Jamming the Underwater: a Game-Theoretic Analysis of Energy-Depleting Jamming Attacks

被引:3
|
作者
Signori, Alberto [1 ]
Pielli, Chiara [1 ]
Chiariotti, Federico [1 ]
Giordani, Marco [1 ]
Campagnaro, Filippo [1 ]
Laurenti, Nicola [1 ]
Zorzi, Michele [1 ]
机构
[1] Univ Padua, Dept Informat Engn DEI, Padua, Italy
关键词
Underwater acoustic networks; jamming; game theory; block code; security in underwater networks; NETWORKS;
D O I
10.1145/3366486.3366546
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Underwater sensor networks can be employed in both military and environmental remote coastal monitoring applications, such as enemy targeting and identification, and tsunami prevention. Jamming can be a serious issue in these networks, typically composed by battery-powered nodes, as an attacker can not only disrupt packet delivery, but also reduce the lifetime of energy-constrained nodes. In this work, we consider a malicious jammer with the dual objective of preventing communication and depleting the battery of a targeted underwater sensor node. The jammed node may use packet-level coding as a countermeasure against the attack, so as to increase its chances of correctly delivering its information to the legitimate receiver. We model this scenario as a multistage game, derive the optimal long-term strategies for both sides, and evaluate how the position of the jammer affects the communication of the legitimate network.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] A Game-Theoretic and Experimental Analysis of Energy-Depleting Underwater Jamming Attacks
    Signori, Alberto
    Chiariotti, Federico
    Campagnaro, Filippo
    Zorzi, Michele
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) : 9793 - 9804
  • [2] A Game-Theoretic Analysis of Energy-Depleting Jamming Attacks
    Pielli, Chiara
    Chiariotti, Federico
    Laurenti, Nicola
    Zanella, Andrea
    Zorzi, Michele
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 100 - 104
  • [3] A Game-Theoretic Analysis of Energy-Depleting Jamming Attacks with a Learning Counterstrategy
    Chiariotti, Federico
    Pielli, Chiara
    Laurenti, Nicola
    Zanella, Andrea
    Zorzi, Michele
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2020, 16 (01)
  • [4] Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis
    D'Oro, Salvatore
    Galluccio, Laura
    Morabito, Giacomo
    Palazzo, Sergio
    Chen, Lin
    Martignon, Fabio
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (05) : 2337 - 2352
  • [5] JAMMING IN MOBILE NETWORKS: A GAME-THEORETIC APPROACH
    Bhattacharya, Sourabh
    Gupta, Abhishek
    Basar, Tamer
    [J]. NUMERICAL ALGEBRA CONTROL AND OPTIMIZATION, 2013, 3 (01): : 1 - 30
  • [6] Jamming in the Internet of Things: A Game-Theoretic Perspective
    Namvar, Nima
    Saad, Walid
    Bahadori, Niloofar
    Kelley, Brian
    [J]. 2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [7] Mitigating Jamming Attack: A Game-Theoretic Perspective
    Wang, Qiwei
    Thinh Nguyen
    Khanh Pham
    Kwon, Hyuck
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (07) : 6063 - 6074
  • [8] Adaptive topologies against jamming attacks in wireless networks: A game-theoretic approach
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 121 : 44 - 58
  • [9] Dynamic Game-Theoretic Defense Approach against Stealthy Jamming Attacks in Wireless Networks
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    [J]. 2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2017, : 252 - 258
  • [10] Game-theoretic analysis of an aerial jamming attack on a UAV communication network
    Bhattacharya, Sourabh
    Basar, Tamer
    [J]. 2010 AMERICAN CONTROL CONFERENCE, 2010, : 818 - 823