TY - JOUR
T1 - A game-theoretic analysis of energy-depleting jamming attacks with a learning counterstrategy
AU - Chiariotti, Federico
AU - Pielli, Chiara
AU - Laurenti, Nicola
AU - Zanella, Andrea
AU - Zorzi, Michele
N1 - Publisher Copyright:
© 2019 Copyright held by the owner/author(s).
PY - 2019/12
Y1 - 2019/12
N2 - Jamming may become a serious threat in Internet of Things networks of battery-powered nodes, as attackers can disrupt packet delivery and significantly reduce the lifetime of the nodes. In this work, we model an active defense scenario in which an energy-limited node uses power control to defend itself from a malicious attacker, whose energy constraints may not be known to the defender. The interaction between the two nodes is modeled as an asymmetric Bayesian game where the victim has incomplete information about the attacker. We show how to derive the optimal Bayesian strategies for both the defender and the attacker, which may then serve as guidelines to develop and gauge efficient heuristics that are less computationally expensive than the optimal strategies. For example, we propose a neural-network-based learning method that allows the node to effectively defend itself from the jamming with a significantly reduced computational load. The outcomes of the ideal strategies highlight the tradeoff between node lifetime and communication reliability and the importance of an intelligent defense from jamming attacks.
AB - Jamming may become a serious threat in Internet of Things networks of battery-powered nodes, as attackers can disrupt packet delivery and significantly reduce the lifetime of the nodes. In this work, we model an active defense scenario in which an energy-limited node uses power control to defend itself from a malicious attacker, whose energy constraints may not be known to the defender. The interaction between the two nodes is modeled as an asymmetric Bayesian game where the victim has incomplete information about the attacker. We show how to derive the optimal Bayesian strategies for both the defender and the attacker, which may then serve as guidelines to develop and gauge efficient heuristics that are less computationally expensive than the optimal strategies. For example, we propose a neural-network-based learning method that allows the node to effectively defend itself from the jamming with a significantly reduced computational load. The outcomes of the ideal strategies highlight the tradeoff between node lifetime and communication reliability and the importance of an intelligent defense from jamming attacks.
KW - Media access control
KW - Multichannel
KW - Radio interference
KW - Time synchronization
KW - Wireless sensor networks
UR - http://www.scopus.com/inward/record.url?scp=85077800636&partnerID=8YFLogxK
U2 - 10.1145/3365838
DO - 10.1145/3365838
M3 - Journal article
AN - SCOPUS:85077800636
SN - 1550-4859
VL - 16
JO - ACM Transactions on Sensor Networks
JF - ACM Transactions on Sensor Networks
IS - 1
M1 - 6
ER -