dept ECE, Hoboken, NJ 07030 USA
[2] CUNY, John Jay Coll, Dept Math & Comp Sci, New York, NY 10019 USA
来源
2010 PROCEEDINGS IEEE INFOCOM | 2010年
基金
美国国家科学基金会;
关键词
Tactical covert network; attack; defense; adversarial game; pricing; Nash equilibrium;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We discuss malicious interference based denial of service (DoS) attacks in multi-band covert timing networks using an adversarial game theoretic approach. A covert timing network operating on a set of multiple spectrum bands is considered. Each band has an associated utility which represents the critical nature of the covert data transmitted in the band. A malicious attacker wishes to cause a DoS attack by sensing and creating malicious interference on some or all of the bands. The covert timing network deploys camouflaging resources to appropriately defend the spectrum bands. A two tier game theoretic approach is proposed to model this scenario. The first tier of the game is the sensing game in which, the covert timing network determines the amount of camouflaging resources to be deployed in each band and the malicious attacker determines the optimal sensing resources to be deployed in each band. In the second tier of the game, the malicious attacker determines the optimal transmit powers on each spectral band it chooses to attack. We prove the existence of Nash equilibriums for the games. We compare the performance of our proposed game theoretic mechanism with that of other well known heuristic mechanisms and demonstrate the effectiveness of the proposed approach.
引用
收藏
页数:9
相关论文
共 16 条
[1]   Bits through queues [J].
Anantharam, V ;
Verdu, S .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1996, 42 (01) :4-18
[2]  
[Anonymous], 2015, Linear and Nonlinear Programming
[3]  
[Anonymous], ACM SIGMOBILE MOBILE
[4]   THE GAUSSIAN TEST CHANNEL WITH AN INTELLIGENT JAMMER [J].
BASAR, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (01) :152-157
[5]  
Buddhikot M., 2005, IEEE INT S WORLD WIR
[6]  
Chow S.-C., 2003, Encyclopedia of Biopharmaceutical Statistics, VSecond
[7]  
EGGERS KW, 1988, 4 AER COMP SEC APPL
[8]  
Fudenberg D., 1991, Game Theory
[9]  
LAMPSON BW, 1973, ACM COMMUN
[10]  
LEE KG, 2008, INT C INT INF HID MU