Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach

The efficient design of next-generation wireless systems faces multifaceted problems involving a variety of node types such as wireless users, relay stations, base stations, eavesdroppers, and jammers. In this paper, the complex decision making processes between a network of wireless users that perform uplink transmission via relay stations and an active malicious node, that is able to act as an eavesdropper and as a jammer, is studied. A noncooperative game in which the users and the malicious node are the players is formulated. On the one hand, the users seek to choose the relay station that maximizes their utilities which reflect their mutual interference as well as the security of the chosen path. On the other hand, the objective of the malicious node is to choose whether to eavesdrop, jam, or use a combination of both strategies, in a way to reduce the total network capacity. To solve the game, a fictitious play-based algorithm is proposed using which the users and the malicious node reach a mixed-strategy Nash equilibrium. Simulation results show that the proposed approach improves the average expected utility per user up to 49.4% relative to a nearest neighbor algorithm. The results also show how the malicious node can strategically decide on whether to jam or eavesdrop depending on its capabilities and objectives.

[1]  D. Fudenberg,et al.  The Theory of Learning in Games , 1998 .

[2]  R. Srikant,et al.  Correlated jamming on MIMO Gaussian fading channels , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[3]  Kien T. Truong,et al.  Relay Architectures for 3GPP LTE-Advanced , 2009, EURASIP J. Wirel. Commun. Netw..

[4]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[5]  A. Lee Swindlehurst,et al.  Equilibrium Outcomes of Dynamic Games in MIMO Channels with Active Eavesdroppers , 2010, 2010 IEEE International Conference on Communications.

[6]  Carles Padró,et al.  Information Theoretic Security , 2013, Lecture Notes in Computer Science.

[7]  C. Siva Ram Murthy,et al.  Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .

[8]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[9]  Zhu Han,et al.  Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[10]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[11]  Jeff S. Shamma,et al.  Unified convergence proofs of continuous-time fictitious play , 2004, IEEE Transactions on Automatic Control.

[12]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[13]  Pin-Han Ho,et al.  Optimal relay station placement in IEEE 802.16j networks , 2007, IWCMC.

[14]  Quanyan Zhu,et al.  Hierarchical Network Formation Games in the Uplink of Multi-Hop Wireless Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[15]  Zhu Han,et al.  Relay-centric radio resource management and network planning in IEEE 802.16j mobile multihop relay networks , 2009, IEEE Transactions on Wireless Communications.