An Anti-jamming Strategy When it Is Unknown Which Receivers Will Face with Smart Interference

The paper considers a communication system consisting of a communication node utilizing multiple antennas in order to communicate with a group of receivers, while potentially facing interference from one or more jammers. The jammers impact the scenario by possibly interfering some of the receivers. The objective of the jammers is to reduce the throughput of nearby receivers, while taking into account the cost/risk of jamming. The fact that jammers face a cost implies that they might not choose to interfere, and thus the communication node faces uncertainty about which of its receivers will be jammed. This uncertainty is modeled by the communicator having only a priori probabilities about whether each receiver will face hostile interference or not, and if he does face such jamming, whether the jamming attack is smart or not. The goal of the communication node is to distribute total power resources to maximize the total throughput associated with communicating with all of the receivers. The problem is formulated as a Bayesian game between the communication system and the jammers. A waterfilling equation to find the equilibrium is derived, and its uniqueness is proven. The threshold value on the power budget is established for the receivers to be non-altruistic.

[1]  Andrey Garnaev,et al.  Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities , 2017, IEEE Transactions on Information Forensics and Security.

[2]  Athina P. Petropulu,et al.  Equilibrium strategies for an OFDM network that might be under a jamming attack , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).

[3]  Laura Galluccio,et al.  Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis , 2015, IEEE Transactions on Wireless Communications.

[4]  Ping Li,et al.  GPS smart jammer suppressin algorithm based on spatial APES , 2007, 2007 International Symposium on Intelligent Signal Processing and Communication Systems.

[5]  Andrey Garnaev,et al.  To Eavesdrop or Jam, That is the Question , 2013, ADHOCNETS.

[6]  R. Thaler Misbehaving: The Making of Behavioral Economics , 2015 .

[7]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .

[8]  H. Vincent Poor,et al.  Secure multicast communications with private jammers , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[9]  Andrey Garnaev,et al.  An OFDM-based dual radar/communication system facing uncertain jamming power , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[10]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[11]  Xi Fang,et al.  Coping with a Smart Jammer in Wireless Networks: A Stackelberg Game Approach , 2013, IEEE Transactions on Wireless Communications.

[12]  Gordon L. Stüber,et al.  Resilience of LTE networks against smart jamming attacks , 2014, GLOBECOM.

[13]  Eitan Altman,et al.  Closed form solutions for water-filling problems in optimization and game frameworks , 2007, ValueTools '07.

[14]  Robert W. Heath,et al.  Space-time interference cancellation in MIMO-OFDM systems , 2005, IEEE Transactions on Vehicular Technology.

[15]  Yonggang Zhu,et al.  Bayesian Stackelberg Game for Antijamming Transmission With Incomplete Information , 2016, IEEE Communications Letters.

[16]  Sven-Gustav Häggman,et al.  Intercarrier interference self-cancellation scheme for OFDM mobile communication systems , 2001, IEEE Trans. Commun..

[17]  H. Vincent Poor,et al.  User-Centric View of Jamming Games in Cognitive Radio Networks , 2015, IEEE Transactions on Information Forensics and Security.

[18]  Andrey Garnaev,et al.  The eavesdropping and Jamming Dilemma in multi-channel communications , 2013, 2013 IEEE International Conference on Communications (ICC).

[19]  Walid Saad,et al.  Jamming in the Internet of Things: A Game-Theoretic Perspective , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[20]  Toshiaki Miyazaki,et al.  Optimal transmission strategy for sensors to defend against eavesdropping and jamming attacks , 2017, 2017 IEEE International Conference on Communications (ICC).

[21]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[22]  Jaesung Lim,et al.  Adaptive rapid channel-hopping scheme mitigating smart jammer attacks in secure WLAN , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[23]  Feten Slimeni,et al.  Learning multi-channel power allocation against smart jammer in cognitive radio networks , 2016, 2016 International Conference on Military Communications and Information Systems (ICMCIS).

[24]  Alvin S. Lim,et al.  Jamming and anti-jamming techniques in wireless networks: a survey , 2014, Int. J. Ad Hoc Ubiquitous Comput..