@inproceedings{e7364ad9878548768bd6d4225753723a,
title = "Enhancing wireless security against reactive jamming attacks: A game-theoretical framework",
abstract = "Reactive jamming, which launches jamming attacks when the legitimate transmissions are detected, is one of the most serious security threats in wireless communications. In this paper, we investigate the wireless security issue in the presence of a reactive jammer from a game-theoretical perspective. Specifically, the legitimate user and jammer respectively aim at maximize and minimize the expected legitimate transmission rate, which is formulated as a zero-sum game. For the jammer, we consider the imperfection in detection and analyze the optimal jamming strategy by the joint optimization over detection time and jamming power. For the legitimate user, the transmit power is optimized by achieving the tradeoff between obtained transmission rate and the probability to be accurately detected and thus jammed by its adversary. The Nash equilibrium is characterized by the best-response playing between the legitimate user and reactive jammer. Finally, we present simulation results to verify the effectiveness of our proposed approach.",
keywords = "Nash equilibrium, Reactive jamming, Wireless security, Zero-sum game",
author = "Xiao Tang and Pinyi Ren and Qinghe Du and Li Sun",
note = "Publisher Copyright: {\textcopyright} Springer International Publishing Switzerland 2015.; 10th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2015 ; Conference date: 10-08-2015 Through 12-08-2015",
year = "2015",
doi = "10.1007/978-3-319-21837-3\_48",
language = "英语",
isbn = "9783319218366",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "487--496",
editor = "Kuai Xu and Haojin Zhu",
booktitle = "Wireless Algorithms, Systems, and Applications - 10th International Conference, WASA 2015, Proceedings",
}