Jammer-Type Estimation in LTE With a Smart Jammer Repeated Game

Long-term evolution (LTE)/LTE-Advanced (LTE-A) networks are known to be vulnerable to denial-of-service (DOS) and loss-of-service attacks from smart jammers. The interaction between the network and the smart jammer has been modeled as an infinite-horizon general-sum (nonzero-sum) Bayesian game with asymmetric information, with the network being the uninformed player. Although significant work has been done on optimal strategy computation and control of information revelation of the informed player in repeated asymmetric information games, it has been limited to zero-sum games with perfect monitoring. Recent progress on the strategy computation of the uninformed player is also limited to zero-sum games with perfect monitoring and is focused on expected payoff formulations. Since the proposed formulation is a general-sum game with imperfect monitoring, existing formulations cannot be leveraged for estimating true state of nature (the jammer type). Hence, a threat-based mechanism is proposed for the uninformed player (the network) to estimate the informed player's type (jammer type). The proposed mechanism helps the network resolve uncertainty about the state of nature (jammer type) so that it can compute a repeated-game strategy conditioned on its estimate. The proposed algorithm does not rely on the commonly assumed “full monitoring” premise and uses a combination of threat-based mechanism and nonparametric estimation to estimate the jammer type. In addition, it requires no explicit feedback from the network users, nor does it rely on a specific distribution (e.g., Gaussian) of test statistic. It is shown that the proposed algorithm's estimation performance is quite robust under realistic modeling and observational constraints, despite all the aforementioned challenges.

[1]  Robert J. Aumann,et al.  Repeated Games with Incomplete Information , 1995 .

[2]  Xi Fang,et al.  Coping with a Smart Jammer in Wireless Networks: A Stackelberg Game Approach , 2013, IEEE Transactions on Wireless Communications.

[3]  Roger Piqueras Jover,et al.  LTE/LTE-A jamming, spoofing, and sniffing: threat assessment and mitigation , 2016, IEEE Communications Magazine.

[4]  Jeffrey H. Reed,et al.  Vulnerability of LTE to hostile interference , 2013, 2013 IEEE Global Conference on Signal and Information Processing.

[5]  Bernard De Meyer,et al.  Repeated Games and Partial Differential Equations , 1996, Math. Oper. Res..

[6]  Cédric Langbort,et al.  Trusted computation with an adversarial cloud , 2015, 2015 American Control Conference (ACC).

[7]  Juliane Hahn,et al.  Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .

[8]  S. Sorin A First Course on Zero Sum Repeated Games , 2002 .

[9]  David A. Castañón,et al.  Dynamic network interdiction games with imperfect information and deception , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[10]  Peng Ning,et al.  Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty , 2014, GLOBECOM 2014.

[11]  H. Vincent Poor,et al.  Incorporating Attack-Type Uncertainty Into Network Protection , 2014, IEEE Transactions on Information Forensics and Security.

[12]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[13]  Robert V. Hogg,et al.  Introduction to Mathematical Statistics. , 1966 .

[14]  H. Vincent Poor,et al.  Infrastructure security games , 2014, Eur. J. Oper. Res..

[15]  Hüseyin Arslan Noise Power and SNR Estimation for OFDM Based Wireless Communication Systems , 2003 .

[16]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[17]  Jeff S. Shamma,et al.  Policy improvement for repeated zero-sum games with asymmetric information , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[18]  Eitan Altman,et al.  A survey on networking games in telecommunications , 2006, Comput. Oper. Res..

[19]  Sylvain Sorin,et al.  Repeated Games by Jean-François Mertens , 2015 .

[20]  Jeffrey H. Reed,et al.  PHY-Layer Resiliency in OFDM Communications: A Tutorial , 2015, IEEE Communications Surveys & Tutorials.

[21]  Gerald Tesauro,et al.  Playing repeated Stackelberg games with unknown opponents , 2012, AAMAS.

[22]  Gordon L. Stüber,et al.  Resilience of LTE networks against smart jamming attacks , 2014, 2014 IEEE Global Communications Conference.

[23]  Ali Babikher Bakheet,et al.  Enhancing the Security of LTE Networks against Jamming Attacks , 2016 .

[24]  Jeff S. Shamma,et al.  Finite stage asymmetric repeated games: Both players' viewpoints , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[25]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .

[26]  Stefania Sesia,et al.  LTE - The UMTS Long Term Evolution, Second Edition , 2011 .

[27]  Andrey Garnaev,et al.  A Bandwidth Monitoring Strategy Under Uncertainty of the Adversary’s Activity , 2016, IEEE Transactions on Information Forensics and Security.

[28]  Laura Galluccio,et al.  Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis , 2015, IEEE Transactions on Wireless Communications.

[29]  Abbas Jamalipour,et al.  Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[30]  Jeff S. Shamma,et al.  LP formulation of asymmetric zero-sum stochastic games , 2014, 53rd IEEE Conference on Decision and Control.

[31]  H. Vincent Poor,et al.  Security Games With Unknown Adversarial Strategies , 2016, IEEE Transactions on Cybernetics.

[32]  Allen B. MacKenzie,et al.  Game Theory for Wireless Engineers , 2006, Game Theory for Wireless Engineers.

[33]  Dusit Niyato,et al.  Game Theory in Wireless and Communication Networks: Fundamentals of game theory , 2011 .

[34]  Walid Saad,et al.  Game Theory in Wireless and Communication Networks: Applications of game theory in communications and networking , 2011 .

[35]  Tuomas Sandholm,et al.  The State of Solving Large Incomplete-Information Games, and Application to Poker , 2010, AI Mag..

[36]  Heinrich von Stackelberg,et al.  Stackelberg (Heinrich von) - The Theory of the Market Economy, translated from the German and with an introduction by Alan T. PEACOCK. , 1953 .

[37]  David Tse,et al.  Opportunistic beamforming using dumb antennas , 2002, IEEE Trans. Inf. Theory.

[38]  Jeff S. Shamma,et al.  Efficient computation of discounted asymmetric information zero-sum stochastic games , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[39]  Vijay Kamble Games with vector payoffs : a dynamic programming approach , 2015 .