Standard

Anti-jamming strategies: a stochastic game approach. / Garnaev, A.; Trappe, W.

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Nature, 2015. p. 230-243.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

Harvard

Garnaev, A & Trappe, W 2015, Anti-jamming strategies: a stochastic game approach. in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Nature, pp. 230-243. https://doi.org/10.1007/978-3-319-16292-8_17

APA

Garnaev, A., & Trappe, W. (2015). Anti-jamming strategies: a stochastic game approach. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (pp. 230-243). Springer Nature. https://doi.org/10.1007/978-3-319-16292-8_17

Vancouver

Garnaev A, Trappe W. Anti-jamming strategies: a stochastic game approach. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Nature. 2015. p. 230-243 https://doi.org/10.1007/978-3-319-16292-8_17

Author

Garnaev, A. ; Trappe, W. / Anti-jamming strategies: a stochastic game approach. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Nature, 2015. pp. 230-243

BibTeX

@inproceedings{5041acab216f4c029e82c159ac8c86e2,
title = "Anti-jamming strategies: a stochastic game approach",
abstract = "Due to their shared and open-access design, wireless networks are very vulnerable to many malicious attacks, ranging from passive eavesdropping to active interfering. In this paper, using stochastic game modeling we study anti-jamming strategies and their effectiveness against two types of interference attacks: (i) a random jammer, where the malicious user combines jamming modes with sleep modes; and (ii) a sophisticated jammer, where the malicious user uses the network for a two-fold purpose: law-obedient communication with other users and non-obedient jamming against a specific (primary) user. We focus our research on constructing the optimal maxmin anti-jamming transmission strategy and an optimal strategy against a selfish malicious user. Further, employing the suggested models we demonstrate that incorporating silent modes into the anti-jamming transmission protocol, where the primary user does not transmit signals for the purpose of helping an intrusion detection system identify the source of a jamming",
author = "A. Garnaev and W. Trappe",
year = "2015",
doi = "10.1007/978-3-319-16292-8_17",
language = "English",
pages = "230--243",
booktitle = "Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering",
publisher = "Springer Nature",
address = "Germany",

}

RIS

TY - GEN

T1 - Anti-jamming strategies: a stochastic game approach

AU - Garnaev, A.

AU - Trappe, W.

PY - 2015

Y1 - 2015

N2 - Due to their shared and open-access design, wireless networks are very vulnerable to many malicious attacks, ranging from passive eavesdropping to active interfering. In this paper, using stochastic game modeling we study anti-jamming strategies and their effectiveness against two types of interference attacks: (i) a random jammer, where the malicious user combines jamming modes with sleep modes; and (ii) a sophisticated jammer, where the malicious user uses the network for a two-fold purpose: law-obedient communication with other users and non-obedient jamming against a specific (primary) user. We focus our research on constructing the optimal maxmin anti-jamming transmission strategy and an optimal strategy against a selfish malicious user. Further, employing the suggested models we demonstrate that incorporating silent modes into the anti-jamming transmission protocol, where the primary user does not transmit signals for the purpose of helping an intrusion detection system identify the source of a jamming

AB - Due to their shared and open-access design, wireless networks are very vulnerable to many malicious attacks, ranging from passive eavesdropping to active interfering. In this paper, using stochastic game modeling we study anti-jamming strategies and their effectiveness against two types of interference attacks: (i) a random jammer, where the malicious user combines jamming modes with sleep modes; and (ii) a sophisticated jammer, where the malicious user uses the network for a two-fold purpose: law-obedient communication with other users and non-obedient jamming against a specific (primary) user. We focus our research on constructing the optimal maxmin anti-jamming transmission strategy and an optimal strategy against a selfish malicious user. Further, employing the suggested models we demonstrate that incorporating silent modes into the anti-jamming transmission protocol, where the primary user does not transmit signals for the purpose of helping an intrusion detection system identify the source of a jamming

U2 - 10.1007/978-3-319-16292-8_17

DO - 10.1007/978-3-319-16292-8_17

M3 - Conference contribution

SP - 230

EP - 243

BT - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

PB - Springer Nature

ER -

ID: 4696120