2010 IEEE International Symposium on Information Theory 2010
DOI: 10.1109/isit.2010.5513413
|View full text |Cite
|
Sign up to set email alerts
|

Jamming games for power controlled medium access with dynamic traffic

Abstract: Abstract-Due to the broadcast nature of the wireless medium, wireless networks are highly susceptible to jamming attacks. Such attacks are often studied in a game theoretic framework under the assumption of uninterrupted traffic subject to continuous jamming opportunities. Instead, we analyze the effect of dynamically changing traffic on jamming games for power controlled medium access. Random packet arrivals raise the possibility that the transmitter queues may be empty when jamming attacks start and thus was… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…However, in many practical scenarios, data arrival at the users can be random. The game-theoretic framework has been used to explore the role of random arrival of data in mitigating jamming attacks in [23].…”
Section: A Related Workmentioning
confidence: 99%
“…However, in many practical scenarios, data arrival at the users can be random. The game-theoretic framework has been used to explore the role of random arrival of data in mitigating jamming attacks in [23].…”
Section: A Related Workmentioning
confidence: 99%
“…A typical example of wireless attacks is the jamming attack that aims to disrupt wireless communications by imposing interference at receivers (e.g., see [63]) and causing denial of service (DoS) [64]. These attacks use different communication means (e.g., power control [65] or random access [66]) and apply at different levels of prior information on attacker's intent [67]. As radios become smarter by performing more sophisticated tasks, they also become vulnerable to advanced attacks that target their underlying tasks.…”
Section: Synthetic Data 𝐺(𝒛 𝒚)mentioning
confidence: 99%
“…The data receiving at a node or base station (BS) varies dynamically, and if the jammer fail in knowing the status of the queue, the randomness of the data entry is used to improve system performance. In the study [1,2], a theoretical framework on games is examined to evaluate the effect of random data arrival in alleviating the jamming attack. In [3,4], a game theory examines the influence of jamming over a collusive channel.…”
Section: Introductionmentioning
confidence: 99%