Equilibrium strategies for an OFDM network that might be under a jamming attack

Andrey Garnaev, Wade Trappe, Athina Petropulu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations

Abstract

Wireless networks are vulnerable to many malicious attacks, like active interference, due to the shared and open-access nature of the wireless medium. One difficulty in dealing with interference attacks is the lack of knowledge about whether the attack will be present or not. In this paper, we investigate how the lack of knowledge of whether jamming will or will not be used against an OFDM communication impacts the anti-jamming strategy one should use. Our model can be applied more generally to jamming attacks with a fixed frequency where, at each time slot, it is unknown whether the interference will be used or not. We have derived the equilibrium strategy in waterfilling form, and shown that the obtained solution includes as boundary cases two classical solutions in OFDM transmission for the case where there is no adversary, and the case where the adversary attacks with certainty. Uniqueness of the equilibrium strategies is proven, and an algorithm for finding the parameters of the waterfilling equations is developed. The efficiency of the algorithm is illustrated by numerical examples.

Original languageEnglish (US)
Title of host publication2017 51st Annual Conference on Information Sciences and Systems, CISS 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509047802
DOIs
StatePublished - May 10 2017
Event51st Annual Conference on Information Sciences and Systems, CISS 2017 - Baltimore, United States
Duration: Mar 22 2017Mar 24 2017

Publication series

Name2017 51st Annual Conference on Information Sciences and Systems, CISS 2017

Other

Other51st Annual Conference on Information Sciences and Systems, CISS 2017
Country/TerritoryUnited States
CityBaltimore
Period3/22/173/24/17

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Information Systems and Management
  • Computer Networks and Communications
  • Information Systems

Fingerprint

Dive into the research topics of 'Equilibrium strategies for an OFDM network that might be under a jamming attack'. Together they form a unique fingerprint.

Cite this