Skip to main content

A Connectivity Game with Incomplete Information on Jammer’s Location

  • Conference paper
  • First Online:
Internet of Things, Smart Spaces, and Next Generation Networks and Systems (NEW2AN 2019, ruSMART 2019)

Abstract

In this paper we consider the problem of maintaining communication between a transmitter and a receiver in the presence of hostile interference. To maintain communication the transmitter must keep the SINR greater or equal to an SINR threshold, while the adversary aims to break the communication by making this SINR less than this threshold. In particular, we focus on investigating how incomplete information about the adversary’s location can impact the rival’s strategies. Namely, we assume that the transmitter does not know the adversary’s location, but knows only an a priori distribution of possible adversary locations. The problem is formulated as a non-zero Bayesian game between the transmitter and the adversary in a Nash and Stackelberg framework for Rayleigh channel fading gains. Existence and uniqueness of both type of equilibria are proven and derived in closed form. We prove theoretically, and numerically illustrate, that the Stackelberg equilibrium strategy for the transmitter can be non-sensitive to the a priori information, while the Nash equilibrium strategy for the transmitter is always sensitive to such information. The condition when the Stackelberg transmitter equilibrium strategy is non-sensitive to a priori information is derived.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abuzainab, N., Saad, W.: Dynamic connectivity game for adversarial internet of battlefield things systems. IEEE Internet Things J. 5, 378–390 (2018)

    Article  Google Scholar 

  2. Amariucai, G.T., Wei, S., Kannan, R.: Minimax and maxmin solutions to gaussian jamming in block-fading channels under long term power constraints. In: 41st Annual Conference on Information Sciences and Systems (CISS), pp. 312–317 (2007)

    Google Scholar 

  3. Baston, V.J., Garnaev, A.Y.: A search game with a protector. Naval Res. Logistics 47, 85–96 (2000)

    Article  MathSciNet  Google Scholar 

  4. Cumanan, K., Ding, Z., Xu, M., Poor, H.V.: Secure multicast communications with private jammers. In: 17th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Edinburgh, UK (2016)

    Google Scholar 

  5. Dabcevic, K., Betancourt, A., Marcenaro, L., Regazzoni, C.S.: Intelligent cognitive radio jamming - a game-theoretical approach. EURASIP J. Adv. Signal Process. 2014, 171 (2014)

    Article  Google Scholar 

  6. El-Bardan, R., Brahma, S., Varshney, P.K.: Power control with jammer location uncertainty: a game theoretic perspective. In: 48th Annual Conference on Information Sciences and Systems (CISS), pp. 1–6 (2014)

    Google Scholar 

  7. Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Boston (1991)

    MATH  Google Scholar 

  8. Gao, Y., Xiao, Y., Wu, M., Xiao, M., Shao, J.: Game theory-based anti-jamming strategies for frequency hopping wireless communications. IEEE Trans. Wireless Commun. 17, 5314–5326 (2018)

    Article  Google Scholar 

  9. Garnaev, A., Hayel, Y., Altman, E., Avrachenkov, K.: Jamming game in a dynamic slotted ALOHA network. In: Jain, R., Kannan, R. (eds.) GameNets 2011. LNICST, vol. 75, pp. 429–443. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-30373-9_30

    Chapter  Google Scholar 

  10. Garnaev, A., Liu, Y., Trappe, W.: Anti-jamming strategy versus a low-power jamming attack when intelligence of adversary’s attack type is unknown. IEEE Trans. Signal Inf. Process. Netw. 2, 49–56 (2016)

    Article  MathSciNet  Google Scholar 

  11. Garnaev, A., Trappe, W.: To eavesdrop or jam, that is the question. In: Mellouk, A., Sherif, M.H., Li, J., Bellavista, P. (eds.) ADHOCNETS 2013. LNICSSITE, vol. 129, pp. 146–161. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-04105-6_10

    Chapter  Google Scholar 

  12. Garnaev, A., Trappe, W.: A bandwidth monitoring strategy under uncertainty of the adversary’s activity. IEEE Trans. Inf. Forensics Secur. 11, 837–849 (2016)

    Article  Google Scholar 

  13. Garnaev, A., Trappe, W.: Stability of communication link connectivity against hostile interference. In: 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP), pp. 136–140 (2017)

    Google Scholar 

  14. Garnaev, A., Trappe, W.: The rival might be not smart: revising a CDMA jamming game. In: IEEE Wireless Communications and Networking Conference (WCNC) (2018)

    Google Scholar 

  15. Garnaev, A., Trappe, W., Petropulu, A.: Equilibrium strategies for an OFDM network that might be under a jamming attack. In: 51st Annual Conference on Information Systems and Sciences (CISS), pp. 1–6 (2017)

    Google Scholar 

  16. Hajimirsaadeghi, M., Mandayam, N.B.: A dynamic colonel Blotto game model for spectrum sharing in wireless networks. In: 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 287–294 (2017)

    Google Scholar 

  17. Han, Z., Niyato, D., Saad, W., Basar, T., Hjrungnes, A.: Game Theory in Wireless and Communication Networks: Theory, Models, and Applications. Cambridge University Press, Cambridge (2012)

    MATH  Google Scholar 

  18. Liu, Y., Garnaev, A., Trappe, W.: Maintaining throughput network connectivity in ad hoc networks. In: 41th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6380–6384 (2016)

    Google Scholar 

  19. Namvar, N., Saad, W., Bahadori, N., Kelleys, B.: Jamming in the internet of things: a game-theoretic perspective. In: IEEE Global Communications Conference (GLOBECOM) (2016)

    Google Scholar 

  20. Nguyen, G.D., Kompella, S., Kam, C., Wieselthier, J.E., Ephremides, A.: Wireless link connectivity under hostile interference: nash and stackelberg equilibria. In: 14th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt) (2016)

    Google Scholar 

  21. Nguyen, G.D., Kompella, S., Kam, C., Wieselthier, J.E., Ephremides, A.: Impact of hostile interference on wireless link connectivity. IEEE Trans. Control Netw. Syst. 5, 1445–1456 (2018)

    Article  MathSciNet  Google Scholar 

  22. Song, T., Stark, W.E., Li, T., Tugnait, J.K.: Optimal multiband transmission under hostile jamming. IEEE Trans. Commun. 64, 4013–4027 (2016)

    Article  Google Scholar 

  23. Vadlamania, S., Eksioglub, B., Medala, H., Nandia, A.: Jamming attacks on wireless networks: a taxonomic survey. Int. J. Prod. Econ. 172, 76–94 (2016)

    Article  Google Scholar 

  24. Wu, Y., Wang, B., Liu, K.J.R.: Optimal power allocation strategy against jamming attacks using the colonel Blotto game. In: IEEE Global Telecommunications Conference (GLOBECOM), pp. 1–5 (2009)

    Google Scholar 

  25. Yang, D., Xue, G., Zhang, J., Richa, A., Fang, X.: Coping with a smart jammer in wireless networks: a Stackelberg game approach. IEEE Trans. Wireless Commun. 12, 4038–4047 (2013)

    Article  Google Scholar 

  26. Yu, Y., Sankar, R.: A cooperative game-theoretic approach to cellular network hand-off. In: Wireless Telecommunications Symposium (WTS), pp. 312–317 (2010)

    Google Scholar 

  27. Zhu, Q., Saad, W., Han, Z., Poor, H.V., Basar, T.: Eavesdropping and jamming in next-generation wireless networks: a game-theoretic approach. In: Military Communications Conference (MILCOM), pp. 119–124 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrey Garnaev .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Garnaev, A., Trappe, W. (2019). A Connectivity Game with Incomplete Information on Jammer’s Location. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN ruSMART 2019 2019. Lecture Notes in Computer Science(), vol 11660. Springer, Cham. https://doi.org/10.1007/978-3-030-30859-9_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30859-9_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30858-2

  • Online ISBN: 978-3-030-30859-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics