Abstract
Physical layer secret communication is evaluated by the secrecy rate/capacity, which loosely is the Alice-Bob communication rate minus the Alice-Eve communication rate. Eve’s objective is to reduce the secrecy rate and typically this is accomplished by eavesdropping, but it also can be accomplished by Eve directing interference at Bob, reducing the Alice-Bob channel rate. We examine secret communication from Eve’s perspective, where she can either eavesdrop or jam, but not both simultaneously. There are costs and advantages associated with these two options, and to explore the selection between these two options, we apply a game-theoretical approach. We find the equilibrium strategies for two scenarios: (a) Alice and Eve have to decide the probability for which each can apply On/Off power strategies in choosing between eavesdropping and jamming options, (b) Alice and Eve tune transmission/jamming powers and Eve chooses either a single-level or bi-level mode for interfering with the Alice-Bob communication. We show in the tuned-power scenario that Eve prefers either pure jamming or a mixed strategy over pure eavesdropping. We show the concave dependence of Eve’s payoff on the eavesdropping fading channel gain. Surprisingly, we find that both Eve and Alice-Bob can benefit for a small range of eavesdropping channel gains when Eve switches from pure jamming to a mixed strategy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The authors note that the problem of whether the adversary should eavesdrop or jam on a multi-channel system in a zero-sum scenario with signal-to-interference-plus-noise ratio (SINR) as throughput has been explored by the authors [14], and the single-channel case in nonzero-sum scenario remarkably different from the earlier studied multi-channel zero-sum case.
References
Wyner, A.D.: The wire-tap channel. Bell Syst. Tech. J. 54, 1355–1387 (1975)
Csiszár, I., Körner, J.: Broadcast channels with confidential messages. IEEE Trans. Inf. Theor. 24, 339–348 (1978)
Liang, Y., Poor, H.V., Shamai, S.: Information Theoretic Security. Now Publishers, MA (2009)
Bloch, M., Barros, J.: Physical Layer Security. Cambridge University Press, Cambridge (2011)
Liang, Y., Poor, H.V., Shamai, S.: Secure communications over fading channels. IEEE Trans. Inf. Theor. 54, 2470–2492 (2008)
Gopala, P.K., Lai, L., El Gamal, H.: On the secrecy capacity of fading channels. IEEE Trans. Inf. Theor. 54, 4687–4698 (2008)
Liang, Y., Poor, H.V., Shamai, S.: Secrecy capacity region of parallel broadcast channels. In: ITA 2007, pp. 1291–1295 (2007)
Li, Z., Trappe, W., Yates, R.: Secret communication via multi-antenna transmission. In: CISS 2007, pp. 905–910 (2007)
Khisti, A., Wornell, G.: Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans. Inf. Theor. 56, 3088–3104 (2010)
Li, Z., Yates, R., Trappe, W.: Secure communication with a fading eavesdropper channel. In: ISIT 2007, pp. 1296–1300 (2007)
Koyluoglu, O.O., El Gamal, H., Lai, L., Poor, H.V.: Interference alignment for secrecy. IEEE Trans. Inf. Theor. 57, 3323–3332 (2011)
Tang, X., Liu, R., Spasojevic, P., Poor, H.V.: Interference assisted secret communication. IEEE Trans. Inf. Theor. 57, 3153–3167 (2011)
Chortiy, A., Perlazay, S.M., Han, Z., Poor, H.V.: Physical layer security in wireless networks with passive and active eavesdroppers. In: IEEE GlobeCom 2012, pp. 4868–4873 (2012)
Garnaev, A., Trappe, W.: The eavesdropping and jamming dilemma in multi-channel communications. In: IEEE ICC 2013, pp. 753–757 (2013)
Zhu, Q., Saad, W., Han, Z., Poor, H.V., Basar, T.: Eavesdropping and jamming in next-generation wireless networks: a game-theoretic approach. In: MilCom 2011, pp. 119–124 (2011)
Sagduyu, Y.E., Ephremides, A.: A game-theoretic analysis of denial of service attacks in wireless random access. J. Wirel. Netw. 15, 651–666 (2009)
Garnaev, A., Hayel, Y., Altman, E., Avrachenkov, K.: Jamming game in a dynamic slotted ALOHA network. In: Jain, R., Kannan, R. (eds.) GameNets 2011. LNICST, vol. 75, pp. 429–443. Springer, Heidelberg (2012)
Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1991)
Garnaev, A., Hayel, Y., Altman, E.: A Bayesian Jamming Game in an OFDM Wireless Network. In: WiOpt 2012, pp. 41–48 (2012)
Altman, E., Avrachenkov, K., Garnaev, A.: Taxation for green communication. In: WiOpt 2010, pp. 108–112 (2010)
Garnaev, A., Trappe, W., Kung, C.-T.: Dependence of optimal monitoring strategy on the application to be protected. In: IEEE GlobeCom 2012, 1054–1059 (2012)
Garnaev, A., Trappe, W., Kung, C.-T.: Optimizing scanning strategies: selecting scanning bandwidth in adversarial RF environments. In: CrownCom 2013 (2013)
Mukherjee, A., Swindlehurst, A.L.: Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels. In: MilCom 2010, pp. 1695–1700 (2010)
Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R., Thapa, B.: On the performance of IEEE 802.11. In: Infocom 2008 (2008)
Gupta, V., Krishnamurthy, S.V., Faloutsos, M.: Denial of service attacks at the MAC layer in wireless ad hoc networks. In: MilCom 2002, pp. 1118–1123 (2002)
Kyasanur, P., Vaidya, N.: Detection and handling of MAC layer misbehavior in wireless networks. In: DSN 2003, pp. 173–182 (2003)
Li, M., Koutsopoulos, I., Poovendran, R.: Optimal jamming attack and network defense policies in wireless sensor networks. In: Infocom 2007, pp. 1307–1315 (2007)
Xu, X., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: MobiHoc 2005, pp. 46–57 (2005)
Theodorakopoulos, G., Baras, J.S.: Game theoretic modeling of malicious users in collaborative networks. IEEE JSAC 26, 1317–1327 (2008)
Zander, J.: Jamming in slotted ALOHA multihop packet radio networks. IEEE Trans. Comm. 39, 1525–1531 (1991)
Altman, E., Avrachenkov, K., Garnaev, A.: Fair resource allocation in wireless networks in the presence of a jammer. Perform. Eval. 67, 338–349 (2010)
Altman, E., Avrachenkov, K., Garnaev, A.: Jamming in wireless networks under uncertainty. Mob. Netw. Appl. 16, 246–254 (2011)
Awerbuch, B., Richa, A.W., Scheideler, C.: A jamming-resistant MAC protocol for single-hop wireless networks. In: ACM PODC 2008 (2008)
Kashyap, A., Basar, T., Srikant, R.: Correlated jamming on MIMO gaussian fading channels. IEEE Trans. Inf. Theor. 50, 2119–2123 (2004)
Buttyan, L.: Security and Cooperation in Wireless Networks. Cambridge University Press, Cambridge (2007)
Mallik, R.K., Scholtz, R.A., Papavassilopoulos, G.P.: Analysis of an On-Off jamming situation as a dynamic game. IEEE Trans. Comm. 48, 1360–1373 (2000)
Altman, E., Avrachenkov, K., Garnaev, A.: Transmission power control game with SINR as objective function. In: Altman, E., Chaintreau, A. (eds.) NET-COOP 2008. LNCS, vol. 5425, pp. 112–120. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Garnaev, A., Trappe, W. (2014). To Eavesdrop or Jam, That is the Question. In: Sherif, M., Mellouk, A., Li, J., Bellavista, P. (eds) Ad Hoc Networks. ADHOCNETS 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 129. Springer, Cham. https://doi.org/10.1007/978-3-319-04105-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-04105-6_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04104-9
Online ISBN: 978-3-319-04105-6
eBook Packages: Computer ScienceComputer Science (R0)