An Intelligent Pilot Contamination Attacker-Defender Model for Wireless Networks: A Stackelberg Game Based Approach

被引:0
|
作者
Zhangnan Wang
Yichen Wang
机构
[1] Xi’an Jiaotong University,School of Information and Communications Engineering
来源
关键词
Intelligent eavesdropper; Pilot contamination attack; Stackelberg game model; Secrecy rate;
D O I
暂无
中图分类号
学科分类号
摘要
Existing studies on pilot contamination attack often assume that the attack and jamming strategies of adversaries are fixed. The enemy has not made any strategic corrections to the detection plan. In this paper, we analyze how an intelligent malicious user considers the role of legitimate user and adjusts attacking strategy during training phase in wireless communication to improve his eavesdropping performance. By defender-attacker interaction as a Stackelberg game, Bob as the leader chooses his pilot training power, while a full-duplex eavesdropper as the follower determines the pilot contamination power according to the observed Bob’s ongoing training signals transmission. Two equilibriums under different strategy spaces are analyzed. Simulation results show that the proposed scheme can defend against an intelligent active eavesdropper with a higher secrecy rate and utility.
引用
收藏
页码:2163 / 2169
页数:6
相关论文
共 50 条
  • [1] An Intelligent Pilot Contamination Attacker-Defender Model for Wireless Networks: A Stackelberg Game Based Approach
    Wang, Zhangnan
    Wang, Yichen
    MOBILE NETWORKS & APPLICATIONS, 2022, 27 (05): : 2163 - 2169
  • [2] A Pilot Contamination Attacker-Defender Model for Wireless Networks Under Stackelberg Game
    Wang, Zhangnan
    Wang, Yichen
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [3] An Attacker-Defender Game Model with Constrained Strategies
    Ren, Jiaqi
    Liu, Jin
    Dong, Yibo
    Li, Zhe
    Li, Weili
    ENTROPY, 2024, 26 (08)
  • [4] Sequential Attacker-Defender Game on Complex Networks Considering the Cascading Failure Process
    Huang, Yuxuan
    Wu, Jiajing
    Tse, Chi K.
    Zheng, Zibin
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 9 (02): : 518 - 529
  • [5] A Temporal Model for the Prisoner's Dilemma and an Iterated Attacker-Defender Network Game
    Kovach, Nicholas
    Lamont, Gary
    PROCEEDINGS OF THE 2021 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2021, : 261 - 268
  • [6] A Time Correlated Attacker-Defender Model for Smart Grid Communication Networks
    Bi, Ying
    Jamalipour, Abbas
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 815 - 819
  • [7] Strategic safeguarding: A game theoretic approach for analyzing attacker-defender behavior in DNN backdoors
    Kassem Kallas
    Quentin Le Roux
    Wassim Hamidouche
    Teddy Furon
    EURASIP Journal on Information Security, 2024 (1)
  • [8] NIGA: A Novel Method for Investigating the Attacker-Defender Model within Critical Infrastructure Networks
    Ren, Jiaqi
    Liu, Jin
    Dong, Yibo
    Li, Zhe
    Li, Weili
    MATHEMATICS, 2024, 12 (16)
  • [9] Attacker-Defender Signaling Game in Multi-Period Based on Technology Accumulation and Bayesian Learning
    Zhou, Xiaoyan
    Huang, Jincai
    Cheng, Guangquan
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 1528 - 1534
  • [10] Stackelberg Game Approach For Wireless Virtualization Design in Wireless Networks
    Thinh Duy Tran
    Long Bao Le
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,