4.7 Article

A Game Theoretic Analysis of Secret and Reliable Communication With Active and Passive Adversarial Modes

期刊

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
卷 15, 期 3, 页码 2155-2163

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TWC.2015.2498934

关键词

Jamming; eavesdropping; secret communication; stochastic games; stationary strategies

资金

  1. National Science Foundation [CMMI-1436288, CMMI-1435778]
  2. Div Of Civil, Mechanical, & Manufact Inn
  3. Directorate For Engineering [1436288] Funding Source: National Science Foundation
  4. Div Of Civil, Mechanical, & Manufact Inn
  5. Directorate For Engineering [1435778] Funding Source: National Science Foundation

向作者/读者索取更多资源

Secret and reliable communication presents a challenge involving a double dilemma for a user and an adversary. One challenge for the adversary is to decide between jamming and eavesdropping. While jamming can be quite effective in preventing reliable communication of the user, it can also be quite harmful for the adversary since he/she can be detected. On the other hand, eavesdropping is quite safe for the adversary; however, it sometimes may not be so efficient compared to jamming, if the adversary cannot respond to the information gleaned from eavesdropping in a timely manner. The user can either transmit, thus becoming vulnerable to malicious activity, or be in a silent mode in turn delaying his/her transmission. However, by combining these modes properly the user can assist an intruder detection system in detecting the adversary, since transmission can provoke the adversary into a jamming attack, and a strategically allocated silent mode while the jammer continues jamming can increase the probability of detecting the adversary. In this paper, to get insight into this problem, two simple stochastic games are proposed. Explicit solutions are found that lead to the characterization of some interesting properties. In particular, it is shown that under certain conditions, incorporating in the transmission protocol a time slot dealing just with the detection of malicious threats can improve the secrecy and reliability of the communication without extra transmission delay.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据