Game theoretic approach of eavesdropping attack in millimeter-wave-based WPANs with directional antennas
In this paper, we propose a game theoretic framework to analyze a passive eavesdropping attack in millimeter-wave-based wireless personal area networks. As the interaction between defenders and attackers in network security issues can be considered as a game, devices can be considered as players. Usually a player has insufficient information of other players such as strategies and payoffs especially in static situation. We assume that each player selects its strategy based on its belief about the information on opponents and the belief is known as a prior probability. The Bayesian game model is a relevant framework for this situation. It is assumed that each device is equipped with a directional antenna and knows the channel state. In the analysis, the exposure region (ER) that is determined by the antennas directions of players is considered and the ratio of ER for the total area of a network is calculated by using the probability density function of distance between players. The optimal strategies of two players, a transmitter and an eavesdropper, are derived in terms of Bayesian Nash equilibriums and payoffs for the players are computed for pure and mixed strategies in static situation. The analysis shows how the effects of using a directional antenna and the prior probability of transmitters belief are involved in the Nash equilibriums. Numerical results show the equilibriums and two players payoffs. Those values depend on several parameters such as beamwidth and prior probability of belief as well as its opponents strategies. It also shows the effect of directional antennas in the eavesdropping attack; the use of directional antenna seems to increase the transmitters payoff, while it seems to decrease the eavesdroppers payoff. The obtained results will provide the criteria for selecting appropriate strategy to transmitters when an eavesdropper exists in the network.
KeywordsEavesdropping attack Game theory Directional antenna Bayesian game Nash equilibrium
The author would like to thank the editor and the anonymous reviewers for their constructive and valuable comments. This work was supported by the Basic Science Research Program and Mid-career Research Program through NRF grant funded by the MEST (NRF-2016R1D1A1B03931037, NRF-2013R1A2A2A01067452) and supported by the Korea University Grant.
- 2.Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., & Qishi Wu, Q. (2010). A survey of game theory as applied to network security. In Proceedings of the 43rd Hawaii international conference on system sciences (pp. 1–10).Google Scholar
- 7.Shen, S., Huang, L., Fan, E., Hu, K., Liu, J., & Cao, Q. (2016). Trust dynamics in WSNs: An evolutionary game-theoretic approach. Journal of Sensors, 2016, 1–11.Google Scholar
- 8.Abdalzaher, M. S., Seddik, K., Muta, O., & Abdelrahman, A. (2016). Using Stackelberg game to enhance node protection in WSNs. In Proceedings of CCNC (pp. 853–856).Google Scholar
- 13.Saad, W., Han, Z., Basar, T., Debbah, M., & Hjorungnes, A. (2009). Coalitional games for distributed eavesdroppers cooperation in wireless networks. In Proceedings of valuetools (p. 66).Google Scholar
- 14.Dong, R., Liu, L., Liu, J., & Xu, X. (2009). Intrusion detection system based on payoff matrix for wireless sensor networks. In Proceedings of WGEC (pp. 3–6).Google Scholar
- 15.Shiva, S., Roy, S., Bedi, H., Dasgupta, D., & Wu, Q. (2010). A stochastic game model with imperfect information in cyber security. In Proceedings of ICIW (pp. 308–318).Google Scholar
- 16.Beckery, S., Jeff Seibert, J., David Zage, D., Cristina Nita-Rotaru C., & Radu Statey, R. (2011). Applying game theory to analyze attacks and defenses in virtual coordinate systems. In Proceedings of DSN (pp. 133–144).Google Scholar
- 20.Niu, H., Sun, L., Ito, M., & Sezaki, K. (2014). User cooperation analysis under eavesdropping attack: A game theory perspective. In Proceedings of PIMRC (pp. 139–144).Google Scholar
- 21.Zhu, Q., Saad, W., Han, Z., Poor, H. V. , & Basar, T. Q. (2011). Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach. In Proceedings of MILCOM (pp. 119–124).Google Scholar
- 22.Garnaev, A., & Trappe, W. (2017). Bargaining over the fair trade-off between secrecy and throughput in OFDM communications. IEEE Transactions on Information Forensics and Security, 12(1), 242–251.Google Scholar
- 23.Cao, B., Sun, X., Li, Y., Wang, C., & Mei, H. (2016). Understanding the impact of employing relay node on wireless networks. IEEE Transactions on Vehicular Technology, 66, 4287–4299.Google Scholar
- 24.Adu-Gyamf, D., Wang, Y., Zhang, F., Kamenyi, D. M., Memon, I., & Gustav, Y. H. (2013). Modeling the spreading behavior of passive worms in mobile social networks. In Proceedings of ICIMIMIE (pp. 380–383).Google Scholar
- 26.Garnaev A., & Trappe, W. (2014). Secret communication when the eavesdropper might be an active adversary. In Proceedings of MACOM, Lecture notes of computer science (Vol. 8715 , pp. 121–136).Google Scholar
- 27.Boonyakarn, P., Komolkiti, P., & Aswakul, C. (2011). Game-based analysis of eavesdropping defense strategy in WMN with directional antenna. In Proceedings of JCSSE (pp. 29–33).Google Scholar
- 28.Goel, V., Aggarwal, V., Yener, A., & Calderbank, A. R. (2010). Modeling location uncertainty for eavesdroppers: A secrecy graph approach. In Proceedings of ISIT (pp. 2627–2631).Google Scholar
- 32.Curiac, D.-I. (2016). Wireless sensor network security enhancement using directional antennas: State of the art and research challenges. Sensors, 16(488), 1–15.Google Scholar
- 33.Wang, Q., Hong-Ning Dai, H.-N., & Zhao, Q. (2013). Eavesdropping security in wireless ad hoc networks with directional antennas. In Proceedings of WOCC (pp. 687–692).Google Scholar
- 36.Li, X., Wang, H., Dai, H.-N., Wang, Y., & Zhaol, Q. (2016). An analytical study on eavesdropping attacks in wireless nets of things. Mobile Information Systems, 2016, 1–10.Google Scholar
- 37.Valliappan, N. (2012). Antenna subset modulation for secure millimeter-wave wireless communication. M.S. dissertation, Chap 4, Science in Engineering, University of Texas, Austin, TX, USA.Google Scholar
- 45.Mathworld. (2005). Square line picking. http://mathworld.wolfram.com/SquareLinePicking.html. Accessed October 1, 2017.