Anti-Jamming Communication Game for UAV-Aided VANETs

Vehicular ad-hoc networks (VANETs) are vulnerable to jamming attacks, and frequency hopping-based anti- jamming techniques are not always applicable in VANETs due to the high mobility of the onboard units (OBUs) especially under a large scale network topology. In this paper, we use unmanned aerial vehicles (UAVs) to deal with VANET jamming, especially smart jamming that changes the jamming policy based on the ongoing communication status of the VANET. More specifically, the UAV relays the data of OBUs to another roadside unit (RSU) with a better transmission condition if the serving RSU is located in a heavily jammed area. The interactions between the UAV and the jammer are formulated as an anti-jamming UAV relay game, in which the UAV decides whether or not to relay the data of the OBU to another RSU that is far away from the jammer, and the latter chooses the jamming power. The Nash equilibria (NE) of the game are derived to reveal how the best UAV relay strategy depends on the transmission cost and the radio channel model. A hotbooting policy hill climbing (PHC)-based UAV relay strategy is proposed to address jamming in the dynamic UAV-aided VANET game without the knowledge of network model and jamming model. Simulation results show that the proposed relay strategy can efficiently reduce the bit error rate (BER) of OBU data and thus increase the utility of VANET in comparison with a Q-learning based scheme.

[1]  H. Vincent Poor,et al.  Prospect Theoretic Analysis of Energy Exchange Among Microgrids , 2015, IEEE Transactions on Smart Grid.

[2]  Mohsen Guizani,et al.  Stream-based cipher feedback mode in wireless error channel , 2009, IEEE Transactions on Wireless Communications.

[3]  Hannes Hartenstein,et al.  A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.

[4]  James Gross,et al.  In VANETs we trust?: characterizing RF jamming in vehicular networks , 2012, VANET@MOBICOM.

[5]  Leandro A. Villas,et al.  Exploiting the use of unmanned aerial vehicles to provide resilience in wireless sensor networks , 2014, IEEE Communications Magazine.

[6]  Andrej Vilhar,et al.  Base stations placement optimization in wireless networks for emergency communications , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).

[7]  Yi Zhou,et al.  Multi-UAV-Aided Networks: Aerial-Ground Cooperative Vehicular Networking Architecture , 2015, IEEE Vehicular Technology Magazine.

[8]  Tansu Alpcan,et al.  Security games for vehicular networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[9]  Walid Saad,et al.  Unmanned Aerial Vehicle With Underlaid Device-to-Device Communications: Performance and Tradeoffs , 2015, IEEE Transactions on Wireless Communications.

[10]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.

[11]  H. Vincent Poor,et al.  User-Centric View of Jamming Games in Cognitive Radio Networks , 2015, IEEE Transactions on Information Forensics and Security.

[12]  Liang Xiao Anti-Jamming Transmissions in Cognitive Radio Networks , 2015, SpringerBriefs in Electrical and Computer Engineering.

[13]  A. Lee Swindlehurst,et al.  Wireless Relay Communications with Unmanned Aerial Vehicles: Performance and Optimization , 2011, IEEE Transactions on Aerospace and Electronic Systems.

[14]  Zhi Chen,et al.  Improving Physical Layer Security Using UAV-Enabled Mobile Relaying , 2017, IEEE Wireless Communications Letters.

[15]  Hong Liu,et al.  A new anti-jamming strategy for VANET metrics-directed security defense , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[16]  Jalel Ben-Othman,et al.  Detection of Radio Interference Attacks in VANET , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[17]  Asgeir J. Sørensen,et al.  Unmanned aerial vehicle as communication relay for autonomous underwater vehicle — Field tests , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[18]  H. Vincent Poor,et al.  Two-dimensional anti-jamming communication based on deep reinforcement learning , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[19]  Xiaojiang Du,et al.  Permission-combination-based scheme for Android mobile malware detection , 2014, 2014 IEEE International Conference on Communications (ICC).