Visible to the public Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework

TitleProvoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework
Publication TypeConference Paper
Year of Publication2017
AuthorsSalem, A., Liao, X., Shen, Y., Lu, X.
Conference Name2017 International Conference on Networking and Network Applications (NaNA)
Date Publishedoct
KeywordsAdversary Models, Communication system security, computer network security, dual detection techniques, eavesdropping, Eavesdropping detection, game theoretical framework, game theory, Games, Human Behavior, intrusion detection system, jamming, jamming attack, jamming detection, legitimate transmission link, Metrics, physical layer security, pubcrawl, reliability, reliable wireless communication, resilience, Resiliency, Scalability, secret communication, stochastic games, Stochastic processes, Wireless communication
Abstract

Establishing a secret and reliable wireless communication is a challenging task that is of paramount importance. In this paper, we investigate the physical layer security of a legitimate transmission link between a user that assists an Intrusion Detection System (IDS) in detecting eavesdropping and jamming attacks in the presence of an adversary that is capable of conducting an eavesdropping or a jamming attack. The user is being faced by a challenge of whether to transmit, thus becoming vulnerable to an eavesdropping or a jamming attack, or to keep silent and consequently his/her transmission will be delayed. The adversary is also facing a challenge of whether to conduct an eavesdropping or a jamming attack that will not get him/her to be detected. We model the interactions between the user and the adversary as a two-state stochastic game. Explicit solutions characterize some properties while highlighting some interesting strategies that are being embraced by the user and the adversary. Results show that our proposed system outperform current systems in terms of communication secrecy.

URLhttp://ieeexplore.ieee.org/document/8247159/
DOI10.1109/NaNA.2017.41
Citation Keysalem_provoking_2017