Deceptive Routing in Relay Networks
Physical-layer and MAC-layer defense mechanisms against jamming attacks are often inherently reactive to experienced delay and loss of throughput after being attacked. In this paper, we study a proactive defense mechanism against jamming in multi-hop relay networks, in which one or more network sources introduce a deceptive network flow along a disjoint routing path. The deceptive mechanism leverages strategic jamming behaviors, causing the attacker to expend resources on targeting deceptive flows and thereby reducing the impact on real network traffic. We use a two-stage game model to obtain deception strategies at Stackelberg equilibrium for selfish and altruistic nodes. The equilibrium solutions are illustrated and corroborated through a simulation study.
KeywordsGame Theory Stackelberg Equilibrium Routing Algorithms Jamming and Security Relay Networks
Unable to display preview. Download preview PDF.
- 1.Başar, T., Olsder, G.J.: Dynamic Noncooperative Game Theory, vol. 23. Society for Industrial and Applied Mathematics (SIAM) (1999)Google Scholar
- 2.Jacquet, P., Muhlethaler, P., Clausen, T., Laouiti, A., Qayyum, A., Viennot, L.: Optimized link state routing protocol for ad hoc networks. In: Proceedings of IEEE International Multi-Topic Conference, INMIC (2001)Google Scholar
- 3.Liu, Y., Ning, P., Dai, H., Liu, A.: Randomized differential dsss: Jamming-resistant wireless broadcast communication. In: Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM), pp. 1–9 (2010)Google Scholar
- 4.Noubir, G., Rajaraman, R., Sheng, B., Thapa, B.: On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming. In: Proceedings of the 4th ACM Conference on Wireless Network Security (WiSec), pp. 97–108. ACM (2011)Google Scholar
- 6.Perkins, C., Royer, E.: Ad-hoc on-demand distance vector routing. In: Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90–100 (1999)Google Scholar
- 7.Poisel, R.: Modern Communications Jamming Principles and Techniques. Artech House Publishers (2011)Google Scholar
- 9.Ross, S.: Introduction to Probability Models. Academic Press (2009)Google Scholar
- 11.Tague, P., Slater, D., Poovendran, R., Noubir, G.: Linear programming models for jamming attacks on network traffic flows. In: Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), pp. 207–216. IEEE (2008)Google Scholar
- 12.Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceedings of the 3rd ACM Workshop on Wireless Security (WiSE), pp. 80–89. ACM (2004)Google Scholar
- 13.Zhu, Q., Clark, A., Poovendran, R., Başar, T.: Deceptive routing games. To appear in Proceedings of IEEE Conference on Decision and Control (CDC), Maui, Hawaii (2012)Google Scholar