Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференций › статья в сборнике материалов конференции › научная
Anti-jamming strategies: a stochastic game approach. / Garnaev, A.; Trappe, W.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Nature, 2015. стр. 230-243.Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференций › статья в сборнике материалов конференции › научная
}
TY - GEN
T1 - Anti-jamming strategies: a stochastic game approach
AU - Garnaev, A.
AU - Trappe, W.
PY - 2015
Y1 - 2015
N2 - Due to their shared and open-access design, wireless networks are very vulnerable to many malicious attacks, ranging from passive eavesdropping to active interfering. In this paper, using stochastic game modeling we study anti-jamming strategies and their effectiveness against two types of interference attacks: (i) a random jammer, where the malicious user combines jamming modes with sleep modes; and (ii) a sophisticated jammer, where the malicious user uses the network for a two-fold purpose: law-obedient communication with other users and non-obedient jamming against a specific (primary) user. We focus our research on constructing the optimal maxmin anti-jamming transmission strategy and an optimal strategy against a selfish malicious user. Further, employing the suggested models we demonstrate that incorporating silent modes into the anti-jamming transmission protocol, where the primary user does not transmit signals for the purpose of helping an intrusion detection system identify the source of a jamming
AB - Due to their shared and open-access design, wireless networks are very vulnerable to many malicious attacks, ranging from passive eavesdropping to active interfering. In this paper, using stochastic game modeling we study anti-jamming strategies and their effectiveness against two types of interference attacks: (i) a random jammer, where the malicious user combines jamming modes with sleep modes; and (ii) a sophisticated jammer, where the malicious user uses the network for a two-fold purpose: law-obedient communication with other users and non-obedient jamming against a specific (primary) user. We focus our research on constructing the optimal maxmin anti-jamming transmission strategy and an optimal strategy against a selfish malicious user. Further, employing the suggested models we demonstrate that incorporating silent modes into the anti-jamming transmission protocol, where the primary user does not transmit signals for the purpose of helping an intrusion detection system identify the source of a jamming
U2 - 10.1007/978-3-319-16292-8_17
DO - 10.1007/978-3-319-16292-8_17
M3 - Conference contribution
SP - 230
EP - 243
BT - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
PB - Springer Nature
ER -
ID: 4696120