Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework
Title | Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Salem, A., Liao, X., Shen, Y., Lu, X. |
Conference Name | 2017 International Conference on Networking and Network Applications (NaNA) |
Date Published | oct |
Keywords | Adversary Models, Communication system security, computer network security, dual detection techniques, eavesdropping, Eavesdropping detection, game theoretical framework, game theory, Games, Human Behavior, intrusion detection system, jamming, jamming attack, jamming detection, legitimate transmission link, Metrics, physical layer security, pubcrawl, reliability, reliable wireless communication, resilience, Resiliency, Scalability, secret communication, stochastic games, Stochastic processes, Wireless communication |
Abstract | Establishing a secret and reliable wireless communication is a challenging task that is of paramount importance. In this paper, we investigate the physical layer security of a legitimate transmission link between a user that assists an Intrusion Detection System (IDS) in detecting eavesdropping and jamming attacks in the presence of an adversary that is capable of conducting an eavesdropping or a jamming attack. The user is being faced by a challenge of whether to transmit, thus becoming vulnerable to an eavesdropping or a jamming attack, or to keep silent and consequently his/her transmission will be delayed. The adversary is also facing a challenge of whether to conduct an eavesdropping or a jamming attack that will not get him/her to be detected. We model the interactions between the user and the adversary as a two-state stochastic game. Explicit solutions characterize some properties while highlighting some interesting strategies that are being embraced by the user and the adversary. Results show that our proposed system outperform current systems in terms of communication secrecy. |
URL | http://ieeexplore.ieee.org/document/8247159/ |
DOI | 10.1109/NaNA.2017.41 |
Citation Key | salem_provoking_2017 |
- jamming detection
- Wireless communication
- Stochastic processes
- stochastic games
- secret communication
- Scalability
- Resiliency
- resilience
- reliable wireless communication
- Reliability
- pubcrawl
- physical layer security
- Metrics
- legitimate transmission link
- Adversary Models
- jamming attack
- Jamming
- intrusion detection system
- Human behavior
- Games
- game theory
- game theoretical framework
- Eavesdropping detection
- eavesdropping
- dual detection techniques
- computer network security
- Communication system security