Skip to main content

To Eavesdrop or Jam, That is the Question

  • Conference paper
  • First Online:
Ad Hoc Networks (ADHOCNETS 2013)

Abstract

Physical layer secret communication is evaluated by the secrecy rate/capacity, which loosely is the Alice-Bob communication rate minus the Alice-Eve communication rate. Eve’s objective is to reduce the secrecy rate and typically this is accomplished by eavesdropping, but it also can be accomplished by Eve directing interference at Bob, reducing the Alice-Bob channel rate. We examine secret communication from Eve’s perspective, where she can either eavesdrop or jam, but not both simultaneously. There are costs and advantages associated with these two options, and to explore the selection between these two options, we apply a game-theoretical approach. We find the equilibrium strategies for two scenarios: (a) Alice and Eve have to decide the probability for which each can apply On/Off power strategies in choosing between eavesdropping and jamming options, (b) Alice and Eve tune transmission/jamming powers and Eve chooses either a single-level or bi-level mode for interfering with the Alice-Bob communication. We show in the tuned-power scenario that Eve prefers either pure jamming or a mixed strategy over pure eavesdropping. We show the concave dependence of Eve’s payoff on the eavesdropping fading channel gain. Surprisingly, we find that both Eve and Alice-Bob can benefit for a small range of eavesdropping channel gains when Eve switches from pure jamming to a mixed strategy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The authors note that the problem of whether the adversary should eavesdrop or jam on a multi-channel system in a zero-sum scenario with signal-to-interference-plus-noise ratio (SINR) as throughput has been explored by the authors [14], and the single-channel case in nonzero-sum scenario remarkably different from the earlier studied multi-channel zero-sum case.

References

  1. Wyner, A.D.: The wire-tap channel. Bell Syst. Tech. J. 54, 1355–1387 (1975)

    Article  MATH  MathSciNet  Google Scholar 

  2. Csiszár, I., Körner, J.: Broadcast channels with confidential messages. IEEE Trans. Inf. Theor. 24, 339–348 (1978)

    Article  MATH  Google Scholar 

  3. Liang, Y., Poor, H.V., Shamai, S.: Information Theoretic Security. Now Publishers, MA (2009)

    Google Scholar 

  4. Bloch, M., Barros, J.: Physical Layer Security. Cambridge University Press, Cambridge (2011)

    Book  MATH  Google Scholar 

  5. Liang, Y., Poor, H.V., Shamai, S.: Secure communications over fading channels. IEEE Trans. Inf. Theor. 54, 2470–2492 (2008)

    Article  MathSciNet  Google Scholar 

  6. Gopala, P.K., Lai, L., El Gamal, H.: On the secrecy capacity of fading channels. IEEE Trans. Inf. Theor. 54, 4687–4698 (2008)

    Article  MATH  Google Scholar 

  7. Liang, Y., Poor, H.V., Shamai, S.: Secrecy capacity region of parallel broadcast channels. In: ITA 2007, pp. 1291–1295 (2007)

    Google Scholar 

  8. Li, Z., Trappe, W., Yates, R.: Secret communication via multi-antenna transmission. In: CISS 2007, pp. 905–910 (2007)

    Google Scholar 

  9. Khisti, A., Wornell, G.: Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans. Inf. Theor. 56, 3088–3104 (2010)

    Article  MathSciNet  Google Scholar 

  10. Li, Z., Yates, R., Trappe, W.: Secure communication with a fading eavesdropper channel. In: ISIT 2007, pp. 1296–1300 (2007)

    Google Scholar 

  11. Koyluoglu, O.O., El Gamal, H., Lai, L., Poor, H.V.: Interference alignment for secrecy. IEEE Trans. Inf. Theor. 57, 3323–3332 (2011)

    Article  Google Scholar 

  12. Tang, X., Liu, R., Spasojevic, P., Poor, H.V.: Interference assisted secret communication. IEEE Trans. Inf. Theor. 57, 3153–3167 (2011)

    Article  MathSciNet  Google Scholar 

  13. Chortiy, A., Perlazay, S.M., Han, Z., Poor, H.V.: Physical layer security in wireless networks with passive and active eavesdroppers. In: IEEE GlobeCom 2012, pp. 4868–4873 (2012)

    Google Scholar 

  14. Garnaev, A., Trappe, W.: The eavesdropping and jamming dilemma in multi-channel communications. In: IEEE ICC 2013, pp. 753–757 (2013)

    Google Scholar 

  15. Zhu, Q., Saad, W., Han, Z., Poor, H.V., Basar, T.: Eavesdropping and jamming in next-generation wireless networks: a game-theoretic approach. In: MilCom 2011, pp. 119–124 (2011)

    Google Scholar 

  16. Sagduyu, Y.E., Ephremides, A.: A game-theoretic analysis of denial of service attacks in wireless random access. J. Wirel. Netw. 15, 651–666 (2009)

    Article  Google Scholar 

  17. Garnaev, A., Hayel, Y., Altman, E., Avrachenkov, K.: Jamming game in a dynamic slotted ALOHA network. In: Jain, R., Kannan, R. (eds.) GameNets 2011. LNICST, vol. 75, pp. 429–443. Springer, Heidelberg (2012)

    Google Scholar 

  18. Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1991)

    Google Scholar 

  19. Garnaev, A., Hayel, Y., Altman, E.: A Bayesian Jamming Game in an OFDM Wireless Network. In: WiOpt 2012, pp. 41–48 (2012)

    Google Scholar 

  20. Altman, E., Avrachenkov, K., Garnaev, A.: Taxation for green communication. In: WiOpt 2010, pp. 108–112 (2010)

    Google Scholar 

  21. Garnaev, A., Trappe, W., Kung, C.-T.: Dependence of optimal monitoring strategy on the application to be protected. In: IEEE GlobeCom 2012, 1054–1059 (2012)

    Google Scholar 

  22. Garnaev, A., Trappe, W., Kung, C.-T.: Optimizing scanning strategies: selecting scanning bandwidth in adversarial RF environments. In: CrownCom 2013 (2013)

    Google Scholar 

  23. Mukherjee, A., Swindlehurst, A.L.: Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels. In: MilCom 2010, pp. 1695–1700 (2010)

    Google Scholar 

  24. Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R., Thapa, B.: On the performance of IEEE 802.11. In: Infocom 2008 (2008)

    Google Scholar 

  25. Gupta, V., Krishnamurthy, S.V., Faloutsos, M.: Denial of service attacks at the MAC layer in wireless ad hoc networks. In: MilCom 2002, pp. 1118–1123 (2002)

    Google Scholar 

  26. Kyasanur, P., Vaidya, N.: Detection and handling of MAC layer misbehavior in wireless networks. In: DSN 2003, pp. 173–182 (2003)

    Google Scholar 

  27. Li, M., Koutsopoulos, I., Poovendran, R.: Optimal jamming attack and network defense policies in wireless sensor networks. In: Infocom 2007, pp. 1307–1315 (2007)

    Google Scholar 

  28. Xu, X., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: MobiHoc 2005, pp. 46–57 (2005)

    Google Scholar 

  29. Theodorakopoulos, G., Baras, J.S.: Game theoretic modeling of malicious users in collaborative networks. IEEE JSAC 26, 1317–1327 (2008)

    Google Scholar 

  30. Zander, J.: Jamming in slotted ALOHA multihop packet radio networks. IEEE Trans. Comm. 39, 1525–1531 (1991)

    Article  Google Scholar 

  31. Altman, E., Avrachenkov, K., Garnaev, A.: Fair resource allocation in wireless networks in the presence of a jammer. Perform. Eval. 67, 338–349 (2010)

    Article  Google Scholar 

  32. Altman, E., Avrachenkov, K., Garnaev, A.: Jamming in wireless networks under uncertainty. Mob. Netw. Appl. 16, 246–254 (2011)

    Article  Google Scholar 

  33. Awerbuch, B., Richa, A.W., Scheideler, C.: A jamming-resistant MAC protocol for single-hop wireless networks. In: ACM PODC 2008 (2008)

    Google Scholar 

  34. Kashyap, A., Basar, T., Srikant, R.: Correlated jamming on MIMO gaussian fading channels. IEEE Trans. Inf. Theor. 50, 2119–2123 (2004)

    Article  MathSciNet  Google Scholar 

  35. Buttyan, L.: Security and Cooperation in Wireless Networks. Cambridge University Press, Cambridge (2007)

    Book  Google Scholar 

  36. Mallik, R.K., Scholtz, R.A., Papavassilopoulos, G.P.: Analysis of an On-Off jamming situation as a dynamic game. IEEE Trans. Comm. 48, 1360–1373 (2000)

    Article  Google Scholar 

  37. Altman, E., Avrachenkov, K., Garnaev, A.: Transmission power control game with SINR as objective function. In: Altman, E., Chaintreau, A. (eds.) NET-COOP 2008. LNCS, vol. 5425, pp. 112–120. Springer, Heidelberg (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrey Garnaev .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Garnaev, A., Trappe, W. (2014). To Eavesdrop or Jam, That is the Question. In: Sherif, M., Mellouk, A., Li, J., Bellavista, P. (eds) Ad Hoc Networks. ADHOCNETS 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 129. Springer, Cham. https://doi.org/10.1007/978-3-319-04105-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04105-6_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04104-9

  • Online ISBN: 978-3-319-04105-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics