Multi-Attacker Multi-Defender Interaction in mMTC Networks Via Differential Game

Massive machine type communications (mMTC) scenario, as one of the typical application scenarios of the fifth generation (5G) and beyond, introduces numerous communication terminals into networks, which inflicts the expansion of network attack surface, and poses tremendous challenges to network security. Different from single attacker and single defender interaction, a large volume of terminals in mMTC scenario may form attack or defense alliances, i.e., the interaction exists between multiple attackers and multiple defenders. This paper focuses on the multi-attacker multi-defender interaction in the mMTC scenario. Firstly, a non-zero-sum multi-attacker and multi-defender differential game model is formulated, considering attack and defense alliances, the dynamics and continuity of network interaction and the real-time strategy selection. Then, an optimal multi-attacker and multi-defender strategy selection algorithm is proposed by the introduction of Hamilton functions, based on which the optimal saddle point strategy is obtained. Finally, simulation results demonstrate the evolution of the optimal attack and defense strategies and show the impact of cost coefficient in the proposed differential game model on the attack and defense evolution. It is revealed that both alliances tend to be preemptive and the alliances will appropriately increase the intensity of attack and defense as the cost increases.

[1]  Wuyang Zhou,et al.  Dynamic Spectrum Access With Physical Layer Security: A Game-Based Jamming Approach , 2018, IEEE Access.

[2]  Sundeep Rangan,et al.  Towards 6G Networks: Use Cases and Technologies , 2019, ArXiv.

[3]  Xianwei Zhou,et al.  Non-cooperative differential game based energy consumption control for dynamic demand response in smart grid , 2019, China Communications.

[4]  Guiran Chang,et al.  DG-Based Active Defense Strategy to Defend against DDoS , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).

[5]  Yuchen Zhang,et al.  Attack-Defense Differential Game Model for Network Defense Strategy Selection , 2019, IEEE Access.

[6]  Jie Xu,et al.  Differential Security Game in Heterogeneous Device-to-Device Offloading Network Under Epidemic Risks , 2020, IEEE Transactions on Network Science and Engineering.

[7]  Chunjie Zhou,et al.  A Game-Theoretic Approach to Cross-Layer Security Decision-Making in Industrial Cyber-Physical Systems , 2020, IEEE Transactions on Industrial Electronics.

[8]  Mehdi Bennis,et al.  A Speculative Study on 6G , 2019, IEEE Wireless Communications.

[9]  Xiang Zhang,et al.  Partner Selection and Incentive Mechanism for Physical Layer Security , 2015, IEEE Transactions on Wireless Communications.

[10]  Athanasios V. Vasilakos,et al.  Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks , 2014, IEEE Transactions on Information Forensics and Security.

[11]  Alagan Anpalagan,et al.  Stackelberg Game Approaches for Anti-Jamming Defence in Wireless Networks , 2018, IEEE Wireless Communications.

[12]  Abraham O. Fapojuwo,et al.  Stackelberg Equilibria of an Anti-Jamming Game in Cooperative Cognitive Radio Networks , 2018, IEEE Transactions on Cognitive Communications and Networking.

[13]  Toshiaki Miyazaki,et al.  Jamming and Eavesdropping Defense in Green Cyber–Physical Transportation Systems Using a Stackelberg Game , 2018, IEEE Transactions on Industrial Informatics.

[14]  Afrand Agah,et al.  Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..

[15]  Sailik Sengupta,et al.  Markov Game Modeling of Moving Target Defense for Strategic Detection of Threats in Cloud Networks , 2018, ArXiv.

[16]  Jindong Wang,et al.  Markov Differential Game for Network Defense Decision-Making Method , 2018, IEEE Access.

[17]  Liang Xiao,et al.  Anti-Jamming Transmission Stackelberg Game With Observation Errors , 2015, IEEE Communications Letters.

[18]  Chong Wang,et al.  An analyzing method for computer network security based on Markov game model , 2016, 2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC).

[19]  Jin Xu,et al.  Secure Transmission in MISOME Wiretap Channel With Multiple Assisting Jammers: Maximum Secrecy Rate and Optimal Power Allocation , 2017, IEEE Transactions on Communications.

[20]  Song Guo,et al.  Utility Based Data Computing Scheme to Provide Sensing Service in Internet of Things , 2019, IEEE Transactions on Emerging Topics in Computing.