Skip to main content
Erschienen in: Wireless Networks 4/2019

07.12.2017

An optimal transmission strategy in zero-sum matrix games under intelligent jamming attacks

verfasst von: Senthuran Arunthavanathan, Leonardo Goratti, Lorenzo Maggi, Francesco de Pellegrini, Sithamparanathan Kandeepan, Sam Reisenfield

Erschienen in: Wireless Networks | Ausgabe 4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cognitive radio networks are more susceptible to jamming attacks due to the nature of unlicensed users accessing the spectrum by performing dynamic spectrum access. In such a context, a natural concern for operators is the resilience of the system. We model such a scenario as one of adversity in the system consisting of a single legitimate (LU) pair and malicious user (MU). The aim of the LU is to maximize throughput of transmissions, while the MU is to minimize the throughput of the LU completely. We present the achievable transmission rate of the LU pair under jamming attacks taking into account mainly on the transmission power per channel. Furthermore, we embed our utility function in a zero-sum matrix game and extend this by employing a fictitious play when both players learn each other’s strategy over time, e.g., such an equilibrium becomes the system’s global operating point. We further extend this to a reinforcement learning (RL) approach, where the LU is given the advantage of incorporating RL methods to maximize its throughput for fixed jamming strategies.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kandeepan, S., Gomez, K., Gorratti, L., Rasheed, T., & Baldini, G. (2016). Power controlling for device to device transmissions in aerial access networks. In IEEE ATC, pp. 48–53. Kandeepan, S., Gomez, K., Gorratti, L., Rasheed, T., & Baldini, G. (2016). Power controlling for device to device transmissions in aerial access networks. In IEEE ATC, pp. 48–53.
2.
Zurück zum Zitat Al-Hourani, A., Kandeepan, S., & Hossain, E. (2016). Relay-assisted device-to-device communication: a stochastic analysis of energy saving. In: IEEE TMC. Al-Hourani, A., Kandeepan, S., & Hossain, E. (2016). Relay-assisted device-to-device communication: a stochastic analysis of energy saving. In: IEEE TMC.
3.
Zurück zum Zitat Khare, A., Saxena, M., Thakur, R. S., & Chourasia, K. (2013). Attacks and preventions of cognitive networks: A survey. IJARCET, 2(3), 1002–1006. Khare, A., Saxena, M., Thakur, R. S., & Chourasia, K. (2013). Attacks and preventions of cognitive networks: A survey. IJARCET, 2(3), 1002–1006.
4.
Zurück zum Zitat Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas of Communications, 23(2), 201–220.CrossRef Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas of Communications, 23(2), 201–220.CrossRef
5.
Zurück zum Zitat Mitola, J., & Maguire, G. (1999). Cognitive radio: Making software radios more personal. IEEE Personal Communications, 6(4), 13–18.CrossRef Mitola, J., & Maguire, G. (1999). Cognitive radio: Making software radios more personal. IEEE Personal Communications, 6(4), 13–18.CrossRef
6.
Zurück zum Zitat Al-Hourani, A., & Kandeepan, S. (Dec. 2013). Cognitive relay nodes for airborne LTE emergency networks. In IEEE ICSPCS, pp. 1–9. Al-Hourani, A., & Kandeepan, S. (Dec. 2013). Cognitive relay nodes for airborne LTE emergency networks. In IEEE ICSPCS, pp. 1–9.
7.
Zurück zum Zitat Doumi, T., Dolan, M. F., Tatesh, S., Casati, A., Tsirtsis, G., Anchan, K., et al. (2013). LTE for public safety networks. IEEE Wireless Communications, 51(2), 106–112. Doumi, T., Dolan, M. F., Tatesh, S., Casati, A., Tsirtsis, G., Anchan, K., et al. (2013). LTE for public safety networks. IEEE Wireless Communications, 51(2), 106–112.
8.
Zurück zum Zitat Sesia, S., Toufik, I., & Baker, M. (2009). The UMTS long term evolution from theory to practice (2nd ed.). Hoboken: Wiley. Sesia, S., Toufik, I., & Baker, M. (2009). The UMTS long term evolution from theory to practice (2nd ed.). Hoboken: Wiley.
9.
Zurück zum Zitat Fodor, G., Dalman, E., Mildh, G., Parkvall, S., Reider, N., Miklós, G., et al. (2012). Design aspect of network assisted device-to-device communications. IEEE Wireless Communication, 50(3), 170–177. Fodor, G., Dalman, E., Mildh, G., Parkvall, S., Reider, N., Miklós, G., et al. (2012). Design aspect of network assisted device-to-device communications. IEEE Wireless Communication, 50(3), 170–177.
10.
Zurück zum Zitat Doppler, K., Rinne, M., Wijting, C., Ribeiro, C. B., & Hugl, K. (2012). Device-to-device communication as an uderlay to LTE-advanced networks. IEEE Wireless Communications Magazine, 47(12), 42–49.CrossRef Doppler, K., Rinne, M., Wijting, C., Ribeiro, C. B., & Hugl, K. (2012). Device-to-device communication as an uderlay to LTE-advanced networks. IEEE Wireless Communications Magazine, 47(12), 42–49.CrossRef
12.
Zurück zum Zitat Wang, B., Wu, Y., & Ray Liu, K. J. (2009). Optimal power allocation strategy against jamming attacks using the Colonel Blotto game. In Proceedings of IEEE GLOBECOM, pp. 1–5. Wang, B., Wu, Y., & Ray Liu, K. J. (2009). Optimal power allocation strategy against jamming attacks using the Colonel Blotto game. In Proceedings of IEEE GLOBECOM, pp. 1–5.
13.
Zurück zum Zitat Wu, Y., Wang, B., Ray Liu, K. J., & Clancy, T. C. (2012). Anti-jamming games in multi-channel cognitive radio networks. IEEE Communications, 30(1), 1–12. Wu, Y., Wang, B., Ray Liu, K. J., & Clancy, T. C. (2012). Anti-jamming games in multi-channel cognitive radio networks. IEEE Communications, 30(1), 1–12.
14.
Zurück zum Zitat Sutton, R. S., & Barto, A. G. (1998). Reinforcement learning: An introduction. Cambridge: MIT Press.MATH Sutton, R. S., & Barto, A. G. (1998). Reinforcement learning: An introduction. Cambridge: MIT Press.MATH
15.
Zurück zum Zitat Chen, C., Song, M., Xin, C., & Backens, J. (2013). A game-theoretical anti-jamming scheme for cognitive radio networks. IEEE Networks, 27(3), 22–27.CrossRef Chen, C., Song, M., Xin, C., & Backens, J. (2013). A game-theoretical anti-jamming scheme for cognitive radio networks. IEEE Networks, 27(3), 22–27.CrossRef
16.
Zurück zum Zitat Li, Y., Yang, R., & Ye, F. (2010). Non-cooperative spectrum allocation based on game theory in cognitive radio networks. In IEEE BIC-TA, pp. 1134–1137. Li, Y., Yang, R., & Ye, F. (2010). Non-cooperative spectrum allocation based on game theory in cognitive radio networks. In IEEE BIC-TA, pp. 1134–1137.
17.
Zurück zum Zitat Singh, S., & Trivedi, A. (Sept. 2012). Anti-jamming in cognitive radio networks using reinforcement learning algorithms. In IEEE WOCN, pp. 1–5. Singh, S., & Trivedi, A. (Sept. 2012). Anti-jamming in cognitive radio networks using reinforcement learning algorithms. In IEEE WOCN, pp. 1–5.
18.
Zurück zum Zitat Sodagari, S., & Charles Clancy, T. (2011). An anti-jamming strategy for channel access in cognitive radio networks. Berlin: Springer.CrossRef Sodagari, S., & Charles Clancy, T. (2011). An anti-jamming strategy for channel access in cognitive radio networks. Berlin: Springer.CrossRef
19.
Zurück zum Zitat Gwon, Y., Dastangooand Carl Fossa, S., & Kung, H. T. (Feb. 2013). Competing mobile network game: Embracing antijamming and jamming strategies with reinforcement learning. In IEEE conference on communications and network security (CNS). Gwon, Y., Dastangooand Carl Fossa, S., & Kung, H. T. (Feb. 2013). Competing mobile network game: Embracing antijamming and jamming strategies with reinforcement learning. In IEEE conference on communications and network security (CNS).
20.
Zurück zum Zitat Goratti, L., Gomez, K. M., Fedrizzi, R., & Rasheed, T. (Dec. 2013). A novel device-to-device communication protocol for public safety applications. In IEEE Globecom 2013 D2D Workshop, Atlanta. Goratti, L., Gomez, K. M., Fedrizzi, R., & Rasheed, T. (Dec. 2013). A novel device-to-device communication protocol for public safety applications. In IEEE Globecom 2013 D2D Workshop, Atlanta.
21.
Zurück zum Zitat Firouzbakht, K., Noubir, G., & Salehi, M. (2012). On the capacity of rate-adaptive packetized wireless communication links under jamming. In Proceedings of the ACM WISEC conference. Firouzbakht, K., Noubir, G., & Salehi, M. (2012). On the capacity of rate-adaptive packetized wireless communication links under jamming. In Proceedings of the ACM WISEC conference.
22.
Zurück zum Zitat Hanawal, M. K., Abdel-Rahman, M. J., & Krunz, M. (2014). Game theoretic anti-jamming dynamic frequency hopping and rate adaptation in wireless systems. In Proceedings of the WiOpt conference. Hanawal, M. K., Abdel-Rahman, M. J., & Krunz, M. (2014). Game theoretic anti-jamming dynamic frequency hopping and rate adaptation in wireless systems. In Proceedings of the WiOpt conference.
23.
Zurück zum Zitat Hanawal, M. K., Abdel-Rahman, M. J., & Krunz, M. (2015). Joint adaptation of frequency hopping and transmission rate for anti-jamming wireless systems. IEEE Transactions on Mobile Computing. Hanawal, M. K., Abdel-Rahman, M. J., & Krunz, M. (2015). Joint adaptation of frequency hopping and transmission rate for anti-jamming wireless systems. IEEE Transactions on Mobile Computing.
24.
Zurück zum Zitat Xiao, L., Li, Y., & Zhao, Y. (2015). Power control with reinforcement learning in cooperative cognitive radio networks against jamming. Springer Journal of Supercomputing, 71(9), 3237–3257.CrossRef Xiao, L., Li, Y., & Zhao, Y. (2015). Power control with reinforcement learning in cooperative cognitive radio networks against jamming. Springer Journal of Supercomputing, 71(9), 3237–3257.CrossRef
25.
Zurück zum Zitat Xiao, L., Liu, J., Li, Q., Mandayam, N., & Poor, V. H. (2015). User-centric view of jamming games in cognitive radio networks. IEEE Transactions on Information Forensics & Security, 10(12), 2578–2590.CrossRef Xiao, L., Liu, J., Li, Q., Mandayam, N., & Poor, V. H. (2015). User-centric view of jamming games in cognitive radio networks. IEEE Transactions on Information Forensics & Security, 10(12), 2578–2590.CrossRef
26.
Zurück zum Zitat Zhou, B., Hu, H., Huang, S. Q., & Chen, H. H. (2013). Intracluster device-to-device relay algorithm with optimal resource utilization. IEEE Transactions on Vehicular Technology, 62(5), 2315–2326.CrossRef Zhou, B., Hu, H., Huang, S. Q., & Chen, H. H. (2013). Intracluster device-to-device relay algorithm with optimal resource utilization. IEEE Transactions on Vehicular Technology, 62(5), 2315–2326.CrossRef
27.
Zurück zum Zitat Raghothaman, B., Deng, E., Pragada, R., Sternberg, G., Deng, T., & Vanganuru, K. (2013). Computing, networking and communications (ICNC). In 2013 international conference on architecture and protocols for LTE-based device to device communication, pp. 895–899. Raghothaman, B., Deng, E., Pragada, R., Sternberg, G., Deng, T., & Vanganuru, K. (2013). Computing, networking and communications (ICNC). In 2013 international conference on architecture and protocols for LTE-based device to device communication, pp. 895–899.
28.
Zurück zum Zitat Arunthavanathan, S., Goratti, L., Maggi, L., de Pellegrini, F., & Kandeepan, S. (Jun. 2014). On the achievable rate in a D2D cognitive secondary network under jamming attacks. In IEEE CrownComm, pp. 39–44. Arunthavanathan, S., Goratti, L., Maggi, L., de Pellegrini, F., & Kandeepan, S. (Jun. 2014). On the achievable rate in a D2D cognitive secondary network under jamming attacks. In IEEE CrownComm, pp. 39–44.
29.
Zurück zum Zitat Tague, P., Li, M., & Poovendran, R. (2009). Mitigation of control channel jamming under node capture attacks. IEEE Transactions on Mobile Computing, 8(9), 1221–1234.CrossRef Tague, P., Li, M., & Poovendran, R. (2009). Mitigation of control channel jamming under node capture attacks. IEEE Transactions on Mobile Computing, 8(9), 1221–1234.CrossRef
30.
Zurück zum Zitat Garnaev, A., & Trappe, W. (2015). One-time spectrum coexistence in dynamic spectrum access when the secondary user may be malicious. IEEE Transactions on Information Forensics and Security, 10(5), 1064–1075.CrossRef Garnaev, A., & Trappe, W. (2015). One-time spectrum coexistence in dynamic spectrum access when the secondary user may be malicious. IEEE Transactions on Information Forensics and Security, 10(5), 1064–1075.CrossRef
31.
Zurück zum Zitat Arunthavanathan, S., Kandeepan, S., & Evans, R. (Sept. 2013). Spectrum sensing and detection of incumbent-UEs in secondary-LTE based aerial-terrestrial networks for disaster recovery. In IEEE CAMAD, pp. 201–206. Arunthavanathan, S., Kandeepan, S., & Evans, R. (Sept. 2013). Spectrum sensing and detection of incumbent-UEs in secondary-LTE based aerial-terrestrial networks for disaster recovery. In IEEE CAMAD, pp. 201–206.
32.
Zurück zum Zitat Altman, E., Avrachenkov, K., & Garnaev, A. (2010). Fair resource allocation in wireless networks in the presence of a jammer. Performance Evaluation, 67(4), 338–349.CrossRef Altman, E., Avrachenkov, K., & Garnaev, A. (2010). Fair resource allocation in wireless networks in the presence of a jammer. Performance Evaluation, 67(4), 338–349.CrossRef
34.
Zurück zum Zitat Myerson, R. B. (1997). Game theory: Analysis of conflict. Cambridge: Harvard University Press.MATH Myerson, R. B. (1997). Game theory: Analysis of conflict. Cambridge: Harvard University Press.MATH
35.
Zurück zum Zitat Brown, G. W. (1951). Iterative solutions of games by fictitious play in activity analysis of production and allocation. In T. C. Koopmans (Ed.), Activity analysis of production and allocation (pp. 374–376). Hoboken: Wiley. Brown, G. W. (1951). Iterative solutions of games by fictitious play in activity analysis of production and allocation. In T. C. Koopmans (Ed.), Activity analysis of production and allocation (pp. 374–376). Hoboken: Wiley.
36.
Zurück zum Zitat Brown, G. W., & von Neumann, J. (1950). Solutions of games by differential equations: Contributions to the theory of games I: Annals of mathemathical studies (Vol. 24, pp. 73–79). Princeton: Princeton University Press. Brown, G. W., & von Neumann, J. (1950). Solutions of games by differential equations: Contributions to the theory of games I: Annals of mathemathical studies (Vol. 24, pp. 73–79). Princeton: Princeton University Press.
38.
Zurück zum Zitat Arunthavanathan, S., Kandeepan, S., & Evans, R. J. (2016). A Markov decision process-based opportunistic spectral access. IEEE Wireless Communication Letters, 5(5), 544–547.CrossRef Arunthavanathan, S., Kandeepan, S., & Evans, R. J. (2016). A Markov decision process-based opportunistic spectral access. IEEE Wireless Communication Letters, 5(5), 544–547.CrossRef
39.
Zurück zum Zitat Eltom, H., Kandeepan, S., Liang, Y. C., Moran, B., & Evans, R. J. (2016). HMM based cooperative spectrum occupancy prediction using hard fusion. In IEEE ICC, pp. 669–675. Eltom, H., Kandeepan, S., Liang, Y. C., Moran, B., & Evans, R. J. (2016). HMM based cooperative spectrum occupancy prediction using hard fusion. In IEEE ICC, pp. 669–675.
40.
Zurück zum Zitat Arunthavanathan, S., Kandeepan, S., & Evans, R. (Dec. 2013). Reinforcement learning based secondary user transmissions in cognitive radio networks. Globecom Workshops (IEEE GC Wkshps), pp. 374–379. Arunthavanathan, S., Kandeepan, S., & Evans, R. (Dec. 2013). Reinforcement learning based secondary user transmissions in cognitive radio networks. Globecom Workshops (IEEE GC Wkshps), pp. 374–379.
41.
Zurück zum Zitat Bkassiny, M., Li, Y., & Jayaweera, S. (2012). A survey on machine-learning techniques in cognitive radios. IEEE Communications Surveys and Tutorials, 99, 1–24. Bkassiny, M., Li, Y., & Jayaweera, S. (2012). A survey on machine-learning techniques in cognitive radios. IEEE Communications Surveys and Tutorials, 99, 1–24.
42.
Zurück zum Zitat Kaelbling, L., Littman, M., & Moore, A. (1996). Reinforcement learning: A survey. Journal of Artificial Intelligence Research, 4, 237–285.CrossRef Kaelbling, L., Littman, M., & Moore, A. (1996). Reinforcement learning: A survey. Journal of Artificial Intelligence Research, 4, 237–285.CrossRef
Metadaten
Titel
An optimal transmission strategy in zero-sum matrix games under intelligent jamming attacks
verfasst von
Senthuran Arunthavanathan
Leonardo Goratti
Lorenzo Maggi
Francesco de Pellegrini
Sithamparanathan Kandeepan
Sam Reisenfield
Publikationsdatum
07.12.2017
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 4/2019
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-017-1629-4

Weitere Artikel der Ausgabe 4/2019

Wireless Networks 4/2019 Zur Ausgabe

Neuer Inhalt