Abstract
Wireless communications systems are highly vulnerable to jamming. There is a large body of research demonstrating the potential of smart-jamming that targets specific mechanisms in a wireless stack. Many proactive mitigation techniques sacrifice performance for guaranteed robustness. In this work, we develop a proactive mitigation approach for multi-carrier wireless links. The approach is formulated within the framework of game theory. We show that the interaction between a multi-carrier multi-rate system (in particular OFDM) and a power-limited jammer can be formulated as a constrained zero-sum or a bimatrix game. We show that the Nash equilibrium strategies can be derived analytically and numerically and we apply them to the special case of IEEE 802.11 OFDM links.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
This assumption is not particularly restrictive since any infeasible data rate can be removed from \(\mathcal {R}\).
- 2.
Also see the discussion in Sect. 10.3 for more details.
- 3.
See the discussion in Sect. 10.3 for more details.
- 4.
This is equivalent to maximizing the average number of data bits per OFDM symbol or the average data rate per OFDM symbol.
- 5.
Throughout the rest of this chapter, whenever clear from the context, we refer to the vectors r, x and \(\widehat {\mathbf {x}}\) as the transmitter’s strategies interchangeably. In other cases, we explicitly mention which of the vector are being referred to.
- 6.
It can be shown that zero-sum games are special cases of the more general bimatrix games.
- 7.
In this paper, we limit out focus to linear constraints on players’ strategy sets and for convenience, we use the terms constrained games and linearly constrained games interchangeably.
References
C. Shahriar, M. La Pan, M. Lichtman, T.C. Clancy, R. McGwier, R. Tandon, S. Sodagari, J.H. Reed, PHY-layer resiliency in OFDM communications: a tutorial. IEEE Commun. Surv. Tutorials 17(1), 292–314 (2015)
T.C. Clancy, N. Goergen, Security in cognitive radio networks: threats and mitigation, in 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008. CrownCom 2008 (IEEE, Piscataway, 2008), pp. 1–8
M. Pan, T.C. Clancy, R.W. McGwier, Jamming attacks against OFDM timing synchronization and signal acquisition, in Military Communications Conference, 2012-MILCOM 2012 (IEEE, Piscataway, 2012), pp. 1–7
T.D. Vo-Huu, T.D. Vo-Huu, G. Noubir, Interleaving jamming in wi-fi networks, in Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec ’16 (2016), pp. 31–42
E. Altman, K. Avrachenkov, A. Garnaev, A jamming game in wireless networks with transmission cost, in 1st EuroFGI International Conference on Network Control and Optimization, NET-COOP (2007), pp. 1–12
K. Firouzbakht, G. Noubir, M. Salehi, On the performance of adaptive packetized wireless communication links under jamming. IEEE Trans. Wirel. Commun. 13(7), 3481–3495 (2013)
K. Firouzbakht, G. Noubir, M. Salehi, Linearly constrained bimatrix games in wireless communications. IEEE Trans. Commun. 64(1), 429–440 (2016). https://ieeexplore.ieee.org/abstract/document/7339449
M. Salehi, J. Proakis, Digital Communications (McGraw-Hill Higher Education, McGraw-Hill Education, Boston, 2007)
G. Owen, Game Theory (Academic, San Diego, 1995)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 This is a U.S. government work and not under copyright protection in the U.S.; foreign copyright protection may apply
About this chapter
Cite this chapter
Firouzbakht, K., Noubir, G., Salehi, M. (2019). Multi-Carrier Jamming Mitigation: A Proactive Game Theoretic Approach. In: Wang, C., Lu, Z. (eds) Proactive and Dynamic Network Defense. Advances in Information Security, vol 74. Springer, Cham. https://doi.org/10.1007/978-3-030-10597-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-10597-6_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-10596-9
Online ISBN: 978-3-030-10597-6
eBook Packages: Computer ScienceComputer Science (R0)