Game theoretic analysis of jamming attack in wireless mesh network with delay tolerance

This paper proposes a framework for studying the impact of a smart attacker in a wireless mesh network that is used to provide delay-tolerant internet connectivity. Non-cooperative game theory is used to define the defending player strategy in terms of network tree routing as well as the attacking player strategy in terms of the varying position of communication signal jammer. To evaluate the game value, the payoff is captured by the expected number of backlogged packets, based on the assumption of network of M/M/1 queues. This game is solved by the well-known method of successive average. And a preliminary experimental result has been reported on a small 2×2 grid network. The finding sheds insights on three scenarios reflecting different intelligence levels inherited by the attacker and the defender in comparison with the equivalent settings without the attacker. Finally, future work worth investigating has been given.

[1]  K. J. Ray Liu,et al.  An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.

[2]  Stephen Farrell,et al.  Delay- and Disruption-Tolerant Networking , 2006, IEEE Internet Computing.

[3]  Lin Chen,et al.  Fight jamming with jamming - A game theoretic analysis of jamming attack in wireless networks and defense strategy , 2011, Comput. Networks.

[4]  Ian F. Akyildiz,et al.  A survey on wireless mesh networks , 2005, IEEE Communications Magazine.

[5]  Radha Poovendran,et al.  Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[6]  Rachid El Azouzi,et al.  Evolutionary forwarding games in Delay Tolerant Networks , 2010, 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.

[7]  Stephen Farrell,et al.  DTN: an architectural retrospective , 2008, IEEE Journal on Selected Areas in Communications.

[8]  Chaodit Aswakul,et al.  Game-based analysis of eavesdropping defense strategy in WMN with directional antenna , 2011, 2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE).

[9]  Michael G. H. Bell The use of game theory to measure the vulnerability of stochastic networks , 2003, IEEE Trans. Reliab..

[10]  R. Ramya,et al.  Secured Identity Based Routing and privacy preservation in Wireless Mesh Networks , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[11]  Abdelhakim Hafid,et al.  Wireless Mesh Networks Design — A Survey , 2012, IEEE Communications Surveys & Tutorials.

[12]  Ana R. Cavalli,et al.  Detection of Attacks in Wireless Mesh Networks , 2011, 2011 5th Latin-American Symposium on Dependable Computing.