Skip to main content
Top
Published in: Wireless Networks 6/2019

23-03-2018

Game theoretic approach of eavesdropping attack in millimeter-wave-based WPANs with directional antennas

Author: Meejoung Kim

Published in: Wireless Networks | Issue 6/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we propose a game theoretic framework to analyze a passive eavesdropping attack in millimeter-wave-based wireless personal area networks. As the interaction between defenders and attackers in network security issues can be considered as a game, devices can be considered as players. Usually a player has insufficient information of other players such as strategies and payoffs especially in static situation. We assume that each player selects its strategy based on its belief about the information on opponents and the belief is known as a prior probability. The Bayesian game model is a relevant framework for this situation. It is assumed that each device is equipped with a directional antenna and knows the channel state. In the analysis, the exposure region (ER) that is determined by the antennas directions of players is considered and the ratio of ER for the total area of a network is calculated by using the probability density function of distance between players. The optimal strategies of two players, a transmitter and an eavesdropper, are derived in terms of Bayesian Nash equilibriums and payoffs for the players are computed for pure and mixed strategies in static situation. The analysis shows how the effects of using a directional antenna and the prior probability of transmitters belief are involved in the Nash equilibriums. Numerical results show the equilibriums and two players payoffs. Those values depend on several parameters such as beamwidth and prior probability of belief as well as its opponents strategies. It also shows the effect of directional antennas in the eavesdropping attack; the use of directional antenna seems to increase the transmitters payoff, while it seems to decrease the eavesdroppers payoff. The obtained results will provide the criteria for selecting appropriate strategy to transmitters when an eavesdropper exists in the network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
go back to reference Liang, X., & Xiao, Y. (2013). Game theory for network security. IEEE Communications Survey and Tutorials, 15(1), 472–486.CrossRef Liang, X., & Xiao, Y. (2013). Game theory for network security. IEEE Communications Survey and Tutorials, 15(1), 472–486.CrossRef
2.
go back to reference Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., & Qishi Wu, Q. (2010). A survey of game theory as applied to network security. In Proceedings of the 43rd Hawaii international conference on system sciences (pp. 1–10). Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., & Qishi Wu, Q. (2010). A survey of game theory as applied to network security. In Proceedings of the 43rd Hawaii international conference on system sciences (pp. 1–10).
3.
go back to reference Manshaei, M. H., Zhu, Q., Alpcan, T., Basar, T., & Hubaux, J.-P. (2013). Game theory meets network security and privacy. Journal of ACM Computing Surveys, 45(3), 25.MATH Manshaei, M. H., Zhu, Q., Alpcan, T., Basar, T., & Hubaux, J.-P. (2013). Game theory meets network security and privacy. Journal of ACM Computing Surveys, 45(3), 25.MATH
4.
go back to reference Rao, N. S., Poole, S. W., Ma, C. Y., He, F., Zhuang, J., & Yau, D. K. (2016). Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models. Risk Analysis, 36(4), 694–710.CrossRef Rao, N. S., Poole, S. W., Ma, C. Y., He, F., Zhuang, J., & Yau, D. K. (2016). Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models. Risk Analysis, 36(4), 694–710.CrossRef
5.
go back to reference Abdalzaher, M. S., Seddik, K., Elsabrouty, M., Muta, O., Furukawa, H., & Abdel-Rahman, A. (2016). Game theory meets wireless sensor networks security requirements and threats mitigation: A survey. Sensors, 16(7), 1003.CrossRef Abdalzaher, M. S., Seddik, K., Elsabrouty, M., Muta, O., Furukawa, H., & Abdel-Rahman, A. (2016). Game theory meets wireless sensor networks security requirements and threats mitigation: A survey. Sensors, 16(7), 1003.CrossRef
6.
go back to reference Mao, Y., Zhu, P., & Wei, G. (2013). A game theoretic model for wireless sensor networks with hidden-action attacks. International Journal of Distributed Sensor Networks, 9(8), 836056.CrossRef Mao, Y., Zhu, P., & Wei, G. (2013). A game theoretic model for wireless sensor networks with hidden-action attacks. International Journal of Distributed Sensor Networks, 9(8), 836056.CrossRef
7.
go back to reference Shen, S., Huang, L., Fan, E., Hu, K., Liu, J., & Cao, Q. (2016). Trust dynamics in WSNs: An evolutionary game-theoretic approach. Journal of Sensors, 2016, 1–11. Shen, S., Huang, L., Fan, E., Hu, K., Liu, J., & Cao, Q. (2016). Trust dynamics in WSNs: An evolutionary game-theoretic approach. Journal of Sensors, 2016, 1–11.
8.
go back to reference Abdalzaher, M. S., Seddik, K., Muta, O., & Abdelrahman, A. (2016). Using Stackelberg game to enhance node protection in WSNs. In Proceedings of CCNC (pp. 853–856). Abdalzaher, M. S., Seddik, K., Muta, O., & Abdelrahman, A. (2016). Using Stackelberg game to enhance node protection in WSNs. In Proceedings of CCNC (pp. 853–856).
9.
go back to reference Shan, X., & Zhuang, J. (2013). Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game. European Journal of Operational Research, 228(1), 262–272.MATHCrossRef Shan, X., & Zhuang, J. (2013). Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game. European Journal of Operational Research, 228(1), 262–272.MATHCrossRef
10.
go back to reference Xu, J., & Zhuang, J. (2016). Modeling costly learning and counter-learning in a defender–attacker game with private defender information. Annals of Operations Research, 236(1), 271–289.MathSciNetMATHCrossRef Xu, J., & Zhuang, J. (2016). Modeling costly learning and counter-learning in a defender–attacker game with private defender information. Annals of Operations Research, 236(1), 271–289.MathSciNetMATHCrossRef
11.
go back to reference Ralescu, A. L. (1989). Concept learning from examples and counter examples. International Journal of Man-Machine Studies, 30, 329–354.CrossRef Ralescu, A. L. (1989). Concept learning from examples and counter examples. International Journal of Man-Machine Studies, 30, 329–354.CrossRef
12.
go back to reference Korzhyk, D., Yin, Z., Kiekintveld, C., Conitzer, V., & Tambe, M. (2011). Stackelberg vs. Nash in security games: An extended investigation of interchangeability, equivalence, and uniqueness. Journal of Artificial Intelligence Research, 41, 297–327.MathSciNetMATHCrossRef Korzhyk, D., Yin, Z., Kiekintveld, C., Conitzer, V., & Tambe, M. (2011). Stackelberg vs. Nash in security games: An extended investigation of interchangeability, equivalence, and uniqueness. Journal of Artificial Intelligence Research, 41, 297–327.MathSciNetMATHCrossRef
13.
go back to reference Saad, W., Han, Z., Basar, T., Debbah, M., & Hjorungnes, A. (2009). Coalitional games for distributed eavesdroppers cooperation in wireless networks. In Proceedings of valuetools (p. 66). Saad, W., Han, Z., Basar, T., Debbah, M., & Hjorungnes, A. (2009). Coalitional games for distributed eavesdroppers cooperation in wireless networks. In Proceedings of valuetools (p. 66).
14.
go back to reference Dong, R., Liu, L., Liu, J., & Xu, X. (2009). Intrusion detection system based on payoff matrix for wireless sensor networks. In Proceedings of WGEC (pp. 3–6). Dong, R., Liu, L., Liu, J., & Xu, X. (2009). Intrusion detection system based on payoff matrix for wireless sensor networks. In Proceedings of WGEC (pp. 3–6).
15.
go back to reference Shiva, S., Roy, S., Bedi, H., Dasgupta, D., & Wu, Q. (2010). A stochastic game model with imperfect information in cyber security. In Proceedings of ICIW (pp. 308–318). Shiva, S., Roy, S., Bedi, H., Dasgupta, D., & Wu, Q. (2010). A stochastic game model with imperfect information in cyber security. In Proceedings of ICIW (pp. 308–318).
16.
go back to reference Beckery, S., Jeff Seibert, J., David Zage, D., Cristina Nita-Rotaru C., & Radu Statey, R. (2011). Applying game theory to analyze attacks and defenses in virtual coordinate systems. In Proceedings of DSN (pp. 133–144). Beckery, S., Jeff Seibert, J., David Zage, D., Cristina Nita-Rotaru C., & Radu Statey, R. (2011). Applying game theory to analyze attacks and defenses in virtual coordinate systems. In Proceedings of DSN (pp. 133–144).
17.
go back to reference Garnaev, A., Baykal-Gursoy, M., & Poor, H. V. (2014). Incorporating attack type uncertainty into network protection. IEEE Transactions on Information Forensics and Security, 9, 1278–1287.CrossRef Garnaev, A., Baykal-Gursoy, M., & Poor, H. V. (2014). Incorporating attack type uncertainty into network protection. IEEE Transactions on Information Forensics and Security, 9, 1278–1287.CrossRef
18.
go back to reference Yuksel, M., Liu, X., & Erkip, E. (2011). A secure communication game with a relay helping the eavesdropper. IEEE Transactions on Information Forensics and Security, 6(3), 818–830.CrossRef Yuksel, M., Liu, X., & Erkip, E. (2011). A secure communication game with a relay helping the eavesdropper. IEEE Transactions on Information Forensics and Security, 6(3), 818–830.CrossRef
19.
go back to reference Mukherjee, A., & Swindlehurst, A. L. (2013). Jamming games in the MIMO wiretap channel with an active eavesdropper. IEEE Transactions on Signal Processing, 61(1), 82–91.MathSciNetMATHCrossRef Mukherjee, A., & Swindlehurst, A. L. (2013). Jamming games in the MIMO wiretap channel with an active eavesdropper. IEEE Transactions on Signal Processing, 61(1), 82–91.MathSciNetMATHCrossRef
20.
go back to reference Niu, H., Sun, L., Ito, M., & Sezaki, K. (2014). User cooperation analysis under eavesdropping attack: A game theory perspective. In Proceedings of PIMRC (pp. 139–144). Niu, H., Sun, L., Ito, M., & Sezaki, K. (2014). User cooperation analysis under eavesdropping attack: A game theory perspective. In Proceedings of PIMRC (pp. 139–144).
21.
go back to reference Zhu, Q., Saad, W., Han, Z., Poor, H. V. , & Basar, T. Q. (2011). Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach. In Proceedings of MILCOM (pp. 119–124). Zhu, Q., Saad, W., Han, Z., Poor, H. V. , & Basar, T. Q. (2011). Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach. In Proceedings of MILCOM (pp. 119–124).
22.
go back to reference Garnaev, A., & Trappe, W. (2017). Bargaining over the fair trade-off between secrecy and throughput in OFDM communications. IEEE Transactions on Information Forensics and Security, 12(1), 242–251. Garnaev, A., & Trappe, W. (2017). Bargaining over the fair trade-off between secrecy and throughput in OFDM communications. IEEE Transactions on Information Forensics and Security, 12(1), 242–251.
23.
go back to reference Cao, B., Sun, X., Li, Y., Wang, C., & Mei, H. (2016). Understanding the impact of employing relay node on wireless networks. IEEE Transactions on Vehicular Technology, 66, 4287–4299. Cao, B., Sun, X., Li, Y., Wang, C., & Mei, H. (2016). Understanding the impact of employing relay node on wireless networks. IEEE Transactions on Vehicular Technology, 66, 4287–4299.
24.
go back to reference Adu-Gyamf, D., Wang, Y., Zhang, F., Kamenyi, D. M., Memon, I., & Gustav, Y. H. (2013). Modeling the spreading behavior of passive worms in mobile social networks. In Proceedings of ICIMIMIE (pp. 380–383). Adu-Gyamf, D., Wang, Y., Zhang, F., Kamenyi, D. M., Memon, I., & Gustav, Y. H. (2013). Modeling the spreading behavior of passive worms in mobile social networks. In Proceedings of ICIMIMIE (pp. 380–383).
25.
go back to reference Khan, S., & Pathan, A.-S. K. (2013). Wireless networks and security issues, challenges and research trends. Heidelberg: Springer.CrossRef Khan, S., & Pathan, A.-S. K. (2013). Wireless networks and security issues, challenges and research trends. Heidelberg: Springer.CrossRef
26.
go back to reference Garnaev A., & Trappe, W. (2014). Secret communication when the eavesdropper might be an active adversary. In Proceedings of MACOM, Lecture notes of computer science (Vol. 8715 , pp. 121–136). Garnaev A., & Trappe, W. (2014). Secret communication when the eavesdropper might be an active adversary. In Proceedings of MACOM, Lecture notes of computer science (Vol. 8715 , pp. 121–136).
27.
go back to reference Boonyakarn, P., Komolkiti, P., & Aswakul, C. (2011). Game-based analysis of eavesdropping defense strategy in WMN with directional antenna. In Proceedings of JCSSE (pp. 29–33). Boonyakarn, P., Komolkiti, P., & Aswakul, C. (2011). Game-based analysis of eavesdropping defense strategy in WMN with directional antenna. In Proceedings of JCSSE (pp. 29–33).
28.
go back to reference Goel, V., Aggarwal, V., Yener, A., & Calderbank, A. R. (2010). Modeling location uncertainty for eavesdroppers: A secrecy graph approach. In Proceedings of ISIT (pp. 2627–2631). Goel, V., Aggarwal, V., Yener, A., & Calderbank, A. R. (2010). Modeling location uncertainty for eavesdroppers: A secrecy graph approach. In Proceedings of ISIT (pp. 2627–2631).
29.
go back to reference Li, X., Xu, J., Dai, H.-N., Zhao, Q., Cheang, C. F., & Wang, Q. (2015). On modeling eavesdropping attacks in wireless networks. Journal of Computational Science, 11, 196–204.MathSciNetCrossRef Li, X., Xu, J., Dai, H.-N., Zhao, Q., Cheang, C. F., & Wang, Q. (2015). On modeling eavesdropping attacks in wireless networks. Journal of Computational Science, 11, 196–204.MathSciNetCrossRef
30.
go back to reference Fan, L., Lei, X., Duong, T. Q., Elkashlan, M., & Karaglannidis, T. Q. (2014). Secure multiuser communications in multiple amplify-and-forward relay networks. IEEE Transactions on Communications, 62(9), 3299–3310.CrossRef Fan, L., Lei, X., Duong, T. Q., Elkashlan, M., & Karaglannidis, T. Q. (2014). Secure multiuser communications in multiple amplify-and-forward relay networks. IEEE Transactions on Communications, 62(9), 3299–3310.CrossRef
31.
go back to reference Dai, H.-N., Wang, Q., Li, D., & Wong, R. C.-W. (2013). On eavesdropping attacks in wireless sensor networks with directional antennas. International Journal of Distributed Sensor Networks, 9, 760834.CrossRef Dai, H.-N., Wang, Q., Li, D., & Wong, R. C.-W. (2013). On eavesdropping attacks in wireless sensor networks with directional antennas. International Journal of Distributed Sensor Networks, 9, 760834.CrossRef
32.
go back to reference Curiac, D.-I. (2016). Wireless sensor network security enhancement using directional antennas: State of the art and research challenges. Sensors, 16(488), 1–15. Curiac, D.-I. (2016). Wireless sensor network security enhancement using directional antennas: State of the art and research challenges. Sensors, 16(488), 1–15.
33.
go back to reference Wang, Q., Hong-Ning Dai, H.-N., & Zhao, Q. (2013). Eavesdropping security in wireless ad hoc networks with directional antennas. In Proceedings of WOCC (pp. 687–692). Wang, Q., Hong-Ning Dai, H.-N., & Zhao, Q. (2013). Eavesdropping security in wireless ad hoc networks with directional antennas. In Proceedings of WOCC (pp. 687–692).
34.
go back to reference Zhou, X., Ganti, R. K., & Andrews, J. G. (2011). Secure wireless network connectivity with multi-antenna transmission. IEEE Transactions on Wireless Communications, 10(2), 425–430.CrossRef Zhou, X., Ganti, R. K., & Andrews, J. G. (2011). Secure wireless network connectivity with multi-antenna transmission. IEEE Transactions on Wireless Communications, 10(2), 425–430.CrossRef
35.
go back to reference Zhu, J., Zou, Y., Wang, G., Yao, Y.-D., & Karagiannidis, G. K. (2016). On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping. IEEE Transactions on Vehicular Technology, 65(1), 214–225.CrossRef Zhu, J., Zou, Y., Wang, G., Yao, Y.-D., & Karagiannidis, G. K. (2016). On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping. IEEE Transactions on Vehicular Technology, 65(1), 214–225.CrossRef
36.
go back to reference Li, X., Wang, H., Dai, H.-N., Wang, Y., & Zhaol, Q. (2016). An analytical study on eavesdropping attacks in wireless nets of things. Mobile Information Systems, 2016, 1–10. Li, X., Wang, H., Dai, H.-N., Wang, Y., & Zhaol, Q. (2016). An analytical study on eavesdropping attacks in wireless nets of things. Mobile Information Systems, 2016, 1–10.
37.
go back to reference Valliappan, N. (2012). Antenna subset modulation for secure millimeter-wave wireless communication. M.S. dissertation, Chap 4, Science in Engineering, University of Texas, Austin, TX, USA. Valliappan, N. (2012). Antenna subset modulation for secure millimeter-wave wireless communication. M.S. dissertation, Chap 4, Science in Engineering, University of Texas, Austin, TX, USA.
38.
go back to reference Kim, M., Hwang, E., & Kim, J.-N. (2015). Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas. Wireless Networks, 23(2), 355–369.CrossRef Kim, M., Hwang, E., & Kim, J.-N. (2015). Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas. Wireless Networks, 23(2), 355–369.CrossRef
39.
go back to reference Kim, M., Kim, Y., & Lee, W. (2012). Performance analysis of directional CSMA/CA for IEEE 802.15.3c under saturation environments. ETRI Journal, 34(1), 24–34.CrossRef Kim, M., Kim, Y., & Lee, W. (2012). Performance analysis of directional CSMA/CA for IEEE 802.15.3c under saturation environments. ETRI Journal, 34(1), 24–34.CrossRef
40.
go back to reference Kim, M., Kim, Y. S., & Lee, W. (2013). Analysis of directional neighbour discovery process in millimetre wave wireless personal area networks. IET Networks, 2(2), 92–101.MathSciNetCrossRef Kim, M., Kim, Y. S., & Lee, W. (2013). Analysis of directional neighbour discovery process in millimetre wave wireless personal area networks. IET Networks, 2(2), 92–101.MathSciNetCrossRef
41.
go back to reference Kim, M., Kim, Y., & Lee, W. (2014). Resource allocation scheme for millimeter wave-based WPANs using directional antennas. ETRI Journal, 36(3), 385–395.CrossRef Kim, M., Kim, Y., & Lee, W. (2014). Resource allocation scheme for millimeter wave-based WPANs using directional antennas. ETRI Journal, 36(3), 385–395.CrossRef
42.
go back to reference Kim, M. (2016). Multi-hop communications in directional CSMA/CA over mmWave WPANs. Wireless Communications and Mobile Computing, 16, 765–777.CrossRef Kim, M. (2016). Multi-hop communications in directional CSMA/CA over mmWave WPANs. Wireless Communications and Mobile Computing, 16, 765–777.CrossRef
43.
go back to reference Kim, M. (2017). Optimal packet length for throughput maximization in mmWave WPANs. International Journal of Electronics, 104, 1700–1714.CrossRef Kim, M. (2017). Optimal packet length for throughput maximization in mmWave WPANs. International Journal of Electronics, 104, 1700–1714.CrossRef
44.
go back to reference Fudenberg, D., & Tirole, J. (1991). Game theory. Cambridge: The MIT Press.MATH Fudenberg, D., & Tirole, J. (1991). Game theory. Cambridge: The MIT Press.MATH
Metadata
Title
Game theoretic approach of eavesdropping attack in millimeter-wave-based WPANs with directional antennas
Author
Meejoung Kim
Publication date
23-03-2018
Publisher
Springer US
Published in
Wireless Networks / Issue 6/2019
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-018-1713-4

Other articles of this Issue 6/2019

Wireless Networks 6/2019 Go to the issue