The eavesdropping and Jamming Dilemma in multi-channel communications

作者: Andrey Garnaev , Wade Trappe

DOI: 10.1109/ICC.2013.6654847

关键词: Game theoryComputer scienceDilemmaCryptographyStochastic gameJammingEavesdroppingOrthogonal frequency-division multiplexingTransmitter power outputStrategyComputer security

摘要: We consider the game where Alice wants to communicate with Bob secretely, while Eve hinder this objective by either eavesdropping or jamming, though she cannot employ both and jamming simultaneously. is employing a multi-channel communication scheme, such as OFDM, can control transmit power allocation of her signal among channels. If chooses jam, amongst channels, but in case eavesdrop. In paper we examine three different patterns for Alice's (and Eve's) behavior: (a) assumes employs pure strategy determines optimal mixed under assumption; (b) assuming fixed probability which will jam/eavesdrop, Alice/Eve's equilibrium strategies be determined, then that maximizes payoff; (c) between two modes (either jam eavesdrop) well allocations simultaneous selection allocation. Using game-theoretic formulation, are found each model conditions players apply produced.

参考文章(27)
Zang Li, Roy Yates, Wade Trappe, Secrecy capacity of independent parallel channels allerton conference on communication, control, and computing. pp. 1- 18 ,(2009) , 10.1007/978-1-4419-1385-2_1
Satashu Goel, Rohit Negi, Obtaining Secrecy through Intentional Uncertainty Springer, Boston, MA. pp. 19- 37 ,(2009) , 10.1007/978-1-4419-1385-2_2
Matthieu Bloch, Joao Barros, Physical-Layer Security Cambridge University Press. ,(2011) , 10.1017/CBO9780511977985
V. Gupta, S. Krishnamurthy, M. Faloutsos, Denial of service attacks at the MAC layer in wireless ad hoc networks military communications conference. ,vol. 2, pp. 1118- 1123 ,(2002) , 10.1109/MILCOM.2002.1179634
Andrey Garnaev, Wade Trappe, Chun-Ta Kung, Dependence of optimal monitoring strategy on the application to be protected global communications conference. pp. 1054- 1059 ,(2012) , 10.1109/GLOCOM.2012.6503252
Zang Li, Wade Trappe, Roy Yates, Secret Communication via Multi-antenna Transmission conference on information sciences and systems. pp. 905- 910 ,(2007) , 10.1109/CISS.2007.4298439
Yalin Evren Sagduyu, Anthony Ephremides, A game-theoretic analysis of denial of service attacks in wireless random access Wireless Networks. ,vol. 15, pp. 651- 666 ,(2009) , 10.1007/S11276-007-0088-8
Yingbin Liang, H. Vincent Poor, Shlomo Shamai, Secrecy Capacity Region of Parallel Broadcast Channels information theory and applications. pp. 245- 250 ,(2007) , 10.1109/ITA.2007.4357587
A. D. Wyner, The Wire-Tap Channel Bell System Technical Journal. ,vol. 54, pp. 1355- 1387 ,(1975) , 10.1002/J.1538-7305.1975.TB02040.X