DocumentCode
661937
Title
Game theoretic analysis of jamming attack in wireless mesh network with delay tolerance
Author
Benromarn, Satawat ; Komolkiti, P. ; Aswakul, C.
Author_Institution
Dept. of Electr. Eng., Chulalongkorn Univ., Bangkok, Thailand
fYear
2013
fDate
4-6 Sept. 2013
Firstpage
354
Lastpage
358
Abstract
This paper proposes a framework for studying the impact of a smart attacker in a wireless mesh network that is used to provide delay-tolerant internet connectivity. Non-cooperative game theory is used to define the defending player strategy in terms of network tree routing as well as the attacking player strategy in terms of the varying position of communication signal jammer. To evaluate the game value, the payoff is captured by the expected number of backlogged packets, based on the assumption of network of M/M/1 queues. This game is solved by the well-known method of successive average. And a preliminary experimental result has been reported on a small 2×2 grid network. The finding sheds insights on three scenarios reflecting different intelligence levels inherited by the attacker and the defender in comparison with the equivalent settings without the attacker. Finally, future work worth investigating has been given.
Keywords
Internet; game theory; jamming; queueing theory; telecommunication network routing; trees (mathematics); wireless mesh networks; M/M/1 queues; attacking player strategy; backlogged packets; communication signal jammer; defending player strategy; delay tolerance; delay-tolerant Internet connectivity; grid network; jamming attack; network tree routing; noncooperative game theory; smart attacker; successive average method; wireless mesh network; Delays; Game theory; Games; Interference; Internet; Jamming; Wireless mesh networks; Attacker; Delay Tolerance; Noncooperative Game Theory; Wireless Mesh Network;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Science and Engineering Conference (ICSEC), 2013 International
Conference_Location
Nakorn Pathom
Print_ISBN
978-1-4673-5322-9
Type
conf
DOI
10.1109/ICSEC.2013.6694808
Filename
6694808
Link To Document