Skip to main content
Log in

A game-theoretic approach for channel security against active time-varying attacks based on artificial noise

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

To penetrate sensitive communication systems, attackers can attack the channel using an active time-varying (ATV) way, which will lead to a great information loss. The conventional approach is to encrypt the original signal making it difficult for attackers to get information. However, this technology is constrained by the limited wireless terminal equipment. In this paper, we choose to insert artificial noise into the channel, which aims at disturbing the attackers and reducing the loss of the system once attacks occur. However, this technology would produce some side effects and there is a tradeoff between inserting artificial noise and minimizing information loss. In this paper, we deal with this issue and propose a game-theoretic framework to minimize the total losses. We model the problem as a Stackelberg security game between the attacker and the defender. Furthermore, we propose a novel method to reduce the searching space of computing the Strong Stackelberg Equilibrium which is the optimal defense strategy. This algorithm reduces a M-dimensional problem to M 1-dimensional problems so that the complexity is lowered. The experimental results show that our proposed algorithm significantly outperforms other non-strategic strategies in terms of decreasing the total losses against ATV attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  • An B, Ordóñez F, Tambe M, Shieh E, Yang R, Baldwin C, DiRenzo J III, Moretti K, Maule B, Meyer G (2013) A deployed quantal response-based patrol planning system for the us coast guard. Interfaces 43(5):400–420

    Article  Google Scholar 

  • An B, Pita J, Shieh E, Tambe M, Kiekintveld C, Marecki J (2011) Guards and protect: next generation applications of security games. ACM SIGecom Exchanges 10(1):31–34

    Article  Google Scholar 

  • An B, Tambe M, Sinha A (2016) Stackelberg security games (SSG) basics and application overview. Improving homeland security decisions. Cambridge University Press, Cambridge

    Google Scholar 

  • Chen L, Li M, Qin L, Jie Y (2018) A game-theoretic approach for channel security against active time-varying attacks based on artificial noise. Procedia Comput Sci 134:212–218

    Article  Google Scholar 

  • Conitzer V, Sandholm T (2006) Computing the optimal strategy to commit to. In: Proceedings of the 7th ACM conference on Electronic commerce. ACM, pp 82–90

  • Eltayesh F, Bentahar J, Mizouni R, Otrok H, Shakshuki E (2017) Refined game-theoretic approach to improve authenticity of outsourced databases. J Ambient Intell Hum Comput 8(3):329–344

    Article  Google Scholar 

  • Gagandeep A, Kumar P (2012) Analysis of different security attacks in manets on protocol stack a—review. Int J Eng Adv Technol (IJEAT) 1(5):269–275

    Google Scholar 

  • Gallager RG (1968) Information theory and reliable communication, vol 588. Springer, Berlin

    MATH  Google Scholar 

  • Goel S, Negi R (2008) Guaranteeing secrecy using artificial noise. IEEE Trans Wirel Commun 7(6):2180–2189

    Article  Google Scholar 

  • Han Z, Niyato D, Saad W, Başar T, Hjørungnes A (2012) Game theory in wireless and communication networks: theory, models, and applications. Cambridge University Press, Cambridge

    MATH  Google Scholar 

  • Haskell W, Kar D, Fang F, Tambe M, Cheung S, Denicola E (2014) Robust protection of fisheries with compass. In: Twenty-Sixth IAAI conference

  • Jain M, Tsai J, Pita J, Kiekintveld C, Rathi S, Tambe M, Ordónez F (2010) Software assistants for randomized patrol planning for the lax airport police and the federal air marshal service. Interfaces 40(4):267–290

    Article  Google Scholar 

  • Laszka A, Vorobeychik Y, Koutsoukos X (2015) Optimal personalized filtering against spear-phishing attacks. In: Twenty-Ninth AAAI conference on artificial intelligence

  • Li X, Li S, Hao J, Feng Z, An B (2017) Optimal personalized defense strategy against man-in-the-middle attack. In: Thirty-First AAAI conference on artificial intelligence

  • Negi R, Goel S (2005) Secret communication using artificial noise. In: IEEE vehicular technology conference, vol. 62, p 1906 (Citeseer)

  • Nguyen TH, Sinha A, Gholami S, Plumptre A, Joppa L, Tambe M, Driciru M, Wanyama F, Rwetsiba A, Critchlow R et al (2016) Capture: a new predictive anti-poaching tool for wildlife protection. In: Proceedings of the 2016 international conference on autonomous agents & multiagent systems. International foundation for autonomous agents and multiagent systems, pp 767–775

  • Wang Y, Luo S, Gao J (2017) Uncertain extensive game with application to resource allocation of national security. J Ambient Intell Hum Comput 8(5):797–808

    Article  Google Scholar 

  • Yang J, Kim I-M, Kim DI (2013) Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdroppers. IEEE Trans Wirel Commun 12(6):2840–2852

    Article  MathSciNet  Google Scholar 

  • Yang J, Kim I-M, Kim DI (2014) Joint design of optimal cooperative jamming and power allocation for linear precoding. IEEE Trans Commun 62(9):3285–3298

    Article  Google Scholar 

  • Yang Q, Chen KF (2006) Information hiding capacity in unknown channel. Comput Simul 23(3):104–106

    Google Scholar 

  • Zhang J, Yin J, Xu T, Gao Z, Qi H, Yin H (2018) The optimal game model of energy consumption for nodes cooperation in WSN. J Ambient Intell Hum Comput 2018:1–11

    Google Scholar 

Download references

Acknowledgements

This paper is supported by Nature Science Foundation of China under Grant nos. 61572095, 61877007. An earlier version of this paper was presented at the 13th International Conference on Future Networks and Communications.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ling Chen.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflict of interest.

Humans and animals participants

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, L., Li, M., Qin, L. et al. A game-theoretic approach for channel security against active time-varying attacks based on artificial noise. J Ambient Intell Human Comput 11, 2215–2224 (2020). https://doi.org/10.1007/s12652-019-01350-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-019-01350-x

Keywords

Navigation