Jamming in the Internet of Things: A Game-Theoretic Perspective

Due to its scale and largely interconnected nature, the Internet of Things (IoT) will be vulnerable to a number of security threats that range from physical layer attacks to network layer attacks. In this paper, a novel anti jamming strategy for OFDM-based IoT systems is proposed which enables an IoT controller to protect the IoT devices against a malicious radio jammer. The interactions between the controller node and the jammer are modeled as a Colonel Blotto game with continuous and asymmetric resources. In this game, the IoT controller, acting as defender, seeks to thwart the jamming attack by distributing its power among the subcarries in a smart way so as to decrease the aggregate bit error rate (BER) caused by the jammer. The jammer, on the other hand, aims at disrupting the system performance by allocating its jamming power to different frequency bands. To solve the game, an evolutionary algorithm is proposed which can find a mixed-strategy Nash equilibrium of the Blotto game. Simulation results show that the proposed algorithm enables the IoT controller to maintain the BER above an acceptable threshold, thereby preserving the IoT network performance in the presence of malicious jamming.

[1]  Walid Saad,et al.  Game Theory for Networks: A tutorial on game-theoretic tools for emerging signal processing applications , 2016, IEEE Signal Processing Magazine.

[2]  Walid Saad,et al.  On the authentication of devices in the Internet of things , 2016, 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[3]  B. Roberson The Colonel Blotto game , 2006 .

[4]  Pramod K. Varshney,et al.  Power control with jammer location uncertainty: A Game Theoretic perspective , 2014, 2014 48th Annual Conference on Information Sciences and Systems (CISS).

[5]  Kwang-Cheng Chen,et al.  Information Fusion to Defend Intentional Attack in Internet of Things , 2014, IEEE Internet of Things Journal.

[6]  Olga Galinina,et al.  Understanding the IoT connectivity landscape: a contemporary M2M radio technology roadmap , 2015, IEEE Communications Magazine.

[7]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[8]  Damián H. Zanette,et al.  Evolutionary Dynamics of Resource Allocation in the Colonel Blotto Game , 2013 .

[9]  Jun Luo,et al.  Bit Error Rate Analysis of jamming for OFDM systems , 2007, 2007 Wireless Telecommunications Symposium.

[10]  Walid Saad,et al.  Toward Massive Machine Type Cellular Communications , 2017, IEEE Wireless Communications.

[11]  K. J. Ray Liu,et al.  Anti-Jamming Games in Multi-Channel Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[12]  Jürgen Schönwälder,et al.  Management of resource constrained devices in the internet of things , 2012, IEEE Communications Magazine.

[13]  Arshdeep Bahga,et al.  Internet of Things: A Hands-On Approach , 2014 .

[14]  Liang Zhou,et al.  Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.

[15]  Shivakant Mishra,et al.  Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.

[16]  Walid Saad,et al.  A Colonel Blotto Game for Anti-Jamming in the Internet of Things , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[17]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.