Fight jamming with jamming - A game theoretic analysis of jamming attack in wireless networks and defense strategy

被引:27
|
作者
Chen, Lin [1 ,2 ]
Leneutre, Jean [3 ]
机构
[1] Univ Paris 11, LRI, CNRS, F-91405 Orsay, France
[2] INRIA, F-91405 Orsay, France
[3] TELECOM ParisTech LTCI CNRS 5141, Dept Comp Sci & Networking, F-75013 Paris, France
基金
美国国家卫生研究院;
关键词
Jamming; Security game; Wireless network; Game theory;
D O I
10.1016/j.comnet.2011.03.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless networks, jamming is an easily mountable attack with detrimental effects on the victim network. Existing defense strategies mainly consist of retreating from the jammer or rerouting traffic around the jammed area. In this paper, we tackle the problem from a different angle. Motivated by the high energy-consuming nature of jamming, we propose our defense strategy to defeat the jammer by draining its energy as fast as possible. To gain an in-depth insight on jamming and to evaluate the proposed defense strategy, we model the interaction between the jammer and the victim network as a non-cooperative game which is proven to admit two equilibria. We demonstrate analytically that the proposed defense strategy can eliminate the undesirable equilibrium from the network's perspective and increase the jammer's energy consumption at the remaining equilibrium without degrading the performance of the victim network. We also investigate the game dynamics by developing the update mechanism for the players to adjust their strategies based on only observable channel information. Numerical study is then conducted to evaluate the performance of the proposed strategy. Results demonstrate its effectiveness in defeating jamming, especially when the jammer is aggressive. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:2259 / 2270
页数:12
相关论文
共 50 条
  • [1] Game Theoretic Modeling of Jamming Attack in Wireless Powered Communication Networks
    Niyato, Dusit
    Wang, Ping
    Kim, Dong In
    Han, Zhu
    Xiao, Lu
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 6018 - 6023
  • [2] Optimal Jamming Attack Strategy against Wireless State Estimation: A Game Theoretic Approach
    Xue, Lei
    Cao, Xianghui
    Sun, Changyin
    Jin, Shi
    [J]. IECON 2018 - 44TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2018, : 5989 - 5995
  • [3] Game Theoretic Analysis of Jamming Attack in Wireless Mesh Network with Delay Tolerance
    Benromarn, Satawat
    Komolkiti, Patrachart
    Aswakul, Chaodit
    [J]. 2013 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2013, : 354 - 358
  • [4] Persistent jamming in wireless local area networks: Attack and defense
    Lee, Il-Gu
    Kim, Myungchul
    [J]. COMPUTER NETWORKS, 2016, 109 : 67 - 83
  • [5] Satellite Jamming: A Game Theoretic Analysis
    Wang, Qiwei
    Thinh Nguyen
    Khanh Pham
    Kwon, Hyuck
    [J]. MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 141 - 146
  • [6] Dynamic Game-Theoretic Defense Approach against Stealthy Jamming Attacks in Wireless Networks
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    [J]. 2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2017, : 252 - 258
  • [7] Mitigating Jamming Attack: A Game-Theoretic Perspective
    Wang, Qiwei
    Thinh Nguyen
    Khanh Pham
    Kwon, Hyuck
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (07) : 6063 - 6074
  • [8] Jamming sensor networks: Attack and defense strategies
    Xu, Wenyuan
    Ma, Ke
    Trappe, Wade
    Zhang, Yanyong
    [J]. IEEE NETWORK, 2006, 20 (03): : 41 - 47
  • [9] Localization for Jamming Attack in Wireless Sensor Networks
    Zhang, Jing
    Xu, Li
    Shen, Qun
    Ji, Xiaorong
    [J]. INTELLIGENT DATA ANALYSIS AND APPLICATIONS, 2015, 370 : 361 - 369
  • [10] Modeling and simulation of defense game model for jamming attack in wireless sensor networks using evolutionary game theory
    Pitchai, K. Mohaideen
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (05):