Abstract
In this paper we consider the problem of maintaining communication between a transmitter and a receiver in the presence of hostile interference. To maintain communication the transmitter must keep the SINR greater or equal to an SINR threshold, while the adversary aims to break the communication by making this SINR less than this threshold. In particular, we focus on investigating how incomplete information about the adversary’s location can impact the rival’s strategies. Namely, we assume that the transmitter does not know the adversary’s location, but knows only an a priori distribution of possible adversary locations. The problem is formulated as a non-zero Bayesian game between the transmitter and the adversary in a Nash and Stackelberg framework for Rayleigh channel fading gains. Existence and uniqueness of both type of equilibria are proven and derived in closed form. We prove theoretically, and numerically illustrate, that the Stackelberg equilibrium strategy for the transmitter can be non-sensitive to the a priori information, while the Nash equilibrium strategy for the transmitter is always sensitive to such information. The condition when the Stackelberg transmitter equilibrium strategy is non-sensitive to a priori information is derived.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abuzainab, N., Saad, W.: Dynamic connectivity game for adversarial internet of battlefield things systems. IEEE Internet Things J. 5, 378–390 (2018)
Amariucai, G.T., Wei, S., Kannan, R.: Minimax and maxmin solutions to gaussian jamming in block-fading channels under long term power constraints. In: 41st Annual Conference on Information Sciences and Systems (CISS), pp. 312–317 (2007)
Baston, V.J., Garnaev, A.Y.: A search game with a protector. Naval Res. Logistics 47, 85–96 (2000)
Cumanan, K., Ding, Z., Xu, M., Poor, H.V.: Secure multicast communications with private jammers. In: 17th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Edinburgh, UK (2016)
Dabcevic, K., Betancourt, A., Marcenaro, L., Regazzoni, C.S.: Intelligent cognitive radio jamming - a game-theoretical approach. EURASIP J. Adv. Signal Process. 2014, 171 (2014)
El-Bardan, R., Brahma, S., Varshney, P.K.: Power control with jammer location uncertainty: a game theoretic perspective. In: 48th Annual Conference on Information Sciences and Systems (CISS), pp. 1–6 (2014)
Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Boston (1991)
Gao, Y., Xiao, Y., Wu, M., Xiao, M., Shao, J.: Game theory-based anti-jamming strategies for frequency hopping wireless communications. IEEE Trans. Wireless Commun. 17, 5314–5326 (2018)
Garnaev, A., Hayel, Y., Altman, E., Avrachenkov, K.: Jamming game in a dynamic slotted ALOHA network. In: Jain, R., Kannan, R. (eds.) GameNets 2011. LNICST, vol. 75, pp. 429–443. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-30373-9_30
Garnaev, A., Liu, Y., Trappe, W.: Anti-jamming strategy versus a low-power jamming attack when intelligence of adversary’s attack type is unknown. IEEE Trans. Signal Inf. Process. Netw. 2, 49–56 (2016)
Garnaev, A., Trappe, W.: To eavesdrop or jam, that is the question. In: Mellouk, A., Sherif, M.H., Li, J., Bellavista, P. (eds.) ADHOCNETS 2013. LNICSSITE, vol. 129, pp. 146–161. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-04105-6_10
Garnaev, A., Trappe, W.: A bandwidth monitoring strategy under uncertainty of the adversary’s activity. IEEE Trans. Inf. Forensics Secur. 11, 837–849 (2016)
Garnaev, A., Trappe, W.: Stability of communication link connectivity against hostile interference. In: 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP), pp. 136–140 (2017)
Garnaev, A., Trappe, W.: The rival might be not smart: revising a CDMA jamming game. In: IEEE Wireless Communications and Networking Conference (WCNC) (2018)
Garnaev, A., Trappe, W., Petropulu, A.: Equilibrium strategies for an OFDM network that might be under a jamming attack. In: 51st Annual Conference on Information Systems and Sciences (CISS), pp. 1–6 (2017)
Hajimirsaadeghi, M., Mandayam, N.B.: A dynamic colonel Blotto game model for spectrum sharing in wireless networks. In: 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 287–294 (2017)
Han, Z., Niyato, D., Saad, W., Basar, T., Hjrungnes, A.: Game Theory in Wireless and Communication Networks: Theory, Models, and Applications. Cambridge University Press, Cambridge (2012)
Liu, Y., Garnaev, A., Trappe, W.: Maintaining throughput network connectivity in ad hoc networks. In: 41th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6380–6384 (2016)
Namvar, N., Saad, W., Bahadori, N., Kelleys, B.: Jamming in the internet of things: a game-theoretic perspective. In: IEEE Global Communications Conference (GLOBECOM) (2016)
Nguyen, G.D., Kompella, S., Kam, C., Wieselthier, J.E., Ephremides, A.: Wireless link connectivity under hostile interference: nash and stackelberg equilibria. In: 14th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt) (2016)
Nguyen, G.D., Kompella, S., Kam, C., Wieselthier, J.E., Ephremides, A.: Impact of hostile interference on wireless link connectivity. IEEE Trans. Control Netw. Syst. 5, 1445–1456 (2018)
Song, T., Stark, W.E., Li, T., Tugnait, J.K.: Optimal multiband transmission under hostile jamming. IEEE Trans. Commun. 64, 4013–4027 (2016)
Vadlamania, S., Eksioglub, B., Medala, H., Nandia, A.: Jamming attacks on wireless networks: a taxonomic survey. Int. J. Prod. Econ. 172, 76–94 (2016)
Wu, Y., Wang, B., Liu, K.J.R.: Optimal power allocation strategy against jamming attacks using the colonel Blotto game. In: IEEE Global Telecommunications Conference (GLOBECOM), pp. 1–5 (2009)
Yang, D., Xue, G., Zhang, J., Richa, A., Fang, X.: Coping with a smart jammer in wireless networks: a Stackelberg game approach. IEEE Trans. Wireless Commun. 12, 4038–4047 (2013)
Yu, Y., Sankar, R.: A cooperative game-theoretic approach to cellular network hand-off. In: Wireless Telecommunications Symposium (WTS), pp. 312–317 (2010)
Zhu, Q., Saad, W., Han, Z., Poor, H.V., Basar, T.: Eavesdropping and jamming in next-generation wireless networks: a game-theoretic approach. In: Military Communications Conference (MILCOM), pp. 119–124 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Garnaev, A., Trappe, W. (2019). A Connectivity Game with Incomplete Information on Jammer’s Location. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN ruSMART 2019 2019. Lecture Notes in Computer Science(), vol 11660. Springer, Cham. https://doi.org/10.1007/978-3-030-30859-9_22
Download citation
DOI: https://doi.org/10.1007/978-3-030-30859-9_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30858-2
Online ISBN: 978-3-030-30859-9
eBook Packages: Computer ScienceComputer Science (R0)