Securing Wireless Transmission against Reactive Jamming: A Stackelberg Game Framework

Reactive jamming, which performs jamming attacks on condition of detecting the legitimate transmissions, is widely considered as one of the most serious security challenges in wireless communications. In this paper, we tackle the reactive jamming issue from a novel yet realistic perspective -- the jammer may not always be able to accurately detect the legitimate transmissions, which in turn, can be exploited by the legitimate user to enhance security. In accordance with the detection- then-jamming characteristic of reactive jamming, we formulate the transmitting-jamming problem within a Stackelberg game framework, where the legitimate user takes action first, followed by the reactive jammer. To optimize its own utility, the legitimate user needs to determine the transmission strategy by elaborately achieving the tradeoff between the signal-to- interference-plus-noise ratio (SINR) and the probability to be accurately detected and thus jammed by its adversary. The investigation on Stackelberg equilibrium provides the solution to the game model. Furthermore, we consider the more practical situation that the legitimate user has only incomplete knowledge regarding its adversary and analyze the corresponding impact on the game and equilibrium. Simulation results demonstrate significant performance superiority in terms of secure legitimate transmissions compared with the classical approach.

[1]  Drew Fudenberg,et al.  Game theory (3. pr.) , 1991 .

[2]  Christian Scheideler,et al.  An Efficient and Fair MAC Protocol Robust to Reactive Interference , 2013, IEEE/ACM Transactions on Networking.

[3]  Jens B. Schmitt,et al.  Detection of Reactive Jamming in DSSS-based Wireless Communications , 2014, IEEE Transactions on Wireless Communications.

[4]  Jitendra K. Tugnait,et al.  Spectrally Efficient Jamming Mitigation Based on Code-Controlled Frequency Hopping , 2011, IEEE Transactions on Wireless Communications.

[5]  Peng Ning,et al.  Wireless Communications under Broadband Reactive Jamming Attacks , 2016, IEEE Transactions on Dependable and Secure Computing.

[6]  Xiang-Yang Li,et al.  Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication , 2012, IEEE Journal on Selected Areas in Communications.

[7]  Xi Fang,et al.  Coping with a Smart Jammer in Wireless Networks: A Stackelberg Game Approach , 2013, IEEE Transactions on Wireless Communications.

[8]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[9]  Ying Wang,et al.  A novel design for content delivery over software defined mobile social networks , 2015, IEEE Network.

[10]  Mohsen Guizani,et al.  Joint physical-application layer security for wireless multimedia delivery , 2014, IEEE Communications Magazine.

[11]  Nam P. Nguyen,et al.  A Trigger Identification Service for Defending Reactive Jammers in WSN , 2012, IEEE Transactions on Mobile Computing.

[12]  Ivan Martinovic,et al.  Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.

[13]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[14]  Yichen Wang,et al.  A Hybrid Underlay/Overlay Transmission Mode for Cognitive Radio Networks with Statistical Quality-of-Service Provisioning , 2014, IEEE Transactions on Wireless Communications.

[15]  Laura Galluccio,et al.  Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis , 2015, IEEE Transactions on Wireless Communications.

[16]  R. Lucchetti,et al.  Existence theorems of equilibrium points in stackelberg , 1987 .

[17]  Anis Laouiti,et al.  Vehicle Ad Hoc networks: applications and related technical issues , 2008, IEEE Communications Surveys & Tutorials.