To eavesdrop or jam, that is the question

Andrey Garnaev, Wade Trappe

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Scopus citations


Physical layer secret communication is evaluated by the secrecy rate/capacity, which loosely is the Alice-Bob communication rate minus the Alice-Eve communication rate. Eve’s objective is to reduce the secrecy rate and typically this is accomplished by eavesdropping, but it also can be accomplished by Eve directing interference at Bob, reducing the Alice-Bob channel rate.We examine secret communication from Eve’s perspective, where she can either eavesdrop or jam, but not both simultaneously. There are costs and advantages associated with these two options, and to explore the selection between these two options, we apply a gametheoretical approach. We find the equilibrium strategies for two scenarios: (a) Alice and Eve have to decide the probability for which each can apply On/Off power strategies in choosing between eavesdropping and jamming options, (b) Alice and Eve tune transmission/jamming powers and Eve chooses either a single-level or bi-level mode for interfering with the Alice-Bob communication.We show in the tuned-power scenario that Eve prefers either pure jamming or a mixed strategy over pure eavesdropping. We show the concave dependence of Eve’s payoff on the eavesdropping fading channel gain. Surprisingly, we find that both Eve and Alice- Bob can benefit for a small range of eavesdropping channel gains when Eve switches from pure jamming to a mixed strategy.

Original languageEnglish (US)
Title of host publicationAd Hoc Networks - 5th International ICST Conference ADHOCNETS 2013, Revised Selected Papers
EditorsPaolo Bellavista, Abdelhamid Mellouk, Mostafa Hashem Sherif, Jun Li
PublisherSpringer Verlag
Number of pages16
ISBN (Print)9783319041049
StatePublished - Jan 1 2014
Externally publishedYes
Event5th International ICST Conference on Ad Hoc Networks, ADHOCNETS 2013 - Barcelona, Spain
Duration: Oct 16 2013Oct 18 2013

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
ISSN (Print)1867-8211


Other5th International ICST Conference on Ad Hoc Networks, ADHOCNETS 2013

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'To eavesdrop or jam, that is the question'. Together they form a unique fingerprint.

Cite this