Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers
Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency (RF) spectrum utilization. However, there are several challenges to realize them in real systems, such as sensing uncertainty causing issues to licensed users, business models for licensed service prov...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
KeAi Communications Co., Ltd.
2021-08-01
|
Series: | Digital Communications and Networks |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2352864821000201 |
id |
doaj-4c57ab65b68545cb9f0a57e068e99993 |
---|---|
record_format |
Article |
spelling |
doaj-4c57ab65b68545cb9f0a57e068e999932021-08-30T04:13:50ZengKeAi Communications Co., Ltd.Digital Communications and Networks2352-86482021-08-0173327334Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppersBassma S. Alsulami0Chandra Bajracharya1Danda B. Rawat2Department of Electrical Engineering and Computer Science, Howard University, Washington, DC, 20059, USADepartment of Electrical Engineering, Capitol Technology University, Laurel, MD, 20708, USADepartment of Electrical Engineering and Computer Science, Howard University, Washington, DC, 20059, USA; Corresponding author.Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency (RF) spectrum utilization. However, there are several challenges to realize them in real systems, such as sensing uncertainty causing issues to licensed users, business models for licensed service providers. Wireless virtualization is regarded as a technology that leverages service level agreements to sublease unused or underutilized RF spectrum that addresses aforementioned issues and helps to significantly enhance the utilization of the RF spectrum, offer improved coverage and capacity of networks, enhance network security and reduce energy consumption. With wireless virtualization, wireless networks' physical substrate is shared and reconfigured dynamically between virtual wireless networks through Mobile Virtual Network Operations (MVNOs). Wireless virtualization with dynamic configurable features of Wireless Infrastructure Providers (WIPs), virtualized wireless networks are vulnerable to a multitude of attacks, including jamming attacks and eavesdropping attacks. This paper investigates a means of defense through the employment of coalition game theory when jammers try to degrade the signal quality of legitimate users, and eavesdroppers aim to reduce secrecy rates. Specifically, we consider a virtual wireless network where MVNO users' job is to improve their Signal to Interference plus Noise Ratio (SINR) while the jammers target to collectively enhance their Jammer Received Signal Strength (JRSS), and an eavesdropper's goal is to reduce the overall secrecy rate. Numerical results have demonstrated that the proposed game strategies are effective (in terms of data rate, secrecy rate and latency) against such attackers compared to the traditional approaches.http://www.sciencedirect.com/science/article/pii/S2352864821000201Game theory based securityVirtual wireless networksJamming and eavesdropping |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Bassma S. Alsulami Chandra Bajracharya Danda B. Rawat |
spellingShingle |
Bassma S. Alsulami Chandra Bajracharya Danda B. Rawat Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers Digital Communications and Networks Game theory based security Virtual wireless networks Jamming and eavesdropping |
author_facet |
Bassma S. Alsulami Chandra Bajracharya Danda B. Rawat |
author_sort |
Bassma S. Alsulami |
title |
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers |
title_short |
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers |
title_full |
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers |
title_fullStr |
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers |
title_full_unstemmed |
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers |
title_sort |
game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers |
publisher |
KeAi Communications Co., Ltd. |
series |
Digital Communications and Networks |
issn |
2352-8648 |
publishDate |
2021-08-01 |
description |
Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency (RF) spectrum utilization. However, there are several challenges to realize them in real systems, such as sensing uncertainty causing issues to licensed users, business models for licensed service providers. Wireless virtualization is regarded as a technology that leverages service level agreements to sublease unused or underutilized RF spectrum that addresses aforementioned issues and helps to significantly enhance the utilization of the RF spectrum, offer improved coverage and capacity of networks, enhance network security and reduce energy consumption. With wireless virtualization, wireless networks' physical substrate is shared and reconfigured dynamically between virtual wireless networks through Mobile Virtual Network Operations (MVNOs). Wireless virtualization with dynamic configurable features of Wireless Infrastructure Providers (WIPs), virtualized wireless networks are vulnerable to a multitude of attacks, including jamming attacks and eavesdropping attacks. This paper investigates a means of defense through the employment of coalition game theory when jammers try to degrade the signal quality of legitimate users, and eavesdroppers aim to reduce secrecy rates. Specifically, we consider a virtual wireless network where MVNO users' job is to improve their Signal to Interference plus Noise Ratio (SINR) while the jammers target to collectively enhance their Jammer Received Signal Strength (JRSS), and an eavesdropper's goal is to reduce the overall secrecy rate. Numerical results have demonstrated that the proposed game strategies are effective (in terms of data rate, secrecy rate and latency) against such attackers compared to the traditional approaches. |
topic |
Game theory based security Virtual wireless networks Jamming and eavesdropping |
url |
http://www.sciencedirect.com/science/article/pii/S2352864821000201 |
work_keys_str_mv |
AT bassmasalsulami gametheorybasedattackanddefenseanalysisinvirtualwirelessnetworkswithjammersandeavesdroppers AT chandrabajracharya gametheorybasedattackanddefenseanalysisinvirtualwirelessnetworkswithjammersandeavesdroppers AT dandabrawat gametheorybasedattackanddefenseanalysisinvirtualwirelessnetworkswithjammersandeavesdroppers |
_version_ |
1721185856644972544 |