Robust one-shot estimation over shared networks in the presence of denial-of-service attacks

02/28/2023
by   Xu Zhang, et al.
0

Multi-agent systems often communicate over low-power shared wireless networks in unlicensed spectrum, prone to denial-of-service attacks. We consider the following scenario: multiple pairs of agents communicating strategically over shared communication networks in the presence of a jammer who may launch a denial-of-service. We cast this problem as a game between a coordinator who optimizes the transmission and estimation policies jointly and a jammer who optimizes its probability of performing an attack. We consider two cases: point-to-point channels and large-scale networks with a countably infinite number of sensor-receiver pairs. When the jammer proactively attacks the channel, the game is nonconvex from the coordinator's perspective. However, despite the lack of convexity, we construct a saddle point equilibrium solution for any multi-variate Gaussian distribution for the observations. When the jammer is reactive, we obtain an algorithm based on sequential convex optimization, which converges swiftly to first-order Nash-equilibria. Interestingly, blocking the channel is often optimal when the jammer is reactive, even when it is idle, to create ambiguity at the receiver.

READ FULL TEXT

page 1

page 8

page 16

research
04/01/2022

Robust remote estimation over the collision channel in the presence of an intelligent jammer

We consider a sensor-receiver pair communicating over a wireless channel...
research
09/08/2023

Data-driven classification of low-power communication signals by an unauthenticated user using a software-defined radio

Many large-scale distributed multi-agent systems exchange information ov...
research
03/26/2020

Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation

Wireless secret key generation (W-SKG) from shared randomness (e.g., fro...
research
03/22/2023

Optimal Resource Allocation between Two Nonfully Cooperative Wireless Networks under Malicious Attacks: A Gestalt Game Perspective

In this paper, the problem of seeking optimal distributed resource alloc...
research
09/26/2018

Crippling Crypto-Ransomware

This research seeks to expose a major weakness in Crypto-ransomware by m...
research
12/21/2017

Analysis of the Game-Theoretic Modeling of Backscatter Wireless Sensor Networks under Smart Interference

In this paper, we study an interference avoidance scenario in the presen...
research
10/29/2016

Multi-agent projective simulation: A starting point

We develop a two-defender (Alice and Bob) invasion game using the method...

Please sign up or login with your details

Forgot password? Click here to reset