Skip to main content

Anti-jamming Strategies: A Stochastic Game Approach

  • Conference paper
  • First Online:
Mobile Networks and Management (MONAMI 2014)

Abstract

Due to their shared and open-access design, wireless networks are very vulnerable to many malicious attacks, ranging from passive eavesdropping to active interfering. In this paper, using stochastic game modeling we study anti-jamming strategies and their effectiveness against two types of interference attacks: (i) a random jammer, where the malicious user combines jamming modes with sleep modes; and (ii) a sophisticated jammer, where the malicious user uses the network for a two-fold purpose: law-obedient communication with other users and non-obedient jamming against a specific (primary) user. We focus our research on constructing the optimal maxmin anti-jamming transmission strategy and an optimal strategy against a selfish malicious user. Further, employing the suggested models we demonstrate that incorporating silent modes into the anti-jamming transmission protocol, where the primary user does not transmit signals for the purpose of helping an intrusion detection system identify the source of a jamming attack, can improve communication reliability. Further, since the equilibrium strategies are obtained explicitly, we identify several interesting properties that can guide designing such anti-jamming transmission protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Vadlamani, S., Medal, H., Eksioglu, B.: Security in wireless networks: a tutorial. In: Butenko, S., Pasiliao, E.L., Shylo, V. (eds.) Examining Robustness and Vulnerability of Networked Systems, pp. 272–289. IOS Press, Boston (2014)

    Google Scholar 

  2. Sharma, A., Ahuja, S., Uddin, M.: A survey on data fusion and security threats in CR networks. Int. J. Curr. Eng. Technol. 4, 1770–1778 (2014)

    Google Scholar 

  3. Poisel, R.A.: Modern Communications Jamming Principles and Techniques. Artech House Publishers, London (2006)

    Google Scholar 

  4. Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. MobiHoc 2005, 46–57 (2005)

    Google Scholar 

  5. Negi, R., Goel, S.: Secret communication using artificial noise. In: IEEE VTC 2005, pp. 1906–1910 (2005)

    Google Scholar 

  6. Xu, W.: Jamming attack defense. In: Tilborg, H., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 655–661. Springer, New York (2011)

    Google Scholar 

  7. Wu, Y., Wang, B., Liu, K.J.R., Clancy, T.C.: Anti-jamming games in multi-channel cognitive radio networks. IEEE JSAC 30, 4–15 (2012)

    Google Scholar 

  8. Sagduyu, Y.E., Berry, R.A., Ephremides, A.: Jamming games for power controlled medium access with dynamic trafficc. In: IEEE ISIT 2010, pp. 1818–1822 (2010)

    Google Scholar 

  9. Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Boston (1991)

    Google Scholar 

  10. Manshaei, M.H., Zhu, Q., Alpcan, T., Basar, T., Hubaux, J.P.: Game theory meets network security and privacy. ACM Comput. Surv. 45, 25:1–25:39 (2013)

    Article  Google Scholar 

  11. Theodorakopoulos, G., Baras, J.S.: Game theoretic modeling of malicious users in collaborative networks. IEEE JSAC 26, 1317–1327 (2008)

    Google Scholar 

  12. Firouzbakht, K., Noubir, G., Salehi, M.: On the performance of adaptive packetized wireless communication links under jamming. IEEE Trans. Wirel. Commun. 13, 3481–3495 (2014)

    Article  Google Scholar 

  13. Garnaev, A., Baykal-Gursoy, M., Poor, H.V.: Incorporating attack-type uncertainty into network protection. IEEE Trans. Inf. Forensics Secur. 9, 1278–1287 (2014)

    Article  Google Scholar 

  14. Garnaev, Andrey, Hayel, Yezekael, Altman, Eitan, Avrachenkov, Konstantin: Jamming game in a dynamic slotted ALOHA network. In: Jain, Rahul, Kannan, Rajgopal (eds.) Gamenets 2011. LNICST, vol. 75, pp. 429–443. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  15. Chen, L., Leneutreb, J.: Fight jamming with jamming - a game theoretic analysis of jamming attack in wireless networks and defense strategy. Comput. Netw. 55, 2259–2270 (2011)

    Article  Google Scholar 

  16. Liao, X., Hao, D., Sakurai, K.: Classification on attacks in wireless ad hoc networks: a game theoretic view. In: 2011 7th International Conference on Networked Computing and Advanced Information Management (NCM), pp. 144–149 (2011)

    Google Scholar 

  17. Altman, E., Avrachenkov, K., Garnaev, A.: Fair resource allocation in wireless networks in the presence of a jammer. Perform. Eval. 67, 338–349 (2010)

    Article  Google Scholar 

  18. Amariucai, G.T., Wei, S.: Jamming games in fast-fading wireless channels. IJAACS 1, 411–424 (2008)

    Article  Google Scholar 

  19. Nguyen, K.C., Alpcan, T., Basar, T.: Stochastic games for security in networks with interdependent nodes. In: GameNets 2009, pp. 697–703 (2009)

    Google Scholar 

  20. Wang, B., Wu, Y., Liu, K.J.R., Clancy, T.C.: An anti-jamming stochastic game for cognitive radio networks. IEEE JSAC 29, 877–889 (2011)

    Google Scholar 

  21. DeBruhl, B., Kroer, C., Datta, A., Sandholm, T., Tague, P.: Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming. In: 2014 ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014), pp. 117–128 (2014)

    Google Scholar 

  22. Calinescu, G., Kapoor, S., Qiao, K., Shin, J.: Stochastic strategic routing reduces attack effects. In: GLOBECOM 2011, pp. 1–5 (2011)

    Google Scholar 

  23. Garnaev, A., Baykal-Gursoy, M., Poor, H.V.: A game theoretic analysis of secret and reliable communication with active and passive adversarial modes. IEEE Trans. Wirel. Commun. (2014, submitted)

    Google Scholar 

  24. Comaniciu, C., Mandayam, N.B., Poor, H.V.: Wireless Networks Multiuser Detection in Cross-Layer Design. Springer, New York (2005)

    Google Scholar 

  25. Verdu, S.: Multiuser Detection. Cambridge University Press, Cambridge (1998)

    MATH  Google Scholar 

  26. Trees, H.L.V.: Detection, Estimation, and Modulation Theory. Wiley, New York (2001)

    Book  Google Scholar 

  27. Urkowitz, H.: Energy detection of unknown deterministic signals. Proc. IEEE 55, 523–531 (1967)

    Article  Google Scholar 

  28. Digham, F.F., Alouini, M.S., Simon, M.K.: On the energy detection of unknown signals over fading channels. In: IEEE ICC 2003, pp. 3575–3579 (2003)

    Google Scholar 

  29. Garnaev, Andrey, Trappe, Wade: Stationary equilibrium strategies for bandwidth scanning. In: Jonsson, Magnus, Vinel, Alexey, Bellalta, Boris, Marina, Ninoslav, Dimitrova, Desislava, Fiems, Dieter (eds.) MACOM 2013. LNCS, vol. 8310, pp. 168–183. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  30. Garnaev, A., Trappe, W., Kung, C.-T.: Dependence of optimal monitoring strategy on the application to be protected. In: 2012 IEEE Global Communications Conference (GLOBECOM), pp. 1054–1059 (2012)

    Google Scholar 

  31. Altman, Eitan, Avrachenkov, Konstantin, Garnaev, Andrey: A jamming game in wireless networks with transmission cost. In: Chahed, Tijani, Tuffin, Bruno (eds.) NET-COOP 2007. LNCS, vol. 4465, pp. 1–12. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  32. Garnaev, A., Hayel, Y., Altman, E.: A Bayesian jamming game in an OFDM wireless network. In: 2012 10th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WIOPT), pp. 41–48 (2012)

    Google Scholar 

  33. Altman, E., Avrachenkov, K., Garnaev, A.: Jamming in wireless networks: the case of several jammers. In: International Conference on Game Theory for Networks (GameNets 2009), pp. 585–592 (2009)

    Google Scholar 

  34. Luo, Z.-Q., Pang, J.-S.: Analysis of iterative waterfilling algorithm for multiuser power control in digital subscriber lines. EURASIP J. Adv. Sign. Process. 2006, 10 (2006)

    Google Scholar 

  35. Yu, W., Ginis, G., Cioffi, J.M.: Distributed multiuser power control for digital subscriber lines. IEEE JSAC 20(5), 1105–1115 (2002)

    Google Scholar 

  36. Altman, E., Avrachenkov, K., Garnaev, A.: Closed form solutions for symmetric water filling games. In: 27th IEEE Communications Society Conference on Computer Communications (INFOCOM 2008), pp. 673–681 (2008)

    Google Scholar 

  37. Altman, E., Avrachenkov, K., Garnaev, A.: Closed form solutions for water-filling problem in optimization and game frameworks. Telecommun. Syst. 47, 153–164 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrey Garnaev .

Editor information

Editors and Affiliations

Appendix: Proof of Theorem 1

Appendix: Proof of Theorem 1

First note that \((T_J,J)\) is an equilibrium if and only if

$$\begin{aligned} u^1=a^1_{T_JJ}+\delta \gamma u^1 \ge a^1_{SJ}+\delta \gamma _S u^1, \end{aligned}$$
(14)
$$\begin{aligned} u^2=a^2_{T_JJ}+\delta \gamma u^2 \ge \delta u^2. \end{aligned}$$
(15)

Thus, \(u^1\) and \(u^2\) have to be given by (6). (15) always hold, and (14) holds if and only if (5) holds.

It is clear that there is no other pure equilibrium. Now look for mixed equilibrium. Let (7) hold. By (1) and (2), a couple of probability vectors \((\varvec{x}^1,\varvec{x}^2)\) is an equilibrium with payoffs \((u^1,u^2)\) if and only if it is a solution of the equations

$$\begin{aligned} u^1=U^1(u^1) \text{ and } u^2=U^2(u^2), \end{aligned}$$
(16)

where \((U^1(u^1),\varvec{x}^2)\) and \((U^2(u^2),\varvec{x}^1)\) are solution of the following LP problems:

$$\begin{aligned} \begin{array}{clll} \min U^1(u^1)&{}&{}&{}\\ L^1_{T_J}(u^1,x^2_S)&{}:=(a^1_{T_JS}+\delta u^1)x^2_S&{}+(a^1_{T_JJ}+\delta \gamma u^1) (1-x^2_S)&{}\le U^1(u^1), \\ L^1_S(u^1,x^2_S)&{}:=\delta u^1x^2_S&{}+(a^1_{SJ}+\delta \gamma _S u^1)(1-x^2_S) &{}\le U^1(u^1), \end{array} \end{aligned}$$
(17)
$$\begin{aligned} \begin{array}{clll} \min U^2(u^2)&{}&{}&{}\\ L^2_S(u^2,x^1_{T_J})&{}:=\delta u^2 x^1_{T_J}&{}+\delta u^2 (1-x^1_{T_J})&{}\le U^2(u^2), \\ L^2_J(u^2,x^1_{T_J})&{}:=(a^2_{T_JJ}+\delta \gamma u^2)x^1_{T_J}&{}+\delta \gamma _S u^2(1-x^1_{T_J}) &{}\le U^2(u^2) \end{array} \end{aligned}$$
(18)

with the complementary slackness conditions (3) and (4).

First, consider LP problem (17). By (7), we have that

$$\begin{aligned} a^1_{SJ}\ge a^1_{T_JJ}. \end{aligned}$$
(19)

Then, by (19), (see, Fig. 6) for any \(u^1\in [0,\bar{u}^1]\), where \(\bar{u}^1 =(a^1_{SJ}-a^1_{T_JJ})/(\delta (\gamma -\gamma _S))\), \(U^1(u^1)\) is a solution of the equations

$$ L^1_{T_J}(u^1,x^2_S) =U^1(u^1) \text{ and } L^1_S(u^1,x^2_S)=U^1(u^1). $$
Fig. 6.
figure 6

LP problem (17) for \(u^1<\bar{u}^1\) (left) and LP problem (17) for \(u^1=\bar{u}^1\) (right).

Thus,

$$\begin{aligned} U^1(u^1)=\frac{\delta ^2(\gamma -\gamma _S)(u^1)^2+\delta (a^1_{T_JJ}-a^1_{SJ}-\gamma _Sa^1_{T_JS})u^1-a^1_{SJ}a^1_{T_JS}}{ \delta (\gamma -\gamma _S)u^1+a^1_{T_JJ}-a^1_{SJ}-a^1_{T_JS}}. \end{aligned}$$
(20)

It is clear that

$$\begin{aligned} U^1(0)>0. \end{aligned}$$
(21)

By Fig. 6(b),

$$\begin{aligned} U^1(\bar{u}^1)=a^1_{T_JJ}+\delta \gamma \frac{a^1_{SJ}-a^1_{T_JJ}}{\delta (\gamma -\gamma _S)}<(\text{ by } (7))<\frac{a^1_{SJ}-a^1_{T_JJ}}{\delta (\gamma -\gamma _S)}=\bar{u}^1. \end{aligned}$$
(22)

Thus, by (21) and (22), since \(U^1\) is continuous, the Eq. (16) has at least one root in \([0,\bar{u}^1]\). By (20), this equation is equivalent to the following quadratic equation

$$\begin{aligned} c^1_2(u^1)^2+c^1_1u^1+ c^1_0=0 \end{aligned}$$
(23)

with \(c^1_i\), \(i=0,1,2\) given by (10). Since \(c^1_0>0\) and \(c^1_2>0\), by (21) and (22), the equation has the unique root in \([0,\bar{u}^1]\), while the second root of this quadratic equation is greater than \(\bar{u}^1\). Thus, (8) and (9) is solution of the LP problem (17). It is clear that (8) and (9) gives solution of the LP problem (17). Since the complementary slackness conditions (3) and (4) obviously hold, and the result follows.   \(\blacksquare \)

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Garnaev, A., Trappe, W. (2015). Anti-jamming Strategies: A Stochastic Game Approach. In: Agüero, R., Zinner, T., Goleva, R., Timm-Giel, A., Tran-Gia, P. (eds) Mobile Networks and Management. MONAMI 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 141. Springer, Cham. https://doi.org/10.1007/978-3-319-16292-8_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16292-8_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16291-1

  • Online ISBN: 978-3-319-16292-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics