Skip to main content
Top

2019 | OriginalPaper | Chapter

4. Performance of Dynamic Secure Routing Game

Authors : Ju Bin Song, Quanyan Zhu

Published in: Game Theory for Networking Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we illustrate the properties of proposed dynamic secure routing game framework to effectively combat jamming attacks in distributed cognitive radio networks. We derive the saddle-point equilibrium for distributed routing game that supports a novel recovery of routing path failure against unknown attackers and enhances the security and resilience of the routing protocols in face of adversarial attacks. We use network simulation using NS-2 to corroborate our results in the paper.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Note that “security strategy” is a game-theoretic term, referring the worst-case optimal strategies. It should not be interpreted as “cyber security strategy” as the term in computer science and engineering.
 
Literature
1.
go back to reference Başar, T., Olsder, G.J.: Dynamic Noncooperative Game Theory. SIAM Series in Classics in Applied Mathematics. SIAM, Philadelphia (1999)MATH Başar, T., Olsder, G.J.: Dynamic Noncooperative Game Theory. SIAM Series in Classics in Applied Mathematics. SIAM, Philadelphia (1999)MATH
2.
go back to reference Chan, W.C., Lu, T.C., Chen, R.J.: Pollarczek-Khinchin formula for the M/G/1 queue in discrete time with vacations. In: IEE Proceedings of Computers and Digital Techniques, vol. 144, pp. 222–226 (1997) Chan, W.C., Lu, T.C., Chen, R.J.: Pollarczek-Khinchin formula for the M/G/1 queue in discrete time with vacations. In: IEE Proceedings of Computers and Digital Techniques, vol. 144, pp. 222–226 (1997)
3.
go back to reference Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26, 25–37 (2008)CrossRef Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26, 25–37 (2008)CrossRef
4.
go back to reference Clancy, T.C., Goergen, N.: Security in cognitive radio networks: threats and mitigation. In: Proceedings of the 3rd International Conference on CrownCom08, Singapore (2008) Clancy, T.C., Goergen, N.: Security in cognitive radio networks: threats and mitigation. In: Proceedings of the 3rd International Conference on CrownCom08, Singapore (2008)
5.
go back to reference Ding, L., Melodia, T., Batalama, S., Medley, M.J.: ROSA: distributed joint routing and dynamic spectrum allocation in cognitive radio ad hoc networks. In: Proceedings of ACM MSWiM, Canary Islands, Spain (2009) Ding, L., Melodia, T., Batalama, S., Medley, M.J.: ROSA: distributed joint routing and dynamic spectrum allocation in cognitive radio ad hoc networks. In: Proceedings of ACM MSWiM, Canary Islands, Spain (2009)
6.
go back to reference Hossain, E., Niyato, D., Han, Z.: Dynamic Spectrum Access in Cognitive Radio Networks. Cambridge University Press, Cambridge (2009)CrossRef Hossain, E., Niyato, D., Han, Z.: Dynamic Spectrum Access in Cognitive Radio Networks. Cambridge University Press, Cambridge (2009)CrossRef
7.
go back to reference Hu, Y.-C., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Secur. Priv. 2, 28–39 (2004) Hu, Y.-C., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Secur. Priv. 2, 28–39 (2004)
8.
go back to reference Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA (2003) Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA (2003)
9.
go back to reference Saad, W., Zhu, Q., Başar, T., Han, Z., Hjorungnes, A.: Hierarchical network formation games in the uplink of multi-hop wireless networks. In: Proceedings of IEEE Globecom, Honolulu, Hawaii (2009) Saad, W., Zhu, Q., Başar, T., Han, Z., Hjorungnes, A.: Hierarchical network formation games in the uplink of multi-hop wireless networks. In: Proceedings of IEEE Globecom, Honolulu, Hawaii (2009)
10.
go back to reference Shi, Y., Hou, Y.T.: A distributed optimization algorithm for multi-hop cognitive radio networks. In: Proceedings of International Conference on Computer Communications, Phoenix, AZ, USA (2008) Shi, Y., Hou, Y.T.: A distributed optimization algorithm for multi-hop cognitive radio networks. In: Proceedings of International Conference on Computer Communications, Phoenix, AZ, USA (2008)
11.
go back to reference Tague, P., Slater, D., Noubir, G., Poovendran, R.: Linear programming models for jamming attacks on network traffic flows. In: Proceedings of WiOpt’08, Berlin, Germany (2008) Tague, P., Slater, D., Noubir, G., Poovendran, R.: Linear programming models for jamming attacks on network traffic flows. In: Proceedings of WiOpt’08, Berlin, Germany (2008)
12.
go back to reference Tague, P., Nabar, P., Ritcey, J.A., Poovendram, R.: Jamming-aware traffic allocation for multiple-path routing using portfolio selection. IEEE/ACM Trans. Networking 19, 184–194 (2011)CrossRef Tague, P., Nabar, P., Ritcey, J.A., Poovendram, R.: Jamming-aware traffic allocation for multiple-path routing using portfolio selection. IEEE/ACM Trans. Networking 19, 184–194 (2011)CrossRef
13.
go back to reference Wang, W., Li, H., Sun, Y., Han, Z.: Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks. EURASIP J. Adv. Signal Process. 2010, 106–117 (2010) Wang, W., Li, H., Sun, Y., Han, Z.: Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks. EURASIP J. Adv. Signal Process. 2010, 106–117 (2010)
14.
go back to reference Wang, W., Sun, Y., Li, H., Han, Z.: Cross-layer attack and defense in cognitive radio networks. In: Proceedings of IEEE Globecom, Miami, Florida, USA (2010) Wang, W., Sun, Y., Li, H., Han, Z.: Cross-layer attack and defense in cognitive radio networks. In: Proceedings of IEEE Globecom, Miami, Florida, USA (2010)
15.
go back to reference Wassim, E., Haidar, S., Mohsen, G.: Survey of security issues in cognitive radio networks. J. Internet Technol. 12, 181–198 (2011) Wassim, E., Haidar, S., Mohsen, G.: Survey of security issues in cognitive radio networks. J. Internet Technol. 12, 181–198 (2011)
16.
go back to reference Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of ACM MobiHoc, Urbana, IL, USA (2005) Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of ACM MobiHoc, Urbana, IL, USA (2005)
17.
go back to reference Zhu, Q., Tembine, T., Başar, T.: Heterogeneous learning in zero-sum stochastic games with incomplete information. In: Proceedings of IEEE Conference on Decision and Control, Atlanta, Georgia (2010) Zhu, Q., Tembine, T., Başar, T.: Heterogeneous learning in zero-sum stochastic games with incomplete information. In: Proceedings of IEEE Conference on Decision and Control, Atlanta, Georgia (2010)
18.
go back to reference Zhu, Q., Yuan, Z., Song, J.B., Han, Z., Başar, T.: Dynamic interference minimization routing game for on-demand cognitive pilot channel. In: Proceedings of IEEE Globecom, Miami, Florida (2010) Zhu, Q., Yuan, Z., Song, J.B., Han, Z., Başar, T.: Dynamic interference minimization routing game for on-demand cognitive pilot channel. In: Proceedings of IEEE Globecom, Miami, Florida (2010)
19.
go back to reference Zhu, Q., Song, J.B., Başar, T.: Dynamic secure routing game in distributed cognitive radio networks. In: Proceedings of IEEE Globecom, Houston, Texas (2011) Zhu, Q., Song, J.B., Başar, T.: Dynamic secure routing game in distributed cognitive radio networks. In: Proceedings of IEEE Globecom, Houston, Texas (2011)
20.
go back to reference Zhu, Q., Tembine, H., Başar, T.: Distributed strategic learning with application to network security. In: Proceedings of IEEE American Control Conference, San Francisco, CA (2011) Zhu, Q., Tembine, H., Başar, T.: Distributed strategic learning with application to network security. In: Proceedings of IEEE American Control Conference, San Francisco, CA (2011)
21.
go back to reference Zhu, Q., Yuan, Z., Song, J.B., Han, Z., Başar, T.: Interference aware routing game for cognitive radio multi-hop networks. IEEE J. Sel. Areas Commun. 30, 2006–2015 (2012)CrossRef Zhu, Q., Yuan, Z., Song, J.B., Han, Z., Başar, T.: Interference aware routing game for cognitive radio multi-hop networks. IEEE J. Sel. Areas Commun. 30, 2006–2015 (2012)CrossRef
Metadata
Title
Performance of Dynamic Secure Routing Game
Authors
Ju Bin Song
Quanyan Zhu
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-319-93058-9_4