Advertisement

Deceptive Routing in Relay Networks

  • Andrew Clark
  • Quanyan Zhu
  • Radha Poovendran
  • Tamer Başar
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7638)

Abstract

Physical-layer and MAC-layer defense mechanisms against jamming attacks are often inherently reactive to experienced delay and loss of throughput after being attacked. In this paper, we study a proactive defense mechanism against jamming in multi-hop relay networks, in which one or more network sources introduce a deceptive network flow along a disjoint routing path. The deceptive mechanism leverages strategic jamming behaviors, causing the attacker to expend resources on targeting deceptive flows and thereby reducing the impact on real network traffic. We use a two-stage game model to obtain deception strategies at Stackelberg equilibrium for selfish and altruistic nodes. The equilibrium solutions are illustrated and corroborated through a simulation study.

Keywords

Game Theory Stackelberg Equilibrium Routing Algorithms Jamming and Security Relay Networks 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Başar, T., Olsder, G.J.: Dynamic Noncooperative Game Theory, vol. 23. Society for Industrial and Applied Mathematics (SIAM) (1999)Google Scholar
  2. 2.
    Jacquet, P., Muhlethaler, P., Clausen, T., Laouiti, A., Qayyum, A., Viennot, L.: Optimized link state routing protocol for ad hoc networks. In: Proceedings of IEEE International Multi-Topic Conference, INMIC (2001)Google Scholar
  3. 3.
    Liu, Y., Ning, P., Dai, H., Liu, A.: Randomized differential dsss: Jamming-resistant wireless broadcast communication. In: Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM), pp. 1–9 (2010)Google Scholar
  4. 4.
    Noubir, G., Rajaraman, R., Sheng, B., Thapa, B.: On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming. In: Proceedings of the 4th ACM Conference on Wireless Network Security (WiSec), pp. 97–108. ACM (2011)Google Scholar
  5. 5.
    Pelechrinis, K., Iliofotou, M., Krishnamurthy, S.: Denial of service attacks in wireless networks: The case of jammers. IEEE Communications Surveys and Tutorials 13(2), 245–257 (2011)CrossRefGoogle Scholar
  6. 6.
    Perkins, C., Royer, E.: Ad-hoc on-demand distance vector routing. In: Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90–100 (1999)Google Scholar
  7. 7.
    Poisel, R.: Modern Communications Jamming Principles and Techniques. Artech House Publishers (2011)Google Scholar
  8. 8.
    Pöpper, C., Strasser, M., Čapkun, S.: Anti-jamming broadcast communication using uncoordinated spread spectrum techniques. IEEE Journal on Selected Areas in Communications (JSAC) 28(5), 703–715 (2010)CrossRefGoogle Scholar
  9. 9.
    Ross, S.: Introduction to Probability Models. Academic Press (2009)Google Scholar
  10. 10.
    Tague, P., Nabar, S., Ritcey, J., Poovendran, R.: Jamming-aware traffic allocation for multiple-path routing using portfolio selection. IEEE/ACM Transactions on Networking 19(1), 184–194 (2011)CrossRefGoogle Scholar
  11. 11.
    Tague, P., Slater, D., Poovendran, R., Noubir, G.: Linear programming models for jamming attacks on network traffic flows. In: Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), pp. 207–216. IEEE (2008)Google Scholar
  12. 12.
    Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceedings of the 3rd ACM Workshop on Wireless Security (WiSE), pp. 80–89. ACM (2004)Google Scholar
  13. 13.
    Zhu, Q., Clark, A., Poovendran, R., Başar, T.: Deceptive routing games. To appear in Proceedings of IEEE Conference on Decision and Control (CDC), Maui, Hawaii (2012)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Andrew Clark
    • 1
  • Quanyan Zhu
    • 2
  • Radha Poovendran
    • 1
  • Tamer Başar
    • 2
  1. 1.Department of Electrical EngineeringUniversity of WashingtonSeattleUSA
  2. 2.Coordinated Science Laboratory and Department of Electrical and Computer EngineeringUniversity of Illinois at Urbana ChampaignUrbanaUSA

Personalised recommendations