Abstract
Reactive jamming, which launches jamming attacks when the legitimate transmissions are detected, is one of the most serious security threats in wireless communications. In this paper, we investigate the wireless security issue in the presence of a reactive jammer from a game-theoretical perspective. Specifically, the legitimate user and jammer respectively aim at maximize and minimize the expected legitimate transmission rate, which is formulated as a zero-sum game. For the jammer, we consider the imperfection in detection and analyze the optimal jamming strategy by the joint optimization over detection time and jamming power. For the legitimate user, the transmit power is optimized by achieving the tradeoff between obtained transmission rate and the probability to be accurately detected and thus jammed by its adversary. The Nash equilibrium is characterized by the best-response playing between the legitimate user and reactive jammer. Finally, we present simulation results to verify the effectiveness of our proposed approach.
The research work reported in this paper is supported by the the National Natural Science Foundation of China (NSFC) under Grant No. 61431011.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
We also refer to the legitimate pair as legitimate user.
- 2.
We will refer to the expected utility as utility for simplicity hereinafter.
References
Mukherjee, A., Fakoorian, S.A.A., Huang, J., Swindelhurst, A.L.: Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tuts. 16(3), 1550–1573 (2014)
Wang, Y., Ren, P., Gao, F.: Power allocation for statistical QoS provisioning in opportunistic multi-relay DF cognitive networks. IEEE Signal Process. Letts. 20(1), 43–46 (2013)
Wang, H., Zhang, L., Li, T., Tugnait, J.: Spectrally efficient jamming mitigation based on code-controlled frequency hopping. IEEE Trans. Wireless Commun. 10(3), 728–732 (2011)
Liu, Y., Ning, P., Dai, H., Liu, A.: Randomized differential DSSS: jamming-resistant wireless broadcast communication. In: 29th IEEE Conference on Computer Communications, pp. 1–5. IEEE Press, New York (2010)
Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: attack and defense strategies. IEEE Netw. 20(3), 41–47 (2006)
Wilhelm, M., Martinovic, I., Schmitt, J.B., Lenders, V.: Short paper: reactive jamming in wireless networks: how realistic is the threat?. In: 4th ACM Conference on Wireless Network Security, pp. 47–52. ACM, New York (2011)
Su, Z., Xu, Q., Zhu, H., Wang, Y.: A novel design for content delivery over software defined mobile social networks. IEEE Netw. 29(4) (2015)
Spuhler, M., Giustiniano, D., Lenders, V., Wilhelm, M., Schmitt, J.B.: Detection of reactive jamming in DSSS-based wireless communications. IEEE Trans. Wirel. Commun. 13(3), 1593–1603 (2014)
D’Oro, S., Galluccio, L., Morabito, G., Palazzo, S., Chen, L., Martignon, F.: Defeating jamming with the power of silence: a game-theoretic analysis. IEEE Trans. Wirel. Commun. 14(5), 2337–2352 (2015)
Richa, A., Scheideler, C., Schmid, S., Zhang, J.: An efficient and fair MAC protocol robust to reactive interference. IEEE/ACM Trans. Netw. 12(3), 760–771 (2013)
Wang, Y., Ren, P., Gao, F., Su, Z.: A hybrid underlay/overlay transmission mode for cognitive radio networks with statistical quality-of-service provisioning. IEEE Trans. Wirel. Commun. 13(3), 1482–1498 (2014)
Xu, Q., Su, Z., Han, B., Fang, D., Xu, Z., Gan, Z.: Analytical model with a novel selfishness division of mobile nodes to participate cooperation. Peer-to-Peer Netw. Appl., 1–9 (2015). doi:10.1007/s12083-015-0330-6
Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1991)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Tang, X., Ren, P., Du, Q., Sun, L. (2015). Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_48
Download citation
DOI: https://doi.org/10.1007/978-3-319-21837-3_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21836-6
Online ISBN: 978-3-319-21837-3
eBook Packages: Computer ScienceComputer Science (R0)