Power allocation in team jamming games in wireless ad hoc networks

In this work, we study the problem of power allocation in teams. Each team consists of two agents who try to split their available power between the tasks of communication and jamming the nodes of the other team. The agents have constraints on their total energy and instantaneous power usage. The cost function is the difference between the rates of erroneously transmitted bits of each team. We model the problem as a zero-sum differential game between the two teams and use {\it{Isaacs'}} approach to obtain the necessary conditions for the optimal trajectories. This leads to a continuous-kernel power allocation game among the players. Based on the communications model, we present sufficient conditions on the physical parameters of the agents for the existence of a pure strategy Nash equilibrium (PSNE). Finally, we present simulation results for the case when the agents are holonomic.

[1]  J. Tobias,et al.  Signal Jamming Mediates Sexual Conflict in a Duetting Bird , 2009, Current Biology.

[2]  Zhu Han,et al.  Physical layer security game: How to date a girl with her boyfriend on the same table , 2009, 2009 International Conference on Game Theory for Networks.

[3]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[4]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[5]  T. Başar,et al.  Optimal Strategies to Evade Jamming in Heterogeneous Mobile Networks , 2010 .

[6]  Björn E. Ottersten,et al.  Minimum BER linear transceivers for MIMO channels via primal decomposition , 2005, IEEE Transactions on Signal Processing.

[7]  Abbas Jamalipour,et al.  Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[8]  M. Dufwenberg Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.

[9]  Tamer Basar,et al.  Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer , 2010, 49th IEEE Conference on Decision and Control (CDC).

[10]  Mérouane Debbah,et al.  Power allocation games in wireless networks of multi-antenna terminals , 2010, Telecommun. Syst..

[11]  Tamer A. ElBatt,et al.  Joint scheduling and power control for wireless ad hoc networks , 2002, IEEE Transactions on Wireless Communications.

[12]  Andrea J. Goldsmith,et al.  Design challenges for energy-constrained ad hoc wireless networks , 2002, IEEE Wirel. Commun..

[13]  Guevara Noubir,et al.  Linear programming models for jamming attacks on network traffic flows , 2008, 2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops.

[14]  I. Mazin,et al.  Theory , 1934 .

[15]  T. Başar,et al.  Dynamic Noncooperative Game Theory, 2nd Edition , 1998 .

[16]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[17]  Vladimir Igorevich Arnold,et al.  Geometrical Methods in the Theory of Ordinary Differential Equations , 1983 .

[18]  Wei Yu,et al.  Distributed multiuser power control for digital subscriber lines , 2002, IEEE J. Sel. Areas Commun..

[19]  Sampath Kannan,et al.  Randomized Pursuit-Evasion with Local Visibility , 2006, SIAM J. Discret. Math..

[20]  Rachid El Azouzi,et al.  Introducing hierarchy in energy games , 2009, IEEE Transactions on Wireless Communications.

[21]  V. Georgiev Using Game Theory to Analyze Wireless Ad Hoc Networks . ” , 2008 .

[22]  A. Lee Swindlehurst,et al.  Equilibrium Outcomes of Dynamic Games in MIMO Channels with Active Eavesdroppers , 2010, 2010 IEEE International Conference on Communications.

[23]  P. Varaiya,et al.  Differential Games , 1994 .

[24]  Francisco Facchinei,et al.  Distributed Power Allocation With Rate Constraints in Gaussian Parallel Interference Channels , 2007, IEEE Transactions on Information Theory.

[25]  S Bhattacharya,et al.  Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.

[26]  Zhu Han,et al.  Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..

[27]  Liqun Fu,et al.  Fast algorithms for joint power control and scheduling in wireless networks , 2010, IEEE Transactions on Wireless Communications.

[28]  D. Luenberger Optimization by Vector Space Methods , 1968 .