Enhancing wireless security against reactive jamming attacks: A game-theoretical framework

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Reactive jamming, which launches jamming attacks when the legitimate transmissions are detected, is one of the most serious security threats in wireless communications. In this paper, we investigate the wireless security issue in the presence of a reactive jammer from a game-theoretical perspective. Specifically, the legitimate user and jammer respectively aim at maximize and minimize the expected legitimate transmission rate, which is formulated as a zero-sum game. For the jammer, we consider the imperfection in detection and analyze the optimal jamming strategy by the joint optimization over detection time and jamming power. For the legitimate user, the transmit power is optimized by achieving the tradeoff between obtained transmission rate and the probability to be accurately detected and thus jammed by its adversary. The Nash equilibrium is characterized by the best-response playing between the legitimate user and reactive jammer. Finally, we present simulation results to verify the effectiveness of our proposed approach.

Original languageEnglish
Title of host publicationWireless Algorithms, Systems, and Applications - 10th International Conference, WASA 2015, Proceedings
EditorsKuai Xu, Haojin Zhu
PublisherSpringer Verlag
Pages487-496
Number of pages10
ISBN (Print)9783319218366
DOIs
StatePublished - 2015
Event10th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2015 - Qufu, China
Duration: 10 Aug 201512 Aug 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9204
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2015
Country/TerritoryChina
CityQufu
Period10/08/1512/08/15

Keywords

  • Nash equilibrium
  • Reactive jamming
  • Wireless security
  • Zero-sum game

Fingerprint

Dive into the research topics of 'Enhancing wireless security against reactive jamming attacks: A game-theoretical framework'. Together they form a unique fingerprint.

Cite this