Skip to main content

Multi-Carrier Jamming Mitigation: A Proactive Game Theoretic Approach

  • Chapter
  • First Online:
Proactive and Dynamic Network Defense

Part of the book series: Advances in Information Security ((ADIS,volume 74))

  • 800 Accesses

Abstract

Wireless communications systems are highly vulnerable to jamming. There is a large body of research demonstrating the potential of smart-jamming that targets specific mechanisms in a wireless stack. Many proactive mitigation techniques sacrifice performance for guaranteed robustness. In this work, we develop a proactive mitigation approach for multi-carrier wireless links. The approach is formulated within the framework of game theory. We show that the interaction between a multi-carrier multi-rate system (in particular OFDM) and a power-limited jammer can be formulated as a constrained zero-sum or a bimatrix game. We show that the Nash equilibrium strategies can be derived analytically and numerically and we apply them to the special case of IEEE 802.11 OFDM links.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This assumption is not particularly restrictive since any infeasible data rate can be removed from \(\mathcal {R}\).

  2. 2.

    Also see the discussion in Sect. 10.3 for more details.

  3. 3.

    See the discussion in Sect. 10.3 for more details.

  4. 4.

    This is equivalent to maximizing the average number of data bits per OFDM symbol or the average data rate per OFDM symbol.

  5. 5.

    Throughout the rest of this chapter, whenever clear from the context, we refer to the vectors r, x and \(\widehat {\mathbf {x}}\) as the transmitter’s strategies interchangeably. In other cases, we explicitly mention which of the vector are being referred to.

  6. 6.

    It can be shown that zero-sum games are special cases of the more general bimatrix games.

  7. 7.

    In this paper, we limit out focus to linear constraints on players’ strategy sets and for convenience, we use the terms constrained games and linearly constrained games interchangeably.

References

  1. C. Shahriar, M. La Pan, M. Lichtman, T.C. Clancy, R. McGwier, R. Tandon, S. Sodagari, J.H. Reed, PHY-layer resiliency in OFDM communications: a tutorial. IEEE Commun. Surv. Tutorials 17(1), 292–314 (2015)

    Article  Google Scholar 

  2. T.C. Clancy, N. Goergen, Security in cognitive radio networks: threats and mitigation, in 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008. CrownCom 2008 (IEEE, Piscataway, 2008), pp. 1–8

    Google Scholar 

  3. M. Pan, T.C. Clancy, R.W. McGwier, Jamming attacks against OFDM timing synchronization and signal acquisition, in Military Communications Conference, 2012-MILCOM 2012 (IEEE, Piscataway, 2012), pp. 1–7

    Book  Google Scholar 

  4. T.D. Vo-Huu, T.D. Vo-Huu, G. Noubir, Interleaving jamming in wi-fi networks, in Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec ’16 (2016), pp. 31–42

    Google Scholar 

  5. E. Altman, K. Avrachenkov, A. Garnaev, A jamming game in wireless networks with transmission cost, in 1st EuroFGI International Conference on Network Control and Optimization, NET-COOP (2007), pp. 1–12

    Google Scholar 

  6. K. Firouzbakht, G. Noubir, M. Salehi, On the performance of adaptive packetized wireless communication links under jamming. IEEE Trans. Wirel. Commun. 13(7), 3481–3495 (2013)

    Article  Google Scholar 

  7. K. Firouzbakht, G. Noubir, M. Salehi, Linearly constrained bimatrix games in wireless communications. IEEE Trans. Commun. 64(1), 429–440 (2016). https://ieeexplore.ieee.org/abstract/document/7339449

    Article  Google Scholar 

  8. M. Salehi, J. Proakis, Digital Communications (McGraw-Hill Higher Education, McGraw-Hill Education, Boston, 2007)

    Google Scholar 

  9. G. Owen, Game Theory (Academic, San Diego, 1995)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guevara Noubir .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 This is a U.S. government work and not under copyright protection in the U.S.; foreign copyright protection may apply

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Firouzbakht, K., Noubir, G., Salehi, M. (2019). Multi-Carrier Jamming Mitigation: A Proactive Game Theoretic Approach. In: Wang, C., Lu, Z. (eds) Proactive and Dynamic Network Defense. Advances in Information Security, vol 74. Springer, Cham. https://doi.org/10.1007/978-3-030-10597-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-10597-6_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-10596-9

  • Online ISBN: 978-3-030-10597-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics