Eavesdropping and jamming in next-generation wireless networks

A game-theoretic approach

Quanyan Zhu, Walid Saad, Zhu Han, H. Vincent Poor, Tamer Basar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

51 Citations (Scopus)

Abstract

The efficient design of next-generation wireless systems faces multifaceted problems involving a variety of node types such as wireless users, relay stations, base stations, eavesdroppers, and jammers. In this paper, the complex decision making processes between a network of wireless users that perform uplink transmission via relay stations and an active malicious node, that is able to act as an eavesdropper and as a jammer, is studied. A noncooperative game in which the users and the malicious node are the players is formulated. On the one hand, the users seek to choose the relay station that maximizes their utilities which reflect their mutual interference as well as the security of the chosen path. On the other hand, the objective of the malicious node is to choose whether to eavesdrop, jam, or use a combination of both strategies, in a way to reduce the total network capacity. To solve the game, a fictitious play-based algorithm is proposed using which the users and the malicious node reach a mixed-strategy Nash equilibrium. Simulation results show that the proposed approach improves the average expected utility per user up to 49.4% relative to a nearest neighbor algorithm. The results also show how the malicious node can strategically decide on whether to jam or eavesdrop depending on its capabilities and objectives.

Original languageEnglish
Title of host publicationProceedings - IEEE Military Communications Conference MILCOM
Pages119-124
Number of pages6
DOIs
StatePublished - Dec 1 2011
Event2011 IEEE Military Communications Conference, MILCOM 2011 - Baltimore, MD, United States
Duration: Nov 7 2011Nov 10 2011

Other

Other2011 IEEE Military Communications Conference, MILCOM 2011
CountryUnited States
CityBaltimore, MD
Period11/7/1111/10/11

Fingerprint

Jamming
Wireless networks
Base stations
Decision making

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

Zhu, Q., Saad, W., Han, Z., Poor, H. V., & Basar, T. (2011). Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach. In Proceedings - IEEE Military Communications Conference MILCOM (pp. 119-124). [6127463] https://doi.org/10.1109/MILCOM.2011.6127463

Eavesdropping and jamming in next-generation wireless networks : A game-theoretic approach. / Zhu, Quanyan; Saad, Walid; Han, Zhu; Poor, H. Vincent; Basar, Tamer.

Proceedings - IEEE Military Communications Conference MILCOM. 2011. p. 119-124 6127463.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zhu, Q, Saad, W, Han, Z, Poor, HV & Basar, T 2011, Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach. in Proceedings - IEEE Military Communications Conference MILCOM., 6127463, pp. 119-124, 2011 IEEE Military Communications Conference, MILCOM 2011, Baltimore, MD, United States, 11/7/11. https://doi.org/10.1109/MILCOM.2011.6127463
Zhu Q, Saad W, Han Z, Poor HV, Basar T. Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach. In Proceedings - IEEE Military Communications Conference MILCOM. 2011. p. 119-124. 6127463 https://doi.org/10.1109/MILCOM.2011.6127463
Zhu, Quanyan ; Saad, Walid ; Han, Zhu ; Poor, H. Vincent ; Basar, Tamer. / Eavesdropping and jamming in next-generation wireless networks : A game-theoretic approach. Proceedings - IEEE Military Communications Conference MILCOM. 2011. pp. 119-124
@inproceedings{4834ba6e80544ae482ff0efa32215ebd,
title = "Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach",
abstract = "The efficient design of next-generation wireless systems faces multifaceted problems involving a variety of node types such as wireless users, relay stations, base stations, eavesdroppers, and jammers. In this paper, the complex decision making processes between a network of wireless users that perform uplink transmission via relay stations and an active malicious node, that is able to act as an eavesdropper and as a jammer, is studied. A noncooperative game in which the users and the malicious node are the players is formulated. On the one hand, the users seek to choose the relay station that maximizes their utilities which reflect their mutual interference as well as the security of the chosen path. On the other hand, the objective of the malicious node is to choose whether to eavesdrop, jam, or use a combination of both strategies, in a way to reduce the total network capacity. To solve the game, a fictitious play-based algorithm is proposed using which the users and the malicious node reach a mixed-strategy Nash equilibrium. Simulation results show that the proposed approach improves the average expected utility per user up to 49.4{\%} relative to a nearest neighbor algorithm. The results also show how the malicious node can strategically decide on whether to jam or eavesdrop depending on its capabilities and objectives.",
author = "Quanyan Zhu and Walid Saad and Zhu Han and Poor, {H. Vincent} and Tamer Basar",
year = "2011",
month = "12",
day = "1",
doi = "10.1109/MILCOM.2011.6127463",
language = "English",
isbn = "9781467300810",
pages = "119--124",
booktitle = "Proceedings - IEEE Military Communications Conference MILCOM",

}

TY - GEN

T1 - Eavesdropping and jamming in next-generation wireless networks

T2 - A game-theoretic approach

AU - Zhu, Quanyan

AU - Saad, Walid

AU - Han, Zhu

AU - Poor, H. Vincent

AU - Basar, Tamer

PY - 2011/12/1

Y1 - 2011/12/1

N2 - The efficient design of next-generation wireless systems faces multifaceted problems involving a variety of node types such as wireless users, relay stations, base stations, eavesdroppers, and jammers. In this paper, the complex decision making processes between a network of wireless users that perform uplink transmission via relay stations and an active malicious node, that is able to act as an eavesdropper and as a jammer, is studied. A noncooperative game in which the users and the malicious node are the players is formulated. On the one hand, the users seek to choose the relay station that maximizes their utilities which reflect their mutual interference as well as the security of the chosen path. On the other hand, the objective of the malicious node is to choose whether to eavesdrop, jam, or use a combination of both strategies, in a way to reduce the total network capacity. To solve the game, a fictitious play-based algorithm is proposed using which the users and the malicious node reach a mixed-strategy Nash equilibrium. Simulation results show that the proposed approach improves the average expected utility per user up to 49.4% relative to a nearest neighbor algorithm. The results also show how the malicious node can strategically decide on whether to jam or eavesdrop depending on its capabilities and objectives.

AB - The efficient design of next-generation wireless systems faces multifaceted problems involving a variety of node types such as wireless users, relay stations, base stations, eavesdroppers, and jammers. In this paper, the complex decision making processes between a network of wireless users that perform uplink transmission via relay stations and an active malicious node, that is able to act as an eavesdropper and as a jammer, is studied. A noncooperative game in which the users and the malicious node are the players is formulated. On the one hand, the users seek to choose the relay station that maximizes their utilities which reflect their mutual interference as well as the security of the chosen path. On the other hand, the objective of the malicious node is to choose whether to eavesdrop, jam, or use a combination of both strategies, in a way to reduce the total network capacity. To solve the game, a fictitious play-based algorithm is proposed using which the users and the malicious node reach a mixed-strategy Nash equilibrium. Simulation results show that the proposed approach improves the average expected utility per user up to 49.4% relative to a nearest neighbor algorithm. The results also show how the malicious node can strategically decide on whether to jam or eavesdrop depending on its capabilities and objectives.

UR - http://www.scopus.com/inward/record.url?scp=84856969548&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84856969548&partnerID=8YFLogxK

U2 - 10.1109/MILCOM.2011.6127463

DO - 10.1109/MILCOM.2011.6127463

M3 - Conference contribution

SN - 9781467300810

SP - 119

EP - 124

BT - Proceedings - IEEE Military Communications Conference MILCOM

ER -