Nothing Special   »   [go: up one dir, main page]

Skip to main content

Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9204))

  • 3688 Accesses

Abstract

Reactive jamming, which launches jamming attacks when the legitimate transmissions are detected, is one of the most serious security threats in wireless communications. In this paper, we investigate the wireless security issue in the presence of a reactive jammer from a game-theoretical perspective. Specifically, the legitimate user and jammer respectively aim at maximize and minimize the expected legitimate transmission rate, which is formulated as a zero-sum game. For the jammer, we consider the imperfection in detection and analyze the optimal jamming strategy by the joint optimization over detection time and jamming power. For the legitimate user, the transmit power is optimized by achieving the tradeoff between obtained transmission rate and the probability to be accurately detected and thus jammed by its adversary. The Nash equilibrium is characterized by the best-response playing between the legitimate user and reactive jammer. Finally, we present simulation results to verify the effectiveness of our proposed approach.

The research work reported in this paper is supported by the the National Natural Science Foundation of China (NSFC) under Grant No. 61431011.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    We also refer to the legitimate pair as legitimate user.

  2. 2.

    We will refer to the expected utility as utility for simplicity hereinafter.

References

  1. Mukherjee, A., Fakoorian, S.A.A., Huang, J., Swindelhurst, A.L.: Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tuts. 16(3), 1550–1573 (2014)

    Article  Google Scholar 

  2. Wang, Y., Ren, P., Gao, F.: Power allocation for statistical QoS provisioning in opportunistic multi-relay DF cognitive networks. IEEE Signal Process. Letts. 20(1), 43–46 (2013)

    Article  Google Scholar 

  3. Wang, H., Zhang, L., Li, T., Tugnait, J.: Spectrally efficient jamming mitigation based on code-controlled frequency hopping. IEEE Trans. Wireless Commun. 10(3), 728–732 (2011)

    Article  Google Scholar 

  4. Liu, Y., Ning, P., Dai, H., Liu, A.: Randomized differential DSSS: jamming-resistant wireless broadcast communication. In: 29th IEEE Conference on Computer Communications, pp. 1–5. IEEE Press, New York (2010)

    Google Scholar 

  5. Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: attack and defense strategies. IEEE Netw. 20(3), 41–47 (2006)

    Article  Google Scholar 

  6. Wilhelm, M., Martinovic, I., Schmitt, J.B., Lenders, V.: Short paper: reactive jamming in wireless networks: how realistic is the threat?. In: 4th ACM Conference on Wireless Network Security, pp. 47–52. ACM, New York (2011)

    Google Scholar 

  7. Su, Z., Xu, Q., Zhu, H., Wang, Y.: A novel design for content delivery over software defined mobile social networks. IEEE Netw. 29(4) (2015)

    Google Scholar 

  8. Spuhler, M., Giustiniano, D., Lenders, V., Wilhelm, M., Schmitt, J.B.: Detection of reactive jamming in DSSS-based wireless communications. IEEE Trans. Wirel. Commun. 13(3), 1593–1603 (2014)

    Article  Google Scholar 

  9. D’Oro, S., Galluccio, L., Morabito, G., Palazzo, S., Chen, L., Martignon, F.: Defeating jamming with the power of silence: a game-theoretic analysis. IEEE Trans. Wirel. Commun. 14(5), 2337–2352 (2015)

    Article  Google Scholar 

  10. Richa, A., Scheideler, C., Schmid, S., Zhang, J.: An efficient and fair MAC protocol robust to reactive interference. IEEE/ACM Trans. Netw. 12(3), 760–771 (2013)

    Article  Google Scholar 

  11. Wang, Y., Ren, P., Gao, F., Su, Z.: A hybrid underlay/overlay transmission mode for cognitive radio networks with statistical quality-of-service provisioning. IEEE Trans. Wirel. Commun. 13(3), 1482–1498 (2014)

    Article  Google Scholar 

  12. Xu, Q., Su, Z., Han, B., Fang, D., Xu, Z., Gan, Z.: Analytical model with a novel selfishness division of mobile nodes to participate cooperation. Peer-to-Peer Netw. Appl., 1–9 (2015). doi:10.1007/s12083-015-0330-6

  13. Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1991)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiao Tang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Tang, X., Ren, P., Du, Q., Sun, L. (2015). Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21837-3_48

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21836-6

  • Online ISBN: 978-3-319-21837-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics