Abstract
In this paper, we illustrate the properties of proposed dynamic secure routing game framework to effectively combat jamming attacks in distributed cognitive radio networks. We derive the saddle-point equilibrium for distributed routing game that supports a novel recovery of routing path failure against unknown attackers and enhances the security and resilience of the routing protocols in face of adversarial attacks. We use network simulation using NS-2 to corroborate our results in the paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Note that “security strategy” is a game-theoretic term, referring the worst-case optimal strategies. It should not be interpreted as “cyber security strategy” as the term in computer science and engineering.
References
Başar, T., Olsder, G.J.: Dynamic Noncooperative Game Theory. SIAM Series in Classics in Applied Mathematics. SIAM, Philadelphia (1999)
Chan, W.C., Lu, T.C., Chen, R.J.: Pollarczek-Khinchin formula for the M/G/1 queue in discrete time with vacations. In: IEE Proceedings of Computers and Digital Techniques, vol. 144, pp. 222–226 (1997)
Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26, 25–37 (2008)
Clancy, T.C., Goergen, N.: Security in cognitive radio networks: threats and mitigation. In: Proceedings of the 3rd International Conference on CrownCom08, Singapore (2008)
Ding, L., Melodia, T., Batalama, S., Medley, M.J.: ROSA: distributed joint routing and dynamic spectrum allocation in cognitive radio ad hoc networks. In: Proceedings of ACM MSWiM, Canary Islands, Spain (2009)
Hossain, E., Niyato, D., Han, Z.: Dynamic Spectrum Access in Cognitive Radio Networks. Cambridge University Press, Cambridge (2009)
Hu, Y.-C., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Secur. Priv. 2, 28–39 (2004)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA (2003)
Saad, W., Zhu, Q., Başar, T., Han, Z., Hjorungnes, A.: Hierarchical network formation games in the uplink of multi-hop wireless networks. In: Proceedings of IEEE Globecom, Honolulu, Hawaii (2009)
Shi, Y., Hou, Y.T.: A distributed optimization algorithm for multi-hop cognitive radio networks. In: Proceedings of International Conference on Computer Communications, Phoenix, AZ, USA (2008)
Tague, P., Slater, D., Noubir, G., Poovendran, R.: Linear programming models for jamming attacks on network traffic flows. In: Proceedings of WiOpt’08, Berlin, Germany (2008)
Tague, P., Nabar, P., Ritcey, J.A., Poovendram, R.: Jamming-aware traffic allocation for multiple-path routing using portfolio selection. IEEE/ACM Trans. Networking 19, 184–194 (2011)
Wang, W., Li, H., Sun, Y., Han, Z.: Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks. EURASIP J. Adv. Signal Process. 2010, 106–117 (2010)
Wang, W., Sun, Y., Li, H., Han, Z.: Cross-layer attack and defense in cognitive radio networks. In: Proceedings of IEEE Globecom, Miami, Florida, USA (2010)
Wassim, E., Haidar, S., Mohsen, G.: Survey of security issues in cognitive radio networks. J. Internet Technol. 12, 181–198 (2011)
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of ACM MobiHoc, Urbana, IL, USA (2005)
Zhu, Q., Tembine, T., Başar, T.: Heterogeneous learning in zero-sum stochastic games with incomplete information. In: Proceedings of IEEE Conference on Decision and Control, Atlanta, Georgia (2010)
Zhu, Q., Yuan, Z., Song, J.B., Han, Z., Başar, T.: Dynamic interference minimization routing game for on-demand cognitive pilot channel. In: Proceedings of IEEE Globecom, Miami, Florida (2010)
Zhu, Q., Song, J.B., Başar, T.: Dynamic secure routing game in distributed cognitive radio networks. In: Proceedings of IEEE Globecom, Houston, Texas (2011)
Zhu, Q., Tembine, H., Başar, T.: Distributed strategic learning with application to network security. In: Proceedings of IEEE American Control Conference, San Francisco, CA (2011)
Zhu, Q., Yuan, Z., Song, J.B., Han, Z., Başar, T.: Interference aware routing game for cognitive radio multi-hop networks. IEEE J. Sel. Areas Commun. 30, 2006–2015 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Song, J.B., Zhu, Q. (2019). Performance of Dynamic Secure Routing Game. In: Song, J., Li, H., Coupechoux, M. (eds) Game Theory for Networking Applications. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-93058-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-93058-9_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93057-2
Online ISBN: 978-3-319-93058-9
eBook Packages: EngineeringEngineering (R0)