A Game Theoretic Approach to Modelling Jamming Attacks in Delay Tolerant Networks

نویسندگان

  • Monica Ravishankar
  • D. Vijay Rao
چکیده

The delay-tolerant-network (DTN) model is becoming a viable communication alternative to the traditional infrastructure model for military, terrestrial and atypical networks, which are characterised by transmission delay and intermittent network connections. The possibility of limited connectivity and resource scarcity in DTNs make them vulnerable to various cyber-attacks, including interference attacks such as jamming. We study the defence against jamming attacks in a delay tolerant network with two adversarial players the jammer, and the transmitterreceiver pair in a game theoretic environment. The transmitters seek to choose an optimal time to schedule the transmission securely to maximise the probability of successful delivery before the session expires, while signal interferences from the jammer attempts to minimise this probability. We design strategies for the transmitters that offset transmission period based inference of network traffic by the jammer. We deduce a solution for this game, using a probability distribution function over finite number of strategies for both the players to compute their expected payoff. Using a simulation test-bed, we create several scenarios in which the players are considered to have perfect/imperfect information and compute the expected payoff and resulting equilibrium values. The cases of perfect /imperfect information of the players are further studied using entropy based measures. These results are used to strategically evaluate the optimal time for the players, and assess the efficiency of the strategies used by the transmitters against jammer attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Game-Theoretic Framework for Jamming Attacks and Mitigation in Commercial Aircraft Wireless Networks

As wireless personal electronic devices (PEDs) become increasingly ubiquitous, the demand for wireless network services on commercial aircraft is likely to increase. Introduction of services to an aircraft network creates a host of wireless security challenges, whereby a passenger can use a wireless PED to potentially interfere with or jam valid network traffic and future inter-aircraft communi...

متن کامل

A New Vision-Based and GPS-Signal-Independent Approach in Jamming Detection and UAV Absolute Positioning Assessment

The Unmanned Aerial Vehicles (UAV) positioning in the outdoor environment is usually done by the Global Positioning System (GPS). Due to the low power of the GPS signal at the earth surface, its performance disrupted in the contaminated environments with the jamming attacks. The UAV positioning and its accuracy using GPS will be degraded in the jamming attacks. A positioning error about tens of...

متن کامل

GPS Jamming Detection in UAV Navigation Using Visual Odometry and HOD Trajectory Descriptor

Auto-navigating of unmanned aerial vehicles (UAV) in the outdoor environment is performed by using the Global positioning system (GPS) receiver. The power of the GPS signal on the earth surface is very low. This can affect the performance of GPS receivers in the environments contaminated with the other source of radio frequency interference (RFI). GPS jamming and spoofing are the most serious a...

متن کامل

Game-Theoretic Approach for Pricing Decisions in Dual-Channel Supply Chain

In the current study, a dual-channel supply chain is considered containing one manufacturer and two retailers. It is assumed that the manufacturer and retailers have the same decision powers. A game-theoretic approach is developed to analyze pricing decisions under the centralized and decentralized scenarios. First, the Nash model is established to obtain the equilibrium decisions in the decent...

متن کامل

A routing defense mechanism using evolutionary game theory for Delay Tolerant Networks

Delay Tolerant Networks (DTNs) often suffer from intermittent disruption due to factors such as mobility and energy. Though lots of routing algorithms in DTNs have been proposed in the last few years, the routing security problems have not attracted enough attention. DTNs are still facing the threats from different kinds of routing attacks. In this paper, a general purpose defense mechanism is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017