Abstract
Underwater sensor networks can be employed in both military and environmental remote coastal monitoring applications, such as enemy targeting and identification, and tsunami prevention. Jamming can be a serious issue in these networks, typically composed by battery-powered nodes, as an attacker can not only disrupt packet delivery, but also reduce the lifetime of energy-constrained nodes. In this work, we consider a malicious jammer with the dual objective of preventing communication and depleting the battery of a targeted underwater sensor node. The jammed node may use packet-level coding as a countermeasure against the attack, so as to increase its chances of correctly delivering its information to the legitimate receiver. We model this scenario as a multistage game, derive the optimal long-term strategies for both sides, and evaluate how the position of the jammer affects the communication of the legitimate network.
Original language | English |
---|---|
Title of host publication | Proceedings of the International Conference on Underwater Networks and Systems, WUWNET 2019 |
Publisher | ICST |
Publication date | 23 Oct 2019 |
Article number | a40 |
ISBN (Electronic) | 9781450377409 |
DOIs | |
Publication status | Published - 23 Oct 2019 |
Externally published | Yes |
Event | 2019 International Conference on Underwater Networks and Systems, WUWNET 2019 - Atlanta, United States Duration: 23 Oct 2019 → 25 Oct 2019 |
Conference
Conference | 2019 International Conference on Underwater Networks and Systems, WUWNET 2019 |
---|---|
Country/Territory | United States |
City | Atlanta |
Period | 23/10/2019 → 25/10/2019 |
Sponsor | Association for Computing Machinery (ACM) |
Series | PervasiveHealth: Pervasive Computing Technologies for Healthcare |
---|---|
ISSN | 2153-1633 |
Bibliographical note
Funding Information:This work was partially supported by the Bundeswehr Technical Center for Ships and Naval Weapons, Maritime Technology and Research (WTD 71), Kiel, Germany.
Publisher Copyright:
© 2019 ACM.
Keywords
- Block code
- Game theory
- Jamming
- Security in underwater networks
- Underwater acoustic networks