Skip to main content
Top
Published in: Wireless Networks 5/2019

27-01-2018

Power control games for multi-user anti-jamming communications

Authors: Long Yu, Qihui Wu, Yuhua Xu, Guoru Ding, Luliang Jia

Published in: Wireless Networks | Issue 5/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper investigates two different anti-jamming scenarios for wireless networks in which there exist one jammer and multiple users. The jammer jams all the users simultaneously. In one scenario, the users and the jammer sense the opponent’s information, and take appropriate strategies accordingly. This scenario is modeled as a Stackelberg game in which the jammer acts as a leader, and the users act as followers. In another scenario, the users and the jammer take actions simultaneously and the anti-jamming problem is modeled as a static game. The existence and uniqueness of game equilibrium are proved. Closed-form expressions of the Stackelberg equilibrium (SE) and the Nash equilibrium (NE) are derived. Simulation results are presented to validate our theoretical analysis. It is shown that the users’ average utility of the SE is lower than that of the NE since the jammer can reduce the users’ utilities by utilizing the leader advantage to improve its own utility.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sharma, R. K., & Rawat, D. B. (2015). Advances on security threats and countermeasures for cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 17(2), 1023–1043.CrossRef Sharma, R. K., & Rawat, D. B. (2015). Advances on security threats and countermeasures for cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 17(2), 1023–1043.CrossRef
2.
go back to reference Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A survey on wireless security: Technical challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9), 1727–1765.CrossRef Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A survey on wireless security: Technical challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9), 1727–1765.CrossRef
3.
go back to reference Ding, G., Wu, Q., Yao, Y., Wang, J., & Chen, Y. (2013). Kernel-based learning for statistical signal processing in cognitive radio networks: Theoretical foundations, example applications, and future directions. IEEE Signal Processing Magazine, 30(4), 126–136.CrossRef Ding, G., Wu, Q., Yao, Y., Wang, J., & Chen, Y. (2013). Kernel-based learning for statistical signal processing in cognitive radio networks: Theoretical foundations, example applications, and future directions. IEEE Signal Processing Magazine, 30(4), 126–136.CrossRef
4.
go back to reference Zhang, L., Ding, G., Wu, Q., Zou, Y., Han, Z., & Wang, J. (2015). Byzantine attack and defense in cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 17(3), 1342–1363. Third Quarter.CrossRef Zhang, L., Ding, G., Wu, Q., Zou, Y., Han, Z., & Wang, J. (2015). Byzantine attack and defense in cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 17(3), 1342–1363. Third Quarter.CrossRef
5.
go back to reference Fudenberg, D., & Tirole, J. (1991). Game theory. Cambridge: The MIT Press.MATH Fudenberg, D., & Tirole, J. (1991). Game theory. Cambridge: The MIT Press.MATH
6.
go back to reference Altman, E., Avrachenkov, K., & Garnaev, A. (2007) A jamming game in wireless networks with transmission cost. In Proceedings of the 2007 NET-COOP (pp. 1–12). Altman, E., Avrachenkov, K., & Garnaev, A. (2007) A jamming game in wireless networks with transmission cost. In Proceedings of the 2007 NET-COOP (pp. 1–12).
7.
go back to reference Altman, E., Avrachenkov, K., & Garnaev, A. (2009) Jamming in wireless networks: the case of several jammers. In Proceedings of the 2009 GameNets (pp. 585–592). Altman, E., Avrachenkov, K., & Garnaev, A. (2009) Jamming in wireless networks: the case of several jammers. In Proceedings of the 2009 GameNets (pp. 585–592).
8.
go back to reference Bardan, R., Brahma, S., & Varshney, P. K. (2016). Strategic power allocation with incomplete information in the presence of a jammer. IEEE Transactions on Communications, 64(8), 3467–3479.CrossRef Bardan, R., Brahma, S., & Varshney, P. K. (2016). Strategic power allocation with incomplete information in the presence of a jammer. IEEE Transactions on Communications, 64(8), 3467–3479.CrossRef
9.
go back to reference Stackelberg, V. (1934). Marketform und Gleichgewicht. Oxford: Oxford University Press.MATH Stackelberg, V. (1934). Marketform und Gleichgewicht. Oxford: Oxford University Press.MATH
10.
go back to reference Tang, X., Ren, P., & Wang, Y. et al. (2015). Securing wireless transmission against reactive jamming: A Stackelberg game framework. In Proceedings of the 2015 IEEE GLOBECOM (pp. 1–6). Tang, X., Ren, P., & Wang, Y. et al. (2015). Securing wireless transmission against reactive jamming: A Stackelberg game framework. In Proceedings of the 2015 IEEE GLOBECOM (pp. 1–6).
11.
go back to reference Xiao, L., Xie, C., & Chen, T. et al. (2016). Mobile offloading game against smart attacks. In Proceedings of the 2016 IEEE INFOCOM (pp. 403–408). Xiao, L., Xie, C., & Chen, T. et al. (2016). Mobile offloading game against smart attacks. In Proceedings of the 2016 IEEE INFOCOM (pp. 403–408).
12.
go back to reference Yang, D., Zhang, J., Fang, X., Richa, A., & Xue, G. (2012). Optimal transmission power control in the presence of a smart jammer. In Proceedings of the 2012 GLOBECOM (pp. 5506–5511). Yang, D., Zhang, J., Fang, X., Richa, A., & Xue, G. (2012). Optimal transmission power control in the presence of a smart jammer. In Proceedings of the 2012 GLOBECOM (pp. 5506–5511).
13.
go back to reference Yang, D., Xue, G., Zhang, J., Richa, A., & Fang, X. (2013). Coping with a smart jammer in wireless networks: A Stackelberg game approach. IEEE Transactions on Wireless Communications, 12(8), 4038–4047.CrossRef Yang, D., Xue, G., Zhang, J., Richa, A., & Fang, X. (2013). Coping with a smart jammer in wireless networks: A Stackelberg game approach. IEEE Transactions on Wireless Communications, 12(8), 4038–4047.CrossRef
14.
go back to reference Xiao, L., Chen, T., Liu, J., & Dai, H. (2015). Anti-jamming transmission Stackelberg game with observation errors. IEEE Communications Letters, 19(6), 949–952.CrossRef Xiao, L., Chen, T., Liu, J., & Dai, H. (2015). Anti-jamming transmission Stackelberg game with observation errors. IEEE Communications Letters, 19(6), 949–952.CrossRef
15.
go back to reference Jia, L., Yao, F., Sun, Y., et al. (2016). Bayesian stackelberg game for antijamming transmission with incomplete information. IEEE Communications Letters, 20(10), 1991–1994.CrossRef Jia, L., Yao, F., Sun, Y., et al. (2016). Bayesian stackelberg game for antijamming transmission with incomplete information. IEEE Communications Letters, 20(10), 1991–1994.CrossRef
16.
go back to reference Goldsmith, A. (2005). Wireless communications. New York: Cambridge University Press.CrossRef Goldsmith, A. (2005). Wireless communications. New York: Cambridge University Press.CrossRef
17.
go back to reference El-Bardan, R., Brahma, S., & Varshney, P. K. (2014). Power control with jammer location uncertainty: A game theoretic perspective. In Proceedings of the 2014 48th annual conference on information sciences and systems (CISS) (pp. 1–6). El-Bardan, R., Brahma, S., & Varshney, P. K. (2014). Power control with jammer location uncertainty: A game theoretic perspective. In Proceedings of the 2014 48th annual conference on information sciences and systems (CISS) (pp. 1–6).
18.
go back to reference Boyd, S., & Vandenberghe, L. (2004). Convex optimization. Cambridge: Cambridge University Press.CrossRefMATH Boyd, S., & Vandenberghe, L. (2004). Convex optimization. Cambridge: Cambridge University Press.CrossRefMATH
19.
go back to reference Zhang, R. (2010). On active learning and supervised transmission of spectrum sharing based cognitive radios by exploiting hidden primary radio feedback. IEEE Transactions on Communications, 58(10), 2960–2970.CrossRef Zhang, R. (2010). On active learning and supervised transmission of spectrum sharing based cognitive radios by exploiting hidden primary radio feedback. IEEE Transactions on Communications, 58(10), 2960–2970.CrossRef
Metadata
Title
Power control games for multi-user anti-jamming communications
Authors
Long Yu
Qihui Wu
Yuhua Xu
Guoru Ding
Luliang Jia
Publication date
27-01-2018
Publisher
Springer US
Published in
Wireless Networks / Issue 5/2019
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-018-1664-9

Other articles of this Issue 5/2019

Wireless Networks 5/2019 Go to the issue