Skip to main content

2019 | OriginalPaper | Buchkapitel

4. Performance of Dynamic Secure Routing Game

verfasst von : Ju Bin Song, Quanyan Zhu

Erschienen in: Game Theory for Networking Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we illustrate the properties of proposed dynamic secure routing game framework to effectively combat jamming attacks in distributed cognitive radio networks. We derive the saddle-point equilibrium for distributed routing game that supports a novel recovery of routing path failure against unknown attackers and enhances the security and resilience of the routing protocols in face of adversarial attacks. We use network simulation using NS-2 to corroborate our results in the paper.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Note that “security strategy” is a game-theoretic term, referring the worst-case optimal strategies. It should not be interpreted as “cyber security strategy” as the term in computer science and engineering.
 
Literatur
1.
Zurück zum Zitat Başar, T., Olsder, G.J.: Dynamic Noncooperative Game Theory. SIAM Series in Classics in Applied Mathematics. SIAM, Philadelphia (1999)MATH Başar, T., Olsder, G.J.: Dynamic Noncooperative Game Theory. SIAM Series in Classics in Applied Mathematics. SIAM, Philadelphia (1999)MATH
2.
Zurück zum Zitat Chan, W.C., Lu, T.C., Chen, R.J.: Pollarczek-Khinchin formula for the M/G/1 queue in discrete time with vacations. In: IEE Proceedings of Computers and Digital Techniques, vol. 144, pp. 222–226 (1997) Chan, W.C., Lu, T.C., Chen, R.J.: Pollarczek-Khinchin formula for the M/G/1 queue in discrete time with vacations. In: IEE Proceedings of Computers and Digital Techniques, vol. 144, pp. 222–226 (1997)
3.
Zurück zum Zitat Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26, 25–37 (2008)CrossRef Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26, 25–37 (2008)CrossRef
4.
Zurück zum Zitat Clancy, T.C., Goergen, N.: Security in cognitive radio networks: threats and mitigation. In: Proceedings of the 3rd International Conference on CrownCom08, Singapore (2008) Clancy, T.C., Goergen, N.: Security in cognitive radio networks: threats and mitigation. In: Proceedings of the 3rd International Conference on CrownCom08, Singapore (2008)
5.
Zurück zum Zitat Ding, L., Melodia, T., Batalama, S., Medley, M.J.: ROSA: distributed joint routing and dynamic spectrum allocation in cognitive radio ad hoc networks. In: Proceedings of ACM MSWiM, Canary Islands, Spain (2009) Ding, L., Melodia, T., Batalama, S., Medley, M.J.: ROSA: distributed joint routing and dynamic spectrum allocation in cognitive radio ad hoc networks. In: Proceedings of ACM MSWiM, Canary Islands, Spain (2009)
6.
Zurück zum Zitat Hossain, E., Niyato, D., Han, Z.: Dynamic Spectrum Access in Cognitive Radio Networks. Cambridge University Press, Cambridge (2009)CrossRef Hossain, E., Niyato, D., Han, Z.: Dynamic Spectrum Access in Cognitive Radio Networks. Cambridge University Press, Cambridge (2009)CrossRef
7.
Zurück zum Zitat Hu, Y.-C., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Secur. Priv. 2, 28–39 (2004) Hu, Y.-C., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Secur. Priv. 2, 28–39 (2004)
8.
Zurück zum Zitat Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA (2003) Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA (2003)
9.
Zurück zum Zitat Saad, W., Zhu, Q., Başar, T., Han, Z., Hjorungnes, A.: Hierarchical network formation games in the uplink of multi-hop wireless networks. In: Proceedings of IEEE Globecom, Honolulu, Hawaii (2009) Saad, W., Zhu, Q., Başar, T., Han, Z., Hjorungnes, A.: Hierarchical network formation games in the uplink of multi-hop wireless networks. In: Proceedings of IEEE Globecom, Honolulu, Hawaii (2009)
10.
Zurück zum Zitat Shi, Y., Hou, Y.T.: A distributed optimization algorithm for multi-hop cognitive radio networks. In: Proceedings of International Conference on Computer Communications, Phoenix, AZ, USA (2008) Shi, Y., Hou, Y.T.: A distributed optimization algorithm for multi-hop cognitive radio networks. In: Proceedings of International Conference on Computer Communications, Phoenix, AZ, USA (2008)
11.
Zurück zum Zitat Tague, P., Slater, D., Noubir, G., Poovendran, R.: Linear programming models for jamming attacks on network traffic flows. In: Proceedings of WiOpt’08, Berlin, Germany (2008) Tague, P., Slater, D., Noubir, G., Poovendran, R.: Linear programming models for jamming attacks on network traffic flows. In: Proceedings of WiOpt’08, Berlin, Germany (2008)
12.
Zurück zum Zitat Tague, P., Nabar, P., Ritcey, J.A., Poovendram, R.: Jamming-aware traffic allocation for multiple-path routing using portfolio selection. IEEE/ACM Trans. Networking 19, 184–194 (2011)CrossRef Tague, P., Nabar, P., Ritcey, J.A., Poovendram, R.: Jamming-aware traffic allocation for multiple-path routing using portfolio selection. IEEE/ACM Trans. Networking 19, 184–194 (2011)CrossRef
13.
Zurück zum Zitat Wang, W., Li, H., Sun, Y., Han, Z.: Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks. EURASIP J. Adv. Signal Process. 2010, 106–117 (2010) Wang, W., Li, H., Sun, Y., Han, Z.: Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks. EURASIP J. Adv. Signal Process. 2010, 106–117 (2010)
14.
Zurück zum Zitat Wang, W., Sun, Y., Li, H., Han, Z.: Cross-layer attack and defense in cognitive radio networks. In: Proceedings of IEEE Globecom, Miami, Florida, USA (2010) Wang, W., Sun, Y., Li, H., Han, Z.: Cross-layer attack and defense in cognitive radio networks. In: Proceedings of IEEE Globecom, Miami, Florida, USA (2010)
15.
Zurück zum Zitat Wassim, E., Haidar, S., Mohsen, G.: Survey of security issues in cognitive radio networks. J. Internet Technol. 12, 181–198 (2011) Wassim, E., Haidar, S., Mohsen, G.: Survey of security issues in cognitive radio networks. J. Internet Technol. 12, 181–198 (2011)
16.
Zurück zum Zitat Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of ACM MobiHoc, Urbana, IL, USA (2005) Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of ACM MobiHoc, Urbana, IL, USA (2005)
17.
Zurück zum Zitat Zhu, Q., Tembine, T., Başar, T.: Heterogeneous learning in zero-sum stochastic games with incomplete information. In: Proceedings of IEEE Conference on Decision and Control, Atlanta, Georgia (2010) Zhu, Q., Tembine, T., Başar, T.: Heterogeneous learning in zero-sum stochastic games with incomplete information. In: Proceedings of IEEE Conference on Decision and Control, Atlanta, Georgia (2010)
18.
Zurück zum Zitat Zhu, Q., Yuan, Z., Song, J.B., Han, Z., Başar, T.: Dynamic interference minimization routing game for on-demand cognitive pilot channel. In: Proceedings of IEEE Globecom, Miami, Florida (2010) Zhu, Q., Yuan, Z., Song, J.B., Han, Z., Başar, T.: Dynamic interference minimization routing game for on-demand cognitive pilot channel. In: Proceedings of IEEE Globecom, Miami, Florida (2010)
19.
Zurück zum Zitat Zhu, Q., Song, J.B., Başar, T.: Dynamic secure routing game in distributed cognitive radio networks. In: Proceedings of IEEE Globecom, Houston, Texas (2011) Zhu, Q., Song, J.B., Başar, T.: Dynamic secure routing game in distributed cognitive radio networks. In: Proceedings of IEEE Globecom, Houston, Texas (2011)
20.
Zurück zum Zitat Zhu, Q., Tembine, H., Başar, T.: Distributed strategic learning with application to network security. In: Proceedings of IEEE American Control Conference, San Francisco, CA (2011) Zhu, Q., Tembine, H., Başar, T.: Distributed strategic learning with application to network security. In: Proceedings of IEEE American Control Conference, San Francisco, CA (2011)
21.
Zurück zum Zitat Zhu, Q., Yuan, Z., Song, J.B., Han, Z., Başar, T.: Interference aware routing game for cognitive radio multi-hop networks. IEEE J. Sel. Areas Commun. 30, 2006–2015 (2012)CrossRef Zhu, Q., Yuan, Z., Song, J.B., Han, Z., Başar, T.: Interference aware routing game for cognitive radio multi-hop networks. IEEE J. Sel. Areas Commun. 30, 2006–2015 (2012)CrossRef
Metadaten
Titel
Performance of Dynamic Secure Routing Game
verfasst von
Ju Bin Song
Quanyan Zhu
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-93058-9_4

Neuer Inhalt