2015
DOI: 10.1109/twc.2014.2385709
|View full text |Cite
|
Sign up to set email alerts
|

Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis

Abstract: The timing channel is a logical communication channel in which information is encoded in the timing between events. Recently, the use of the timing channel has been proposed as a countermeasure to reactive jamming attacks performed by an energy-constrained malicious node. In fact, whilst a jammer is able to disrupt the information contained in the attacked packets, timing information cannot be jammed and, therefore, timing channels can be exploited to deliver information to the receiver even on a jammed channe… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
32
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 50 publications
(32 citation statements)
references
References 25 publications
0
32
0
Order By: Relevance
“…In [38], the user is aware of the jammer's existence and intelligence, which is in contrast with our proposed model that requires jamming sense. Also, [38] assumes that the user can compute the jammer's Best Response (BR) and fading channel gains of the opponent player are known. Our proposed model makes no such assumptions for its algorithm design and analysis.…”
Section: B Related Workmentioning
confidence: 82%
See 3 more Smart Citations
“…In [38], the user is aware of the jammer's existence and intelligence, which is in contrast with our proposed model that requires jamming sense. Also, [38] assumes that the user can compute the jammer's Best Response (BR) and fading channel gains of the opponent player are known. Our proposed model makes no such assumptions for its algorithm design and analysis.…”
Section: B Related Workmentioning
confidence: 82%
“…Other game-theoretic Stackelberg formulations have also been proposed for jamming in wireless networks (cf. [38], [39]) in which the jammer can tune its transmit power, adapt attack duration and choose to save energy similar to our proposed model. However, there are many fundamental differences between these formulations and our proposed model.…”
Section: B Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…While not meant to be antifragile, research involving the establishment of a timing channel to counter a reactive jamming attack, including [77] and [78], has similarities with the approach described in this chapter. The strategy in [77] is similar to our replace with noise jammer exploitation approach, in terms of using the presence or absence of a signal to carry information.…”
Section: Background 421 Related Workmentioning
confidence: 99%