9th International Conference on Cognitive Radio Oriented Wireless Networks

Research Article

On the Achievable Rate in a D2D Cognitive Secondary Network Under Jamming Attacks

Download673 downloads
  • @INPROCEEDINGS{10.4108/icst.crowncom.2014.255665,
        author={Senthuran Arunthavanathan and Leonardo Goratti and Lorenzo Maggi and Francesco De Pellegrini and Sithamparanathan Kandeepan},
        title={On the Achievable Rate in a D2D Cognitive Secondary Network Under Jamming Attacks},
        proceedings={9th International Conference on Cognitive Radio Oriented Wireless Networks},
        publisher={IEEE},
        proceedings_a={CROWNCOM},
        year={2014},
        month={7},
        keywords={cognitive radio jamming zero-sum games lte},
        doi={10.4108/icst.crowncom.2014.255665}
    }
    
  • Senthuran Arunthavanathan
    Leonardo Goratti
    Lorenzo Maggi
    Francesco De Pellegrini
    Sithamparanathan Kandeepan
    Year: 2014
    On the Achievable Rate in a D2D Cognitive Secondary Network Under Jamming Attacks
    CROWNCOM
    IEEE
    DOI: 10.4108/icst.crowncom.2014.255665
Senthuran Arunthavanathan1,*, Leonardo Goratti2, Lorenzo Maggi2, Francesco De Pellegrini2, Sithamparanathan Kandeepan1
  • 1: RMIT University
  • 2: CREATE-NET
*Contact email: senthunathan89@gmail.com

Abstract

Ongoing developments of the LTE standard will allow for device-to-device (D2D) communications, which will enable direct connection of user equipments (UEs). Since UEs are becoming increasingly more powerful both in computational power and in the role they have in the network, a concrete threat is that a hand-held D2D-enabled device could be deployed to jam intentionally ongoing transmissions of other D2D users. In this context, a natural concern for operators will be the resilience of the legitimate user (LU) against a jammer's (J) attack. In this work, we model an LTE D2D system made of a pair of LUs and a J that tries to impair their communication. We model the adversarial scenario between the transmitting LU and J as a zero-sum game: in this game, J's target is to minimize the throughput of the legitimate D2D pair. We show the achievable channel rate of the D2D pair under jamming attacks and the existence of a Nash equilibrium. Finally, when both players learn each other strategy over time, e.g., employing fictitious play, such equilibrium becomes the system's operating point.