A Game Theoretic Analysis of Secret and Reliable Communication With Active and Passive Adversarial Modes

被引:59
作者
Garnaev, Andrey [1 ,2 ]
Baykal-Gursoy, Melike [3 ,4 ]
Poor, H. Vincent [5 ]
机构
[1] Rutgers State Univ, WINLAB, North Brunswick, NJ 08901 USA
[2] St Petersburg State Univ, Dept Comp Modelling & Multiproc Syst, St Petersburg 198504, Russia
[3] Rutgers State Univ, RUTCOR, Dept Ind & Syst Engn, Piscataway, NJ 08854 USA
[4] Rutgers State Univ, CAIT, Piscataway, NJ 08854 USA
[5] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
Jamming; eavesdropping; secret communication; stochastic games; stationary strategies; STOCHASTIC GAME; STRATEGIES;
D O I
10.1109/TWC.2015.2498934
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Secret and reliable communication presents a challenge involving a double dilemma for a user and an adversary. One challenge for the adversary is to decide between jamming and eavesdropping. While jamming can be quite effective in preventing reliable communication of the user, it can also be quite harmful for the adversary since he/she can be detected. On the other hand, eavesdropping is quite safe for the adversary; however, it sometimes may not be so efficient compared to jamming, if the adversary cannot respond to the information gleaned from eavesdropping in a timely manner. The user can either transmit, thus becoming vulnerable to malicious activity, or be in a silent mode in turn delaying his/her transmission. However, by combining these modes properly the user can assist an intruder detection system in detecting the adversary, since transmission can provoke the adversary into a jamming attack, and a strategically allocated silent mode while the jammer continues jamming can increase the probability of detecting the adversary. In this paper, to get insight into this problem, two simple stochastic games are proposed. Explicit solutions are found that lead to the characterization of some interesting properties. In particular, it is shown that under certain conditions, incorporating in the transmission protocol a time slot dealing just with the detection of malicious threats can improve the secrecy and reliability of the communication without extra transmission delay.
引用
收藏
页码:2155 / 2163
页数:9
相关论文
共 38 条
[1]  
Altman E, 2007, LECT NOTES COMPUT SC, V4465, P1
[2]  
Altman E, 2009, LECT NOTES COMPUT SC, V5425, P112
[3]  
Amariucai G. T, 2009, THESIS LOUISIANA STA
[4]  
[Anonymous], 2005, P 6 ACM INT S MOB AD, DOI DOI 10.1145/1062689.1062697
[5]  
[Anonymous], IEEE INT C COMM ICC
[6]  
[Anonymous], 2011, P IEEE GLOBAL COMMUN
[7]  
Comaniciu C., 2005, INF TECH TRANS PROCE
[8]  
Digham FF, 2003, 2003 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, P3575
[9]  
Ferguson T. S., 2008, GAME THEORY
[10]  
Garnaev Andrey, 2014, Multiple-Access Communications. 7th International Workshop (MACOM 2014). Proceedings: LNCS 8715, P121, DOI 10.1007/978-3-319-10262-7_12