On Strategic Multi-Antenna Jamming in Centralized Detection Networks

In this letter, we model a complete-information zero-sum game between a centralized detection network with a multiple access channel between the sensors and the fusion center (FC), and a jammer with multiple transmitting antennas. We choose error probability at the FC as the performance metric, and investigate pure strategy equilibria for this game, and show that the jammer has no impact on the FC's error probability by employing pure strategies at the Nash equilibrium. Furthermore, we also show that the jammer has an impact on the expected utility if it employs mixed strategies.

[1]  Pramod K. Varshney,et al.  Strategic Power Allocation With Incomplete Information in the Presence of a Jammer , 2016, IEEE Transactions on Communications.

[2]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[3]  Pramod K Varshney,et al.  Distributed inference in wireless sensor networks , 2012, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[4]  Ke Liu,et al.  Decentralized Inference Over Multiple-Access Channels , 2007, IEEE Transactions on Signal Processing.

[5]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[6]  M. Dufwenberg Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.

[7]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[8]  Husheng Li,et al.  A denial-of-service jamming game for remote state monitoring in smart grid , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[9]  Pierluigi Salvo Rossi,et al.  Optimality of Received Energy in Decision Fusion Over Rayleigh Fading Diversity MAC With Non-Identical Sensors , 2012, IEEE Transactions on Signal Processing.

[10]  Pramod K. Varshney,et al.  On ARQ-based wireless communication systems in the presence of a strategic jammer , 2014, 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[11]  Pramod K. Varshney,et al.  On jamming models against collaborative spectrum sensing in a simple cognitive radio network , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[12]  Pramod K. Varshney,et al.  Minimax games for cooperative spectrum sensing in a centralized cognitive radio network in the presence of interferers , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[13]  Andrey Garnaev,et al.  Fair resource allocation under an unknown jamming attack: a Bayesian game , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[14]  Aytug Denk Detection and jamming low probability of intercept (LPI) radars , 2006 .

[15]  Brandon F. Lo A survey of common control channel design in cognitive radio networks , 2011, Phys. Commun..

[16]  Anthony Ephremides,et al.  Jamming games in wireless networks with incomplete information , 2011, IEEE Communications Magazine.

[17]  Darren John Bachmann,et al.  Game Theoretic Analysis of Adaptive Radar Jamming , 2011, IEEE Transactions on Aerospace and Electronic Systems.

[18]  Peter B. Luh,et al.  The MIMO Radar and Jammer Games , 2012, IEEE Transactions on Signal Processing.

[19]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[20]  Shengli Zhou,et al.  PAC vs. MAC for Decentralized Detection Using Noncoherent Modulation , 2009, IEEE Transactions on Signal Processing.

[21]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[22]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[23]  Ling Shi,et al.  SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.

[24]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[25]  Sennur Ulukus,et al.  Mutual Information Games in Multi-user Channels with Correlated Jamming , 2006, ArXiv.

[26]  Radha Poovendran,et al.  Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[27]  Andrey Garnaev,et al.  Anti-jamming Strategy Versus a Low-Power Jamming Attack When Intelligence of Adversary’s Attack Type is Unknown , 2016, IEEE Transactions on Signal and Information Processing over Networks.

[28]  R. Srikant,et al.  Correlated jamming on MIMO Gaussian fading channels , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[29]  T. Duman,et al.  Decentralized detection over multiple-access channels , 1998 .

[30]  Richard D. Wesel,et al.  Optimal bi-level quantization of i.i.d. sensor observations for binary hypothesis testing , 2002, IEEE Trans. Inf. Theory.

[31]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[32]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..