A Jamming Game With Rival-Type Uncertainty

We consider the communication between a source (user) and a destination in the presence of a jammer, and study resource assignment in a non-cooperative game theory framework. A player (the user or the jammer) has incomplete information about its rival’s identity in the form of uncertainty; the player only knows the probabilities that its rival is a player implementing a behavioral strategy as a follower in a Stackelberg game (smart-type), or selects a feasible strategy as in a Nash game (regular-type). We model the problem as two Bayesian games. In the first game, the user has incomplete information about the jammer, and in the second game, the jammer has incomplete information about the user. The user’s utility is throughput. We prove that a unique equilibrium exists and derive it in closed form as a function of the known probabilities. We show that the Nash and Stackelberg equilibria are boundary cases of the obtained equilibrium. Thus, our approach allows one to incorporate the Nash and Stackelberg equilibria into a unified scale of equilibria. Monotonicity properties of the equilibrium strategies and the corresponding payoffs with respect to the network parameters are proven, and also supported by simulations.

[1]  Andrey Garnaev,et al.  A Bandwidth Monitoring Strategy Under Uncertainty of the Adversary’s Activity , 2016, IEEE Transactions on Information Forensics and Security.

[2]  Toshiaki Miyazaki,et al.  Optimal transmission strategy for sensors to defend against eavesdropping and jamming attacks , 2017, 2017 IEEE International Conference on Communications (ICC).

[3]  Alagan Anpalagan,et al.  Stackelberg Game Approaches for Anti-Jamming Defence in Wireless Networks , 2018, IEEE Wireless Communications.

[4]  Hussein M. Alnuweiri,et al.  On the fairness of resource allocation in wireless mesh networks: a survey , 2013, Wirel. Networks.

[5]  Gordon L. Stüber,et al.  Jammer-Type Estimation in LTE With a Smart Jammer Repeated Game , 2017, IEEE Transactions on Vehicular Technology.

[6]  Thinh Nguyen,et al.  Mitigating Jamming Attack: A Game-Theoretic Perspective , 2018, IEEE Transactions on Vehicular Technology.

[7]  Athina P. Petropulu,et al.  Combating Jamming in Wireless Networks: A Bayesian Game with Jammer’s Channel Uncertainty , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[8]  Jeffrey C. Lagarias,et al.  Convergence Properties of the Nelder-Mead Simplex Method in Low Dimensions , 1998, SIAM J. Optim..

[9]  Anthony Ephremides,et al.  MAC games for distributed wireless network security with incomplete information of selfish and malicious user types , 2009, 2009 International Conference on Game Theory for Networks.

[10]  Anthony Ephremides,et al.  Jamming games in wireless networks with incomplete information , 2011, IEEE Communications Magazine.

[11]  Andrey Garnaev,et al.  The rival might be not smart: Revising a CDMA jamming game , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).

[12]  Sachin Agarwal,et al.  A stackelberg game for pricing uplink power in wide-band cognitive radio networks , 2008, 2008 47th IEEE Conference on Decision and Control.

[13]  Ming Xiao,et al.  Game Theory-Based Anti-Jamming Strategies for Frequency Hopping Wireless Communications , 2018, IEEE Transactions on Wireless Communications.

[14]  An Wang,et al.  A Stackelberg security game with cooperative jamming over a multiuser OFDMA network , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[15]  Stephen B. Wicker,et al.  Random access game over noisy channels with capture effect , 2007, MSWiM '07.

[16]  Andrey Garnaev,et al.  A Power Control Game with Uncertainty On the Type of the Jammer , 2019, 2019 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[17]  Xi Fang,et al.  Coping with a Smart Jammer in Wireless Networks: A Stackelberg Game Approach , 2013, IEEE Transactions on Wireless Communications.

[18]  Stephen B. Wicker,et al.  Random Access Games: Selfish Nodes with Incomplete Information , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[19]  Anthony Ephremides,et al.  A game-theoretic analysis of denial of service attacks in wireless random access , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.

[20]  A. Lee Swindlehurst,et al.  Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.

[21]  Alvin S. Lim,et al.  Jamming and anti-jamming techniques in wireless networks: a survey , 2014, Int. J. Ad Hoc Ubiquitous Comput..

[22]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.

[23]  Xi Fang,et al.  Optimal transmission power control in the presence of a smart jammer , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[24]  Jin Chen,et al.  A One-Leader Multi-Follower Bayesian-Stackelberg Game for Anti-Jamming Transmission in UAV Communication Networks , 2018, IEEE Access.

[25]  Andrey Garnaev,et al.  Bargaining Over the Fair Trade-Off Between Secrecy and Throughput in OFDM Communications , 2017, IEEE Transactions on Information Forensics and Security.

[26]  Liang Xiao,et al.  Anti-Jamming Transmission Stackelberg Game With Observation Errors , 2015, IEEE Communications Letters.

[27]  A. Tversky,et al.  Prospect Theory : An Analysis of Decision under Risk Author ( s ) : , 2007 .

[28]  H. Vincent Poor,et al.  Mobile offloading game against smart attacks , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[29]  Yonggang Zhu,et al.  Bayesian Stackelberg Game for Antijamming Transmission With Incomplete Information , 2016, IEEE Communications Letters.

[30]  Pramod K. Varshney,et al.  Strategic Power Allocation With Incomplete Information in the Presence of a Jammer , 2016, IEEE Transactions on Communications.

[31]  Li Sun,et al.  Securing Wireless Transmission against Reactive Jamming: A Stackelberg Game Framework , 2014, GLOBECOM 2014.

[32]  Koorosh Firouzbakht,et al.  Linearly Constrained Bimatrix Games in Wireless Communications , 2015, IEEE Transactions on Communications.

[33]  Athina P. Petropulu,et al.  Equilibrium strategies for an OFDM network that might be under a jamming attack , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).