MAC games for distributed wireless network security with incomplete information of selfish and malicious user types

We consider game theoretic models of wireless medium access control (MAC) in which each transmitter makes individual decisions regarding their power level or transmission probability. This allows for scalable distributed operation; however, it can also enable users to pursue malicious objectives such as jamming other nodes to deny them service. We study games with two types of players: selfish and malicious transmitters. Each type is characterized by a utility function depending on throughput reward and energy cost. Furthermore, we focus on the setting where the transmitters have incomplete information regarding other transmitters' types, modeled as probabilistic beliefs. We first analyze a power-controlled MAC game in which the nodes select powers for continuous transmissions and then extend this to a random access MAC in which nodes choose transmission probabilities. For each case, the Bayesian Nash equilibrium strategies are derived for different degrees of uncertainty, and the resulting equilibrium throughput of selfish nodes is characterized. We identify conditions in which the throughput improves with increasing type uncertainty and introduce Bayesian learning mechanisms to update the type beliefs in repeated games. For unknown types and costs, we also specify the equilibrium cut-off thresholds for monotonic transmission decisions. The analysis provides insights into the optimal defense mechanisms against denial of service attacks at the MAC layer in wireless networks.

[1]  Anthony Ephremides,et al.  SINR-based MAC Games for Selfish and Malicious Users , 2006 .

[2]  Jens Zander,et al.  Jamming in slotted ALOHA multihop packet radio networks , 1991, IEEE Trans. Commun..

[3]  JiHongbin,et al.  Non-cooperative uplink power control in cellular radio systems , 1998 .

[4]  John S. Baras,et al.  Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers , 2007, J. Comput. Secur..

[5]  Eitan Altman,et al.  A Jamming Game in Wireless Networks with Transmission Cost , 2007, NET-COOP.

[6]  Stephen B. Wicker,et al.  Random Access Games: Selfish Nodes with Incomplete Information , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[7]  R. Srikant,et al.  Correlated jamming on MIMO Gaussian fading channels , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[8]  Stephen B. Wicker,et al.  Game theory and the design of self-configuring, adaptive wireless networks , 2001, IEEE Commun. Mag..

[9]  John S. Baras,et al.  Game Theoretic Modeling of Malicious Users in Collaborative Networks , 2008, IEEE Journal on Selected Areas in Communications.

[10]  Ching-Yao Huang,et al.  Non-cooperative uplink power control in cellular radio systems , 1998, Wirel. Networks.

[11]  A. Robert Calderbank,et al.  Utility-optimal random-access control , 2007, IEEE Transactions on Wireless Communications.

[12]  George Kesidis,et al.  Equilibria of a noncooperative game for heterogeneous users of an ALOHA network , 2002, IEEE Communications Letters.

[13]  Moshe Babaioff,et al.  Congestion games with malicious players , 2007, EC '07.

[14]  Cem U. Saraydar,et al.  Efficient power control via pricing in wireless data networks , 2002, IEEE Trans. Commun..

[15]  R. Srikant,et al.  Correlated Jamming on MIMO Gaussian Fading Channels , 2004, IEEE Trans. Inf. Theory.

[16]  Anthony Ephremides,et al.  A game-theoretic analysis of denial of service attacks in wireless random access , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.

[17]  Cristina Comaniciu,et al.  A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.

[18]  Radha Poovendran,et al.  Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[19]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[20]  Anthony Ephremides,et al.  A Game-Theoretic Analysis of Denial of Service Attacks in Wireless Random Access , 2007, WiOpt.

[21]  Eitan Altman,et al.  CDMA Uplink Power Control as a Noncooperative Game , 2002, Wirel. Networks.