MAC Layer Jamming Mitigation Using a Game Augmented by Intervention

  • PDF / 943,820 Bytes
  • 14 Pages / 600.05 x 792 pts Page_size
  • 11 Downloads / 219 Views

DOWNLOAD

REPORT


Research Article MAC Layer Jamming Mitigation Using a Game Augmented by Intervention Zhichu Lin and Mihaela van der Schaar Department of Electrical Engineering, University of California Los Angeles (UCLA), Los Angeles, CA 90095-1594, USA Correspondence should be addressed to Zhichu Lin, [email protected] Received 13 April 2010; Revised 21 August 2010; Accepted 11 November 2010 Academic Editor: Ashish Pandharipande Copyright © 2011 Z. Lin and M. van der Schaar. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. MAC layer jamming is a common attack on wireless networks, which is easy to launch by the attacker and which is very effective in disrupting the service provided by the network. Most of the current MAC protocols for wireless networks, for example, IEEE 802.11, do not provide sufficient protection against MAC layer jamming attacks. In this paper, we first use a non-cooperative game model to characterize the interactions among a group of self-interested regular users and a malicious user. It can be shown that the Nash equilibrium of this game is either inefficient or unfair for the regular users. We introduce a policer (an intervention user) who uses an intervention function to transform the original non-cooperative game into a new non-cooperative game augmented by the intervention function, in which the users will adjust to play a Nash equilibrium of the augmented game. By properly designing the intervention function, we show that the intervention user can effectively mitigate the jamming attacks from the malicious user, and at the same time let the regular users choose more efficient transmission strategies. It is proved that any feasible point in the rate region can be achieved as a Nash equilibrium of the augmented game by appropriately designing the intervention.

1. Introduction Due to the broadcast nature of the wireless medium, wireless networks are not only sensitive to the mutual interferences among the legitimate (regular) users, but also highly vulnerable to malicious attacks from adversarial users. Malicious attacks are usually more detrimental than interference from legitimate users because they intentionally disrupt the network service. One of the most effective and simple attacks on wireless networks is a Denial-of-Service (DoS) or jamming attack [1]. These attacks from one or more adversarial users make a network and its service unavailable to the legitimate users. DoS attacks can be carried out at different layers of the wireless networks. For example, a DoS attack at the physical layer [2] can be launched by a wireless jammer which sends high power signal to cause an extremely low signal-to-interference and noise ratio (SINR) at a legitimate user’s receiver. A MAC layer DoS attacker [1, 3] can disrupt legitimate users’ packet transmission by sending jamming packets to a contention-based network. At the application layer, a brute force DoS