Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers

Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency (RF) spectrum utilization. However, there are several challenges to realize them in real systems, such as sensing uncertainty causing issues to licensed users, business models for licensed service prov...

Full description

Bibliographic Details
Main Authors: Bassma S. Alsulami, Chandra Bajracharya, Danda B. Rawat
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2021-08-01
Series:Digital Communications and Networks
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2352864821000201
id doaj-4c57ab65b68545cb9f0a57e068e99993
record_format Article
spelling doaj-4c57ab65b68545cb9f0a57e068e999932021-08-30T04:13:50ZengKeAi Communications Co., Ltd.Digital Communications and Networks2352-86482021-08-0173327334Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppersBassma S. Alsulami0Chandra Bajracharya1Danda B. Rawat2Department of Electrical Engineering and Computer Science, Howard University, Washington, DC, 20059, USADepartment of Electrical Engineering, Capitol Technology University, Laurel, MD, 20708, USADepartment of Electrical Engineering and Computer Science, Howard University, Washington, DC, 20059, USA; Corresponding author.Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency (RF) spectrum utilization. However, there are several challenges to realize them in real systems, such as sensing uncertainty causing issues to licensed users, business models for licensed service providers. Wireless virtualization is regarded as a technology that leverages service level agreements to sublease unused or underutilized RF spectrum that addresses aforementioned issues and helps to significantly enhance the utilization of the RF spectrum, offer improved coverage and capacity of networks, enhance network security and reduce energy consumption. With wireless virtualization, wireless networks' physical substrate is shared and reconfigured dynamically between virtual wireless networks through Mobile Virtual Network Operations (MVNOs). Wireless virtualization with dynamic configurable features of Wireless Infrastructure Providers (WIPs), virtualized wireless networks are vulnerable to a multitude of attacks, including jamming attacks and eavesdropping attacks. This paper investigates a means of defense through the employment of coalition game theory when jammers try to degrade the signal quality of legitimate users, and eavesdroppers aim to reduce secrecy rates. Specifically, we consider a virtual wireless network where MVNO users' job is to improve their Signal to Interference plus Noise Ratio (SINR) while the jammers target to collectively enhance their Jammer Received Signal Strength (JRSS), and an eavesdropper's goal is to reduce the overall secrecy rate. Numerical results have demonstrated that the proposed game strategies are effective (in terms of data rate, secrecy rate and latency) against such attackers compared to the traditional approaches.http://www.sciencedirect.com/science/article/pii/S2352864821000201Game theory based securityVirtual wireless networksJamming and eavesdropping
collection DOAJ
language English
format Article
sources DOAJ
author Bassma S. Alsulami
Chandra Bajracharya
Danda B. Rawat
spellingShingle Bassma S. Alsulami
Chandra Bajracharya
Danda B. Rawat
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers
Digital Communications and Networks
Game theory based security
Virtual wireless networks
Jamming and eavesdropping
author_facet Bassma S. Alsulami
Chandra Bajracharya
Danda B. Rawat
author_sort Bassma S. Alsulami
title Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers
title_short Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers
title_full Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers
title_fullStr Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers
title_full_unstemmed Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers
title_sort game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers
publisher KeAi Communications Co., Ltd.
series Digital Communications and Networks
issn 2352-8648
publishDate 2021-08-01
description Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency (RF) spectrum utilization. However, there are several challenges to realize them in real systems, such as sensing uncertainty causing issues to licensed users, business models for licensed service providers. Wireless virtualization is regarded as a technology that leverages service level agreements to sublease unused or underutilized RF spectrum that addresses aforementioned issues and helps to significantly enhance the utilization of the RF spectrum, offer improved coverage and capacity of networks, enhance network security and reduce energy consumption. With wireless virtualization, wireless networks' physical substrate is shared and reconfigured dynamically between virtual wireless networks through Mobile Virtual Network Operations (MVNOs). Wireless virtualization with dynamic configurable features of Wireless Infrastructure Providers (WIPs), virtualized wireless networks are vulnerable to a multitude of attacks, including jamming attacks and eavesdropping attacks. This paper investigates a means of defense through the employment of coalition game theory when jammers try to degrade the signal quality of legitimate users, and eavesdroppers aim to reduce secrecy rates. Specifically, we consider a virtual wireless network where MVNO users' job is to improve their Signal to Interference plus Noise Ratio (SINR) while the jammers target to collectively enhance their Jammer Received Signal Strength (JRSS), and an eavesdropper's goal is to reduce the overall secrecy rate. Numerical results have demonstrated that the proposed game strategies are effective (in terms of data rate, secrecy rate and latency) against such attackers compared to the traditional approaches.
topic Game theory based security
Virtual wireless networks
Jamming and eavesdropping
url http://www.sciencedirect.com/science/article/pii/S2352864821000201
work_keys_str_mv AT bassmasalsulami gametheorybasedattackanddefenseanalysisinvirtualwirelessnetworkswithjammersandeavesdroppers
AT chandrabajracharya gametheorybasedattackanddefenseanalysisinvirtualwirelessnetworkswithjammersandeavesdroppers
AT dandabrawat gametheorybasedattackanddefenseanalysisinvirtualwirelessnetworkswithjammersandeavesdroppers
_version_ 1721185856644972544