By Topic

A Game-Theoretic Approach to Anti-jamming in Sensor Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Yanmin Zhu ; Shanghai Key Lab. of Scalable Comput. & Syst., Shanghai, China ; Yuan Jian

Jamming is a serious security threat to a wireless sensor network since the network relies on open wireless radio channel. A jamming attacker launches jamming attacks easily by transmitting high-power signals and all legitimate sensor nodes interfered by jamming signals suffer corrupted packet transmissions. More importantly, the jammer is typically strategic and chooses its jamming strategy in response to the possible defense strategy taken by the sensor network. In this paper we model the interaction between the sensor network and the attacker as a non-cooperative non-zero-sum static game. In such a game, the sensor network has a set of strategies of controlling its probability of accessing the wireless channel and the attacker manipulates its jamming by controlling its jamming probability after sensing a transmission activity. We propose an efficient algorithm for computing the optimal strategies for jamming attack and network defense. A critical issue is that there may exist a number of possible strategy profiles of Nash equilibria. To address this issue, we further propose to choose realistic Nash equilibria by applying Pareto-dominance and risk dominance. Our numerical results demonstrate that the strategies chosen by Pareto-dominance and risk dominance achieve the expected performance. Our results presented in the paper provides valuable defense guidance for wireless sensor networks against jamming attacks.

Published in:

Parallel and Distributed Systems (ICPADS), 2010 IEEE 16th International Conference on

Date of Conference:

8-10 Dec. 2010