Abstract
To penetrate sensitive communication systems, attackers can attack the channel using an active time-varying (ATV) way, which will lead to a great information loss. The conventional approach is to encrypt the original signal making it difficult for attackers to get information. However, this technology is constrained by the limited wireless terminal equipment. In this paper, we choose to insert artificial noise into the channel, which aims at disturbing the attackers and reducing the loss of the system once attacks occur. However, this technology would produce some side effects and there is a tradeoff between inserting artificial noise and minimizing information loss. In this paper, we deal with this issue and propose a game-theoretic framework to minimize the total losses. We model the problem as a Stackelberg security game between the attacker and the defender. Furthermore, we propose a novel method to reduce the searching space of computing the Strong Stackelberg Equilibrium which is the optimal defense strategy. This algorithm reduces a M-dimensional problem to M 1-dimensional problems so that the complexity is lowered. The experimental results show that our proposed algorithm significantly outperforms other non-strategic strategies in terms of decreasing the total losses against ATV attacks.
Similar content being viewed by others
References
An B, Ordóñez F, Tambe M, Shieh E, Yang R, Baldwin C, DiRenzo J III, Moretti K, Maule B, Meyer G (2013) A deployed quantal response-based patrol planning system for the us coast guard. Interfaces 43(5):400–420
An B, Pita J, Shieh E, Tambe M, Kiekintveld C, Marecki J (2011) Guards and protect: next generation applications of security games. ACM SIGecom Exchanges 10(1):31–34
An B, Tambe M, Sinha A (2016) Stackelberg security games (SSG) basics and application overview. Improving homeland security decisions. Cambridge University Press, Cambridge
Chen L, Li M, Qin L, Jie Y (2018) A game-theoretic approach for channel security against active time-varying attacks based on artificial noise. Procedia Comput Sci 134:212–218
Conitzer V, Sandholm T (2006) Computing the optimal strategy to commit to. In: Proceedings of the 7th ACM conference on Electronic commerce. ACM, pp 82–90
Eltayesh F, Bentahar J, Mizouni R, Otrok H, Shakshuki E (2017) Refined game-theoretic approach to improve authenticity of outsourced databases. J Ambient Intell Hum Comput 8(3):329–344
Gagandeep A, Kumar P (2012) Analysis of different security attacks in manets on protocol stack a—review. Int J Eng Adv Technol (IJEAT) 1(5):269–275
Gallager RG (1968) Information theory and reliable communication, vol 588. Springer, Berlin
Goel S, Negi R (2008) Guaranteeing secrecy using artificial noise. IEEE Trans Wirel Commun 7(6):2180–2189
Han Z, Niyato D, Saad W, Başar T, Hjørungnes A (2012) Game theory in wireless and communication networks: theory, models, and applications. Cambridge University Press, Cambridge
Haskell W, Kar D, Fang F, Tambe M, Cheung S, Denicola E (2014) Robust protection of fisheries with compass. In: Twenty-Sixth IAAI conference
Jain M, Tsai J, Pita J, Kiekintveld C, Rathi S, Tambe M, Ordónez F (2010) Software assistants for randomized patrol planning for the lax airport police and the federal air marshal service. Interfaces 40(4):267–290
Laszka A, Vorobeychik Y, Koutsoukos X (2015) Optimal personalized filtering against spear-phishing attacks. In: Twenty-Ninth AAAI conference on artificial intelligence
Li X, Li S, Hao J, Feng Z, An B (2017) Optimal personalized defense strategy against man-in-the-middle attack. In: Thirty-First AAAI conference on artificial intelligence
Negi R, Goel S (2005) Secret communication using artificial noise. In: IEEE vehicular technology conference, vol. 62, p 1906 (Citeseer)
Nguyen TH, Sinha A, Gholami S, Plumptre A, Joppa L, Tambe M, Driciru M, Wanyama F, Rwetsiba A, Critchlow R et al (2016) Capture: a new predictive anti-poaching tool for wildlife protection. In: Proceedings of the 2016 international conference on autonomous agents & multiagent systems. International foundation for autonomous agents and multiagent systems, pp 767–775
Wang Y, Luo S, Gao J (2017) Uncertain extensive game with application to resource allocation of national security. J Ambient Intell Hum Comput 8(5):797–808
Yang J, Kim I-M, Kim DI (2013) Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdroppers. IEEE Trans Wirel Commun 12(6):2840–2852
Yang J, Kim I-M, Kim DI (2014) Joint design of optimal cooperative jamming and power allocation for linear precoding. IEEE Trans Commun 62(9):3285–3298
Yang Q, Chen KF (2006) Information hiding capacity in unknown channel. Comput Simul 23(3):104–106
Zhang J, Yin J, Xu T, Gao Z, Qi H, Yin H (2018) The optimal game model of energy consumption for nodes cooperation in WSN. J Ambient Intell Hum Comput 2018:1–11
Acknowledgements
This paper is supported by Nature Science Foundation of China under Grant nos. 61572095, 61877007. An earlier version of this paper was presented at the 13th International Conference on Future Networks and Communications.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
The authors declare that they have no conflict of interest.
Humans and animals participants
This article does not contain any studies with human participants or animals performed by any of the authors.
Informed consent
Informed consent was obtained from all individual participants included in the study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chen, L., Li, M., Qin, L. et al. A game-theoretic approach for channel security against active time-varying attacks based on artificial noise. J Ambient Intell Human Comput 11, 2215–2224 (2020). https://doi.org/10.1007/s12652-019-01350-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-019-01350-x