Connectivity jamming game for physical layer attack in peer to peer networks

11/29/2017
by   Ying Liu, et al.
0

Because of the open access nature of wireless communications, wireless networks can suffer from malicious activity, such as jamming attacks, aimed at undermining the network's ability to sustain communication links and acceptable throughput. One important consideration when designing networks is to appropriately tune the network topology and its connectivity so as to support the communication needs of those participating in the network. This paper examines the problem of interference attacks that are intended to harm connectivity and throughput, and illustrates the method of mapping network performance parameters into the metric of topographic connectivity. Specifically, this paper arrives at anti-jamming strategies aimed at coping with interference attacks through a unified stochastic game. In such a framework, an entity trying to protect a network faces a dilemma: (i) the underlying motivations for the adversary can be quite varied, which depends largely on the network's characteristics such as power and distance; (ii) the metrics for such an attack can be incomparable (e.g., network connectivity and total throughput). To deal with the problem of such incomparable metrics, this paper proposes using the attack's expected duration as a unifying metric to compare distinct attack metrics because a longer-duration of unsuccessful attack assumes a higher cost. Based on this common metric, a mechanism of maxmin selection for an attack prevention strategy is suggested.

READ FULL TEXT
research
05/17/2018

Test for penetration in Wi-Fi network: attacks on WPA2-PSK and WPA2-Enterprise

In this work the wireless networks security algorithms were analyzed. Th...
research
04/23/2020

Preliminary Study of Connectivity for Quantum Key Distribution Network

Quantum network is fragile to disturbances when qubits are transmitted t...
research
11/17/2022

More Effective Centrality-Based Attacks on Weighted Networks

Only when understanding hackers' tactics, can we thwart their attacks. W...
research
10/12/2018

How to Pick Your Friends - A Game Theoretic Approach to P2P Overlay Construction

A major limitation of open P2P networks is the lack of strong identities...
research
04/07/2021

A First Look into the Structural Properties and Resilience of Blockchain Overlays

Blockchain (BC) systems are highly distributed peer-to-peer networks tha...
research
04/20/2021

Impact of Multi-connectivity on Channel Capacity and Outage Probability in Wireless Networks

Multi-connectivity facilitates higher throughput, shorter delay, and low...
research
08/06/2022

Analysis of Temporal Robustness in Massive Machine Type Communications

The evolution of fifth generation (5G) networks needs to support the lat...

Please sign up or login with your details

Forgot password? Click here to reset