A Game Theoretic Approach to Modelling Jamming Attacks in Delay Tolerant Networks

Cyberspace plays a prominent role in our social, economic and civic welfare and cyber security issues are of paramount importance today. Growing reliance of the intertwined military and civilian applications on wireless computer networks makes these networks highly vulnerable to attacks of which jamming attacks are a vital and exigent problem. In this paper, we study defence against jamming attacks as game in a delay tolerant network, with two adversarial players: the jammer playing against the transmitter. The transmitters seek to choose an optimal time to schedule his transmission securely, so as to maximize the probability of successful delivery before his session expires, while these transmissions are subject to inference from the jammer, who attempts to minimize this probability . We design strategies for the transmitters that offset transmission period based inference of network traffic by the jammer. We model these interactions and decisions as a game and use simulation as a tool to evaluate the games. Probability distribution functions over finite set of strategies are proposed to compute the expected payoff of both the players. Simulation results are used to evaluate the expected payoff along with the resulting equilibrium in cases where players are biased and unbiased. These results are used to strategically decide on the optimal time for both the players, and evaluate the efficiency of the strategies used by the transmitters against jammer attacks.

[1]  Jie Wu,et al.  Behavioral Malware Detection in Delay Tolerant Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[2]  Jeannette M. Wing,et al.  Game strategies in network security , 2005, International Journal of Information Security.

[3]  Jie Wu,et al.  Community-Aware Opportunistic Routing in Mobile Social Networks , 2014, IEEE Transactions on Computers.

[4]  Walid Saad,et al.  Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[5]  Vinod Venkataraman vinodv Delay Tolerant Networking-A Tutorial , 2009 .

[6]  Zhu Han,et al.  Performance analysis of delay-constrained wireless energy harvesting communication networks under jamming attacks , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[7]  Murat Kantarcioglu,et al.  A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model , 2010, GameSec.

[8]  Divya Kuriakose,et al.  Effective defending against flood attack using stream-check method in tolerant network , 2014, 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE).

[9]  Rachid El Azouzi,et al.  Evolutionary forwarding games in Delay Tolerant Networks , 2010, 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.

[10]  Emmanuel Chaput,et al.  DTN for WSN: FREAK, implementations and study , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).

[11]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[12]  Eitan Altman,et al.  Adversarial Control in a Delay Tolerant Network , 2010, GameSec.

[13]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[14]  Sujoy Saha,et al.  SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for DTN , 2012, ACITY.

[15]  Marco Zennaro,et al.  Delay tolerant network on smartphones: applications for communication challenged areas , 2011, ExtremeCom.

[16]  Tansu Alpcan,et al.  Network Security , 2010 .

[17]  L. Jean Camp,et al.  Game-theoretic modeling and analysis of insider threats , 2008, Int. J. Crit. Infrastructure Prot..

[18]  Tansu Alpcan,et al.  Security Games with Incomplete Information , 2009, 2009 IEEE International Conference on Communications.

[19]  Chaodit Aswakul,et al.  Game theoretic analysis of jamming attack in wireless mesh network with delay tolerance , 2013, 2013 International Computer Science and Engineering Conference (ICSEC).

[20]  Theoretical research on structural equation model based on principle of entropy , 2011, 2011 International Conference on E-Business and E-Government (ICEE).

[21]  Wei Sun,et al.  On Delay-Tolerant Networking and Its Application , .