Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
A Bayesian game approach for intrusion detection in wireless ad hoc networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Game Theoretic Modeling of Jamming Attacks in Ad hoc Networks
ICCCN '09 Proceedings of the 2009 Proceedings of 18th International Conference on Computer Communications and Networks
Jamming in wireless networks under uncertainty
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Gaming the jammer: is frequency hopping effective?
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
A jamming game in wireless networks with transmission cost
NET-COOP'07 Proceedings of the 1st EuroFGI international conference on Network control and optimization
Using game theory to analyze wireless ad hoc networks
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
The objective of jamming attacks in a network is to deny service to the communicating nodes, thus reducing network throughput and availability. In this paper, we propose a game theoretic framework for detecting jamming attacks in wireless ad hoc networks. We formulate jamming as a two-player, non-cooperative game to analyze the interaction between the attacker and the monitoring nodes in the network. We propose hybrid detection strategies at the monitor node by using cross-layer features for attack detection. We solve the game by computing the mixed-strategy Nash equilibrium and derive the optimal attack and detection strategies. Numerical results show that game theoretic analysis can be used to determine the optimal steady-state monitoring strategies to provide higher detection accuracy, while balancing the monitoring energy costs. Copyright © 2011 John Wiley & Sons, Ltd.