Game Theoretic Analysis of Jamming Attack in Wireless Mesh Network with Delay Tolerance

被引:0
|
作者
Benromarn, Satawat [1 ]
Komolkiti, Patrachart [2 ]
Aswakul, Chaodit [1 ]
机构
[1] Chulalongkorn Univ, Dept Elect Engn, Bangkok, Thailand
[2] Assumption Univ, Dept Comp & Network Engn, Bangkok, Thailand
关键词
Wireless Mesh Network; Delay Tolerance; Attacker; Noncooperative Game Theory;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a framework for studying the impact of a smart attacker in a wireless mesh network that is used to provide delay-tolerant internet connectivity. Non-cooperative game theory is used to define the defending player strategy in terms of network tree routing as well as the attacking player strategy in terms of the varying position of communication signal jammer. To evaluate the game value, the payoff is captured by the expected number of backlogged packets, based on the assumption of network of M/M/1 queues. This game is solved by the well-known method of successive average. And a preliminary experimental result has been reported on a small 2x2 grid network. The finding sheds insights on three scenarios reflecting different intelligence levels inherited by the attacker and the defender in comparison with the equivalent settings without the attacker. Finally, future work worth investigating has been given.
引用
收藏
页码:354 / 358
页数:5
相关论文
共 50 条
  • [21] Jamming attack in Wireless Sensor Network: From time to space
    Wireless Network Group, School of Computer, National University of Defense Technology, Changsha, 410073, China
    IEICE Trans Commun, 6 (2113-2116):
  • [22] Detection of Jamming Style DoS attack in Wireless Sensor Network
    Manju, V. C.
    Kumar, Sasi M.
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 563 - 567
  • [23] A GAME THEORETIC APPROACH TO GRAY HOLE ATTACKS IN WIRELESS MESH NETWORKS
    Shila, Devu Manikantan
    Anjali, Tricha
    2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 4152 - 4158
  • [24] Evolutionary Game Theoretic Analysis of Distributed Denial of Service Attacks in a Wireless Network
    Abass, Ahmed A. Alabdel
    Hajimirsadeghi, Mohammad
    Mandayam, Narayan B.
    Gajic, Zoran
    2016 ANNUAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEMS (CISS), 2016,
  • [25] Jamming Attack in Wireless Sensor Network: From Time to Space
    Sun, Yanqiang
    Wang, Xiaodong
    Zhou, Xingming
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2012, E95B (06) : 2113 - 2116
  • [26] Analysis of Adversarial Jamming From a Quantum Game Theoretic Perspective
    Borah, Shantom Kumar
    Anand, Shivansh
    Agarwal, Rishabh Vipul
    Bitragunta, Sainath
    IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 881 - 891
  • [27] Jamming the Underwater: a Game-Theoretic Analysis of Energy-Depleting Jamming Attacks
    Signori, Alberto
    Pielli, Chiara
    Chiariotti, Federico
    Giordani, Marco
    Campagnaro, Filippo
    Laurenti, Nicola
    Zorzi, Michele
    WUWNET'19: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON UNDERWATER NETWORKS & SYSTEMS, 2019,
  • [28] A game-theoretic analysis on the conditions of cooperation in a wireless ad hoc network
    Bandyopadhyay, S
    Bandyopadhyay, S
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS, 2005, : 54 - 58
  • [29] Capacity and Fairness Analysis of Game Theoretic Power Controlled Wireless Access Network
    Vattanaviboon, Katan
    Komolkiti, Patrachart
    Aswakul, Chaodit
    FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, MODELLING AND SIMULATION (ISMS 2013), 2013, : 578 - 583
  • [30] Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach
    Coordinated Science Laboratory, University of Illinois, Urbana-Champaign, IL, United States
    不详
    不详
    不详
    Proc IEEE Mil Commun Conf MILCOM, 2010, (119-124):