skip to main content


Title: A Friendly Interference Game in Wireless Secret Communication Networks
This paper considers a parallel wireless network in which multiple individuals exchange confidential information through independent sender-receiver links. An eavesdropper can intercept encrypted information through a degraded channel of each sender-receiver link. A friendly jammer, by applying interference to the eavesdropping channels, can increase the level of secrecy of the network. The optimal power allocation strategy of the friendly jammer under a power constraint is derived. A convex optimization model is used when all channels are under the threat of an eavesdropping attack and a non-zero sum game model is analyzed when the eavesdropper can only attack a limited quantity of channels.  more » « less
Award ID(s):
1901721
NSF-PAR ID:
10353167
Author(s) / Creator(s):
;
Editor(s):
Filipe, J.; Ghosh, A.; Prates, R. O.; Zhou, L.
Date Published:
Journal Name:
10th International Conference on NETwork Games, COntrol and OPtimization (NetGCOOP)
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    Considered is a multi-channel wireless network for secret communication that uses the signal-to-interference-plus-noise ratio (SINR) as the performance measure. An eavesdropper can intercept encoded messages through a degraded channel of each legitimate transmitter-receiver communication pair. A friendly interferer, on the other hand, may send cooperative jamming signals to enhance the secrecy performance of the whole network. Besides, the state information of the eavesdropping channel may not be known completely. The transmitters and the friendly interferer have to cooperatively decide on the optimal jamming power allocation strategy that balances the secrecy performance with the cost of employing intentional interference, while the eavesdropper tries to maximize her eavesdropping capacity. To solve this problem, we propose and analyze a non-zero-sum game between the network defender and the eavesdropper who can only attack a limited number of channels. We show that the Nash equilibrium strategies for the players are of threshold type. We present an algorithm to find the equilibrium strategy pair. Numerical examples demonstrate the equilibrium and contrast it to baseline strategies. 
    more » « less
  2. Considered is a network of parallel wireless channels in which individual parties are engaged in secret communication under the protection of cooperative jamming. A strategic eavesdropper selects the most vulnerable channels to attack. Existing works usually suggest the defender allocate limited cooperative jamming power to various channels. However, it usually requires some strong assumptions and complex computation to find such an optimal power control policy. This paper proposes a probabilistic cooperative jamming scheme such that the defender focuses on protecting randomly selected channels. Two different cases regarding each channel’s eavesdropping capacity are discussed. The first case studies the general scenario where each channel has different eavesdropping capacity. The second case analyzes an extreme scenario where all channels have the same eavesdropping capacity. Two non-zero-sum Nash games model the competition between the network defender and an eavesdropper in each case. Furthermore, considering the case that the defender does not know the eavesdropper’s channel state information (CSI) leads to a Bayesian game. For all three games, we derive conditions for the existence of a unique Nash equilibrium (NE), and obtain the equilibria and the value functions in closed form. 
    more » « less
  3. In a time-division duplex (TDD) multiple antenna system, the channel state information (CSI) can be estimated using reverse training. A pilot contamination (spoofing) attack occurs when during the training phase, an adversary also sends identical training (pilot) signal as that of the legitimate receiver. This contaminates channel estimation and alters the legitimate beamforming design, facilitating eavesdropping. Most of past approaches to pilot spoofing detection are limited to flat fading channels. A recent approach proposed superimposing a random sequence on the training sequence at the legitimate receiver for detection of pilot spoofing attack over frequency selective channels, with unknown channels and channel lengths, except that an upper bound on the number of channel taps is assumed to be known. In this paper we augment this approach with joint estimation of both legitimate receiver and eavesdropper channels, and secure time-reversal precoding, to mitigate the effects of pilot spoofing. The proposed mitigation approach is illustrated via simulations. 
    more » « less
  4. In a time-division duplex (TDD) multiple antenna system, the channel state information (CSI) can be estimated using reverse training. A pilot contamination (spoofing) attack occurs when during the training phase, an adversary also sends identical training (pilot) signal as that of the legitimate receiver. This contaminates channel estimation and alters the legitimate beamformimg design, facilitating eavesdropping. A recent approach proposed superimposing a random sequence on the training sequence at the legitimate receiver and then using the minimum description length (MDL) criterion to detect pilot contamination attack. In this paper we augment this approach with joint estimation of both legitimate receiver and eavesdropper channels, and secure beamforming, to mitigate the effects of pilot spoofing. The proposed mitigation approach is illustrated via simulations. 
    more » « less
  5. In a time-division duplex (TDD) multiple antenna system, the channel state information (CSI) can be estimated using reverse training. A pilot contamination (spoofing) attack occurs when during the training phase, an adversary (spoofer) also sends identical training (pilot) signal as that of the legitimate receiver. This contaminates channel estimation and alters the legitimate beamforming design, facilitating eavesdropping. A recent approach proposed superimposing a random sequence on the training sequence at the legitimate receiver and then using the minimum description length (MDL) criterion to detect pilot contamination attack. In this paper we augment this approach with joint estimation of both legitimate receiver and eavesdropper channels, and secure beamforming, to mitigate the effects of pilot spoofing. We consider two cases: (i) the spoofer transmits only the pilot signal, (ii) the spoofer also adds a random sequence to its pilot. The proposed mitigation approach is illustrated via simulations. 
    more » « less