Jamming games in wireless networks with incomplete information

Due to their broadcast nature, wireless networks are highly susceptible to jamming attacks resulting in denial of service. Game theory provides powerful tools to model and analyze such attacks. This article discusses a class of such jamming games played at the MAC layer among a set of transmitters and jammers. The equilibrium strategies resulting from these jamming games characterize the expected performance under DoS attacks and motivate robust network protocol design for secure wireless communications. A key characteristic of distributed wireless access networks is that users do not have complete information regarding the other user's identities, the traffic dynamics, the channel characteristics, or the costs and rewards of other users. Bayesian games are shown to be useful for modeling such uncertainties under different models for the MAC layer. Different wireless network scenarios with single-stage and repeated game formulations are described to illustrate the performance loss of jamming attacks with increasing network uncertainty.

[1]  Anthony Ephremides,et al.  MAC games for distributed wireless network security with incomplete information of selfish and malicious user types , 2009, 2009 International Conference on Game Theory for Networks.

[2]  Anthony Ephremides,et al.  Wireless jamming attacks under dynamic traffic uncertainty , 2010, 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.

[3]  Stephen B. Wicker,et al.  Random Access Games: Selfish Nodes with Incomplete Information , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[4]  Moshe Babaioff,et al.  Congestion games with malicious players , 2007, EC '07.

[5]  Jeff S. Shamma,et al.  Dynamic fictitious play, dynamic gradient play, and distributed convergence to Nash equilibria , 2005, IEEE Transactions on Automatic Control.

[6]  Stephen B. Wicker,et al.  Random access game over noisy channels with capture effect , 2007, MSWiM '07.

[7]  Eitan Altman,et al.  Jamming game with incomplete information about the jammer , 2009, VALUETOOLS.

[8]  John S. Baras,et al.  Game Theoretic Modeling of Malicious Users in Collaborative Networks , 2008, IEEE Journal on Selected Areas in Communications.

[9]  Elaine Shi,et al.  Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[10]  Jerzy Konorski A game-theoretic study of CSMA/CA under a backoff attack , 2006, TNET.