Dynamic game-theoretic defense approach against stealthy Jamming attacks in wireless networks

This paper develops a game-theoretic defense approach against jamming attacks targeting access points in a wireless network. We formulate a two-player zero-sum stochastic game between a network administrator (the defender) and a jammer (the attacker) in which the defender adapts the RF footprints of the nodes to counteract the jamming attack aimed at creating excessive interference in the network. Our formulation captures inherent tradeoffs between the ability of the attack to inflict damage and the attack exposure, and between reducing the interference level and maintaining network coverage. We obtain optimal policies for both players at Nash Equilibrium using a value-iteration based algorithm. To handle the state-space complexity for this class of games, we develop approximate policies by judiciously extracting features that are well-representative of the different states. Through numerical results, we show convergence of the used algorithm to stationary policies, and demonstrate the effectiveness of the defense mechanism and the approximate policies against such attacks.

[1]  Michael L. Littman,et al.  Markov Games as a Framework for Multi-Agent Reinforcement Learning , 1994, ICML.

[2]  Sakir Sezer,et al.  Sdn Security: A Survey , 2013, 2013 IEEE SDN for Future Networks and Services (SDN4FNS).

[3]  Dimitri P. Bertsekas,et al.  Dynamic Programming and Optimal Control, Two Volume Set , 1995 .

[4]  Salil S. Kanhere,et al.  NIS07-5: Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks , 2006, IEEE Globecom 2006.

[5]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[6]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[7]  Wenyuan Xu,et al.  On Adjusting Power to Defend Wireless Networks from Jamming , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[8]  Gianmarco Baldini,et al.  Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.

[9]  Loukas Lazos,et al.  Vulnerabilities of cognitive radio MAC protocols and countermeasures , 2013, IEEE Network.

[10]  Sisi Liu,et al.  Thwarting Control-Channel Jamming Attacks from Inside Jammers , 2012, IEEE Transactions on Mobile Computing.

[11]  Sisi Liu,et al.  Mitigating control-channel jamming attacks in multi-channel ad hoc networks , 2009, WiSec '09.

[12]  Mina Guirguis,et al.  Game theoretic defense approach to wireless networks against stealthy decoy attacks , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[13]  Mina Guirguis,et al.  Pinball attacks: Exploiting channel allocation in wireless networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[14]  Patrick Tague,et al.  How to jam without getting caught: Analysis and empirical study of stealthy periodic jamming , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).

[15]  P. Steenkiste Distributed Dynamic Channel Selection in Chaotic Wireless Networks , 2007 .

[16]  Yoav Shoham,et al.  Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .

[17]  Mina Guirguis,et al.  Stealthy edge decoy attacks against dynamic channel assignment in wireless networks , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[18]  Qijun Gu,et al.  Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[19]  K. J. Ray Liu,et al.  Optimal power allocation strategy against jamming attacks using the Colonel Blotto game , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[20]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[21]  Tuomas Sandholm,et al.  Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming , 2014, WiSec '14.

[22]  David Walker,et al.  Composing Software Defined Networks , 2013, NSDI.

[23]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[24]  K. J. Ray Liu,et al.  An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.