Anti-jamming Strategy Versus a Low-Power Jamming Attack When Intelligence of Adversary’s Attack Type is Unknown

In this paper, we suggest a new class of anti-jamming problems where the type of intelligence associated with ajamming attack is unknown. Specifically, we consider a problem where the nodes of a peer-to-peer network do not know whether the network is under attack by a random jammer (which might be considered as a natural background noise), or an intelligent one (i.e., the jammer who can adapt his strategy based on knowledge gained during attacks). The goal of the nodes is to identify the type of the attack based on knowledge obtained from the attack in previous time slots, and thereby to reduce the efficiency of the jamming attack. First, we model the problem as a Bayesian game for a single time slot attack, and reduce it to the solution of dual linear programming (LP) problems. Additionally, the convergence of the fictitious play algorithm for finding the equilibrium is established. Then, we develop the problem for a repeated jamming attack, where the nodes adapt their beliefs based on history of the previous attacks. In particular, we have shown that it is possible for the nodes in the network to always be able to identify the jammer's type within a finite number of time slots.

[1]  Eitan Altman,et al.  A jammer's dilemma: Where and how to jam , 2012, 2012 6th International Conference on Network Games, Control and Optimization (NetGCooP).

[2]  Samuel N. Hamilton,et al.  Challenges in Applying Game Theory to the Domain of Information Warfare , 2001 .

[3]  Andrey Garnaev,et al.  Anti-jamming Strategies: A Stochastic Game Approach , 2014, MONAMI.

[4]  Andrey Garnaev,et al.  One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious , 2015, IEEE Transactions on Information Forensics and Security.

[5]  Andrey Garnaev,et al.  Bandwidth scanning involving a Bayesian approach to adapting the belief of an adversary's presence , 2014, 2014 IEEE Conference on Communications and Network Security.

[6]  K. J. Ray Liu,et al.  Security and Privacy for Sensor Networks , 2009 .

[7]  Cristina Comaniciu,et al.  A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.

[8]  Sven-Gustav Häggman,et al.  Intercarrier interference self-cancellation scheme for OFDM mobile communication systems , 2001, IEEE Trans. Commun..

[9]  John S. Baras,et al.  Game Theoretic Modeling of Malicious Users in Collaborative Networks , 2008, IEEE Journal on Selected Areas in Communications.

[10]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[11]  Carlos Mosquera,et al.  Performance study of multiuser interference mitigation schemes for hybrid broadband multibeam satellite architectures , 2012, EURASIP J. Wirel. Commun. Netw..

[12]  Pramod K. Varshney,et al.  Power control with jammer location uncertainty: A Game Theoretic perspective , 2014, 2014 48th Annual Conference on Information Sciences and Systems (CISS).

[13]  Robert W. Heath,et al.  Space-time interference cancellation in MIMO-OFDM systems , 2005, IEEE Transactions on Vehicular Technology.

[14]  Anthony Ephremides,et al.  Jamming games in wireless networks with incomplete information , 2011, IEEE Communications Magazine.

[15]  Andrey Garnaev,et al.  Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments , 2013, 8th International Conference on Cognitive Radio Oriented Wireless Networks.

[16]  Cong Shen,et al.  An uplink interference analysis for massive MIMO systems with MRC and ZF receivers , 2014, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[17]  H. Vincent Poor,et al.  Security Games With Unknown Adversarial Strategies , 2016, IEEE Transactions on Cybernetics.

[18]  L.J. Cimini,et al.  New approaches for cooperative use of multiple antennas in ad hoc wireless networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[19]  Anthony Ephremides,et al.  Jamming games for power controlled medium access with dynamic traffic , 2010, 2010 IEEE International Symposium on Information Theory.

[20]  Eugenia Stoimenova,et al.  Applied Nonparametric Statistical Methods , 2010 .

[21]  Jean Armstrong,et al.  Analysis of new and existing methods of reducing intercarrier interference due to carrier frequency offset in OFDM , 1999, IEEE Trans. Commun..

[22]  Richard A. Poisel,et al.  Modern Communications Jamming Principles and Techniques , 2003 .

[23]  Rodrigo C. de Lamare,et al.  Massive MIMO Systems: Signal Processing Challenges and Research Trends , 2013, ArXiv.

[24]  H. Vincent Poor,et al.  Incorporating Attack-Type Uncertainty Into Network Protection , 2014, IEEE Transactions on Information Forensics and Security.

[25]  K. J. Ray Liu,et al.  Anti-Jamming Games in Multi-Channel Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[26]  Anthony Ephremides,et al.  A game-theoretic analysis of denial of service attacks in wireless random access , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.

[27]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[28]  David Taniar,et al.  Peer-to-Peer Group k-Nearest Neighbours in Mobile Ad-Hoc Networks , 2013, 2013 International Conference on Parallel and Distributed Systems.

[29]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[30]  Pascal Frossard,et al.  Cooperative Special Issue on Graph Signal Processing in the IEEE Journal of Selected Topics in Signal Processing and the IEEE Transactions on Signal and Information Processing Over Networks , 2017, IEEE Trans. Signal Inf. Process. over Networks.

[31]  Wenyuan Xu Jamming Attack Defense , 2011, Encyclopedia of Cryptography and Security.

[32]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[33]  Aitor del Coso,et al.  Cooperative distributed MIMO channels in wireless sensor networks , 2007, IEEE Journal on Selected Areas in Communications.

[34]  Walid Saad,et al.  Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[35]  Andrey Garnaev,et al.  Dependence of optimal monitoring strategy on the application to be protected , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[36]  Erik G. Larsson,et al.  Energy and Spectral Efficiency of Very Large Multiuser MIMO Systems , 2011, IEEE Transactions on Communications.

[37]  Eitan Altman,et al.  A Bayesian jamming game in an OFDM wireless network , 2012, 2012 10th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).

[38]  Pramod K. Varshney,et al.  On ARQ-based wireless communication systems in the presence of a strategic jammer , 2014, 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[39]  Eitan Altman,et al.  Jamming in Wireless Networks Under Uncertainty , 2009, 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.