Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis

被引:39
|
作者
D'Oro, Salvatore [1 ]
Galluccio, Laura [1 ]
Morabito, Giacomo [1 ]
Palazzo, Sergio [1 ]
Chen, Lin [2 ]
Martignon, Fabio [2 ,3 ]
机构
[1] Univ Catania, CNIT Res Unit, I-95125 Catania, Italy
[2] Univ Paris 11, Lab Rech Informat, F-75205 Paris, France
[3] Inst Univ France, F-75005 Paris, France
关键词
Anti-jamming; timing channel; game-theoretic models; Nash equilibrium; WIRELESS NETWORKS; TIMING CHANNEL;
D O I
10.1109/TWC.2014.2385709
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The timing channel is a logical communication channel in which information is encoded in the timing between events. Recently, the use of the timing channel has been proposed as a countermeasure to reactive jamming attacks performed by an energy-constrained malicious node. In fact, while a jammer is able to disrupt the information contained in the attacked packets, timing information cannot be jammed, and therefore, timing channels can be exploited to deliver information to the receiver even on a jammed channel. Since the nodes under attack and the jammer have conflicting interests, their interactions can be modeled by means of game theory. Accordingly, in this paper, a game-theoretic model of the interactions between nodes exploiting the timing channel to achieve resilience to jamming attacks and a jammer is derived and analyzed. More specifically, the Nash equilibrium is studied in terms of existence, uniqueness, and convergence under best response dynamics. Furthermore, the case in which the communication nodes set their strategy and the jammer reacts accordingly is modeled and analyzed as a Stackelberg game, by considering both perfect and imperfect knowledge of the jammer's utility function. Extensive numerical results are presented, showing the impact of network parameters on the system performance.
引用
收藏
页码:2337 / 2352
页数:16
相关论文
共 50 条
  • [31] A Game-Theoretic Analysis of Catalog Optimization
    Oren, Joel
    Narodytska, Nina
    Boutilier, Craig
    [J]. PROCEEDINGS OF THE TWENTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2014, : 1463 - 1470
  • [32] A GAME-THEORETIC ANALYSIS OF A MOTORISTS DILEMMA
    MESTERTONGIBBONS, M
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 1990, 13 (02) : 9 - 14
  • [33] Game-theoretic analysis of watermark detection
    Moulin, P
    Ivanovic, A
    [J]. 2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2001, : 975 - 978
  • [34] Coalition formation: a game-theoretic analysis
    Mesterton-Gibbons, Mike
    Sherratt, Tom N.
    [J]. BEHAVIORAL ECOLOGY, 2007, 18 (02) : 277 - 286
  • [35] A game-theoretic analysis of TCP Vegas
    Trinh, TA
    Molnár, S
    [J]. QUALITY OF SERVICE IN THE EMERGING NETWORKING PANORAMA, PROCEEDINGS, 2004, 3266 : 338 - 347
  • [36] GAME-THEORETIC ANALYSIS OF BARGAINING WITH REPUTATIONS
    ROSENTHAL, RW
    LANDAU, HJ
    [J]. JOURNAL OF MATHEMATICAL PSYCHOLOGY, 1979, 20 (03) : 233 - 255
  • [37] A Game-Theoretic Analysis of Games with a Purpose
    Jain, Shaili
    Parkes, David C.
    [J]. INTERNET AND NETWORK ECONOMICS, PROCEEDINGS, 2008, 5385 : 342 - 350
  • [38] Deception in honeynets: A game-theoretic analysis
    Garg, Nandan
    Grosu, Daniel
    [J]. 2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 107 - +
  • [39] Social Eavesdropping: A Game-Theoretic Analysis
    Mike Mesterton-Gibbons
    Tom N. Sherratt
    [J]. Bulletin of Mathematical Biology, 2007, 69 : 1255 - 1276
  • [40] A Game-theoretic Analysis of Hybrid Threats
    Balcaen, Pieter
    Bois, Cind Du
    Buts, Caroline
    [J]. DEFENCE AND PEACE ECONOMICS, 2022, 33 (01) : 26 - 41