Jamming the underwater: A game-theoretic analysis of energy-depleting jamming attacks

Alberto Signori, Chiara Pielli, Federico Chiariotti, Marco Giordani, Filippo Campagnaro, Nicola Laurenti, Michele Zorzi

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

4 Citations (Scopus)

Abstract

Underwater sensor networks can be employed in both military and environmental remote coastal monitoring applications, such as enemy targeting and identification, and tsunami prevention. Jamming can be a serious issue in these networks, typically composed by battery-powered nodes, as an attacker can not only disrupt packet delivery, but also reduce the lifetime of energy-constrained nodes. In this work, we consider a malicious jammer with the dual objective of preventing communication and depleting the battery of a targeted underwater sensor node. The jammed node may use packet-level coding as a countermeasure against the attack, so as to increase its chances of correctly delivering its information to the legitimate receiver. We model this scenario as a multistage game, derive the optimal long-term strategies for both sides, and evaluate how the position of the jammer affects the communication of the legitimate network.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Underwater Networks and Systems, WUWNET 2019
PublisherICST
Publication date23 Oct 2019
Article numbera40
ISBN (Electronic)9781450377409
DOIs
Publication statusPublished - 23 Oct 2019
Externally publishedYes
Event2019 International Conference on Underwater Networks and Systems, WUWNET 2019 - Atlanta, United States
Duration: 23 Oct 201925 Oct 2019

Conference

Conference2019 International Conference on Underwater Networks and Systems, WUWNET 2019
Country/TerritoryUnited States
CityAtlanta
Period23/10/201925/10/2019
SponsorAssociation for Computing Machinery (ACM)
SeriesPervasiveHealth: Pervasive Computing Technologies for Healthcare
ISSN2153-1633

Bibliographical note

Funding Information:
This work was partially supported by the Bundeswehr Technical Center for Ships and Naval Weapons, Maritime Technology and Research (WTD 71), Kiel, Germany.

Publisher Copyright:
© 2019 ACM.

Keywords

  • Block code
  • Game theory
  • Jamming
  • Security in underwater networks
  • Underwater acoustic networks

Fingerprint

Dive into the research topics of 'Jamming the underwater: A game-theoretic analysis of energy-depleting jamming attacks'. Together they form a unique fingerprint.

Cite this