Abstract
Physical-layer and MAC-layer defense mechanisms against jamming attacks are often inherently reactive to experienced delay and loss of throughput after being attacked. In this paper, we study a proactive defense mechanism against jamming in multi-hop relay networks, in which one or more network sources introduce a deceptive network flow along a disjoint routing path. The deceptive mechanism leverages strategic jamming behaviors, causing the attacker to expend resources on targeting deceptive flows and thereby reducing the impact on real network traffic. We use a two-stage game model to obtain deception strategies at Stackelberg equilibrium for selfish and altruistic nodes. The equilibrium solutions are illustrated and corroborated through a simulation study.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Başar, T., Olsder, G.J.: Dynamic Noncooperative Game Theory, vol. 23. Society for Industrial and Applied Mathematics (SIAM) (1999)
Jacquet, P., Muhlethaler, P., Clausen, T., Laouiti, A., Qayyum, A., Viennot, L.: Optimized link state routing protocol for ad hoc networks. In: Proceedings of IEEE International Multi-Topic Conference, INMIC (2001)
Liu, Y., Ning, P., Dai, H., Liu, A.: Randomized differential dsss: Jamming-resistant wireless broadcast communication. In: Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM), pp. 1–9 (2010)
Noubir, G., Rajaraman, R., Sheng, B., Thapa, B.: On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming. In: Proceedings of the 4th ACM Conference on Wireless Network Security (WiSec), pp. 97–108. ACM (2011)
Pelechrinis, K., Iliofotou, M., Krishnamurthy, S.: Denial of service attacks in wireless networks: The case of jammers. IEEE Communications Surveys and Tutorials 13(2), 245–257 (2011)
Perkins, C., Royer, E.: Ad-hoc on-demand distance vector routing. In: Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90–100 (1999)
Poisel, R.: Modern Communications Jamming Principles and Techniques. Artech House Publishers (2011)
Pöpper, C., Strasser, M., Čapkun, S.: Anti-jamming broadcast communication using uncoordinated spread spectrum techniques. IEEE Journal on Selected Areas in Communications (JSAC) 28(5), 703–715 (2010)
Ross, S.: Introduction to Probability Models. Academic Press (2009)
Tague, P., Nabar, S., Ritcey, J., Poovendran, R.: Jamming-aware traffic allocation for multiple-path routing using portfolio selection. IEEE/ACM Transactions on Networking 19(1), 184–194 (2011)
Tague, P., Slater, D., Poovendran, R., Noubir, G.: Linear programming models for jamming attacks on network traffic flows. In: Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), pp. 207–216. IEEE (2008)
Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceedings of the 3rd ACM Workshop on Wireless Security (WiSE), pp. 80–89. ACM (2004)
Zhu, Q., Clark, A., Poovendran, R., Başar, T.: Deceptive routing games. To appear in Proceedings of IEEE Conference on Decision and Control (CDC), Maui, Hawaii (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Clark, A., Zhu, Q., Poovendran, R., Başar, T. (2012). Deceptive Routing in Relay Networks. In: Grossklags, J., Walrand, J. (eds) Decision and Game Theory for Security. GameSec 2012. Lecture Notes in Computer Science, vol 7638. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34266-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-34266-0_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34265-3
Online ISBN: 978-3-642-34266-0
eBook Packages: Computer ScienceComputer Science (R0)