DeepAI AI Chat
Log In Sign Up

Connectivity jamming game for physical layer attack in peer to peer networks

by   Ying Liu, et al.

Because of the open access nature of wireless communications, wireless networks can suffer from malicious activity, such as jamming attacks, aimed at undermining the network's ability to sustain communication links and acceptable throughput. One important consideration when designing networks is to appropriately tune the network topology and its connectivity so as to support the communication needs of those participating in the network. This paper examines the problem of interference attacks that are intended to harm connectivity and throughput, and illustrates the method of mapping network performance parameters into the metric of topographic connectivity. Specifically, this paper arrives at anti-jamming strategies aimed at coping with interference attacks through a unified stochastic game. In such a framework, an entity trying to protect a network faces a dilemma: (i) the underlying motivations for the adversary can be quite varied, which depends largely on the network's characteristics such as power and distance; (ii) the metrics for such an attack can be incomparable (e.g., network connectivity and total throughput). To deal with the problem of such incomparable metrics, this paper proposes using the attack's expected duration as a unifying metric to compare distinct attack metrics because a longer-duration of unsuccessful attack assumes a higher cost. Based on this common metric, a mechanism of maxmin selection for an attack prevention strategy is suggested.


Test for penetration in Wi-Fi network: attacks on WPA2-PSK and WPA2-Enterprise

In this work the wireless networks security algorithms were analyzed. Th...

Preliminary Study of Connectivity for Quantum Key Distribution Network

Quantum network is fragile to disturbances when qubits are transmitted t...

More Effective Centrality-Based Attacks on Weighted Networks

Only when understanding hackers' tactics, can we thwart their attacks. W...

How to Pick Your Friends - A Game Theoretic Approach to P2P Overlay Construction

A major limitation of open P2P networks is the lack of strong identities...

A First Look into the Structural Properties and Resilience of Blockchain Overlays

Blockchain (BC) systems are highly distributed peer-to-peer networks tha...

Impact of Multi-connectivity on Channel Capacity and Outage Probability in Wireless Networks

Multi-connectivity facilitates higher throughput, shorter delay, and low...

Analysis of Temporal Robustness in Massive Machine Type Communications

The evolution of fifth generation (5G) networks needs to support the lat...