Jamming Mitigation via Hierarchical Security Game for IoT Communications

dc.contributor.authorTang, Xiao
dc.contributor.authorRen, Pinyi
dc.contributor.authorHan, Zhu
dc.date.accessioned2020-05-11T16:14:06Z
dc.date.available2020-05-11T16:14:06Z
dc.date.issued1/15/2018
dc.description.abstractIn the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jamming attacks only when it detects the legitimate transmission, known as the reactive jamming. Compared with the conventional constant jamming model, the reactive nature enables highly efficient and long-lasting attacks with limited energy supply, which thus presents a significant threat upon the secure communications in IoT. In this paper, we investigate the anti-reactive-jamming transmission strategy for IoT by exploiting the inherent weakness of the jammer. Specifically, since the reactive jamming depends on the detection of the legitimate transmission, the legitimate user can elaborately determine its transmit power to tradeoff between its achieved signal-to-interference-plus-noise ratio and the probability to be detected and jammed by its adversary. Meanwhile, the jammer can smartly allocate the jamming power based on its observation of the legitimate transmission. We formulate the rivalry between the legitimate user and jammer as a hierarchical game, where the legitimate user takes action first as the leader while the jammer is the follower. We analyze the game equilibrium for both single-channel and multi-channel scenarios and derive the optimal transmission and jamming strategies for the legitimate user and jammer, respectively. Finally, we present the numerical results to evaluate the performance of the secure IoT communications under our proposal.
dc.identifier.citationCopyright 2018 IEEE Access. Recommended citation: Tang, Xiao, Pinyi Ren, and Zhu Han. "Jamming mitigation via hierarchical security game for iot communications." IEEE Access 6 (2018): 5766-5779. DOI: 10.1109/ACCESS.2018.2793280. URL:https://ieeexplore.ieee.org/abstract/document/8258957. Reproduced in accordance with the original publisher's licensing terms and with permission from the author(s).
dc.identifier.urihttps://hdl.handle.net/10657/6424
dc.publisherIEEE Access
dc.subjectInternet of things
dc.subjectreactive jamming
dc.subjectresource allocation
dc.subjecthierarchical game
dc.subjectequilibrium
dc.titleJamming Mitigation via Hierarchical Security Game for IoT Communications
dc.typeArticle

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Han_2018_JammingMitigationviaHierarchical.pdf
Size:
5 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
4.69 KB
Format:
Plain Text
Description: