[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3366486.3366546acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Jamming the Underwater: a Game-Theoretic Analysis of Energy-Depleting Jamming Attacks

Published: 13 February 2020 Publication History

Abstract

Underwater sensor networks can be employed in both military and environmental remote coastal monitoring applications, such as enemy targeting and identification, and tsunami prevention. Jamming can be a serious issue in these networks, typically composed by battery-powered nodes, as an attacker can not only disrupt packet delivery, but also reduce the lifetime of energy-constrained nodes. In this work, we consider a malicious jammer with the dual objective of preventing communication and depleting the battery of a targeted underwater sensor node. The jammed node may use packet-level coding as a countermeasure against the attack, so as to increase its chances of correctly delivering its information to the legitimate receiver. We model this scenario as a multistage game, derive the optimal long-term strategies for both sides, and evaluate how the position of the jammer affects the communication of the legitimate network.

References

[1]
F. Campagnaro, R. Francescon, P. Casari, R. Diamant, and M. Zorzi, "Multimodal underwater networks: Recent advances and a look ahead," in ACM International Conference on Underwater Networks & Systems (WuwNet), Nov. 2017.
[2]
M. Stojanovic, "On the relationship between capacity and distance in an underwater acoustic communication channel," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 11, no. 4, pp. 34--43, Oct. 2007.
[3]
J. Heidemann, M. Stojanovic, and M. Zorzi, "Underwater sensor networks: applications, advances and challenges," Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 370, no. 1958, pp. 158--175, Jan. 2012.
[4]
I. F. Akyildiz, D. Pompili, and T. Melodia, "Underwater acoustic sensor networks: Research challenges," Ad Hoc Networks, vol. 3, pp. 257--279, May 2005.
[5]
J. Kalwa, "The RACUN project: Robust acoustic communications in underwater networks - an overview," in IEEE OCEANS, Jun. 2011.
[6]
C. Lal, R. Petroccia, M. Conti, and J. Alves, "Secure underwater acoustic networks: Current and future research directions," in IEEE UComms), Aug. 2016.
[7]
L. Ma, C. Fan, W. Sun, and G. Qiao, "Comparison of jamming methods for underwater acoustic DSSS communication systems," in IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), Mar. 2018.
[8]
M. C. Domingo, "Securing underwater wireless communication networks," IEEE Wireless Communications, vol. 18, no. 1, pp. 22--28, Feb. 2011.
[9]
M. Brownfield, Y. Gupta, and N. Davis, "Wireless sensor network denial of sleep attack," in IEEE IAW, Jun. 2005.
[10]
L. Chen and J. Leneutre, "Fight jamming with jamming--a game theoretic analysis of jamming attack in wireless networks and defense strategy," Computer Networks, vol. 55, no. 9, pp. 2259--2270, Mar. 2011.
[11]
G. Alnifie and R. Simon, "A multi-channel defense against jamming attacks in wireless sensor networks," in 3rd ACM workshop on QoS and Security for Wireless and Mobile Networks, Oct. 2007.
[12]
R. K. Mallik, R. A. Scholtz, and G. P. Papavassilopoulos, "Analysis of an on-off jamming situation as a dynamic game," IEEE Transactions on Communications, vol. 48, no. 8, pp. 1360--1373, Aug. 2000.
[13]
B. DeBruhl, C. Kroer, A. Datta, T. Sandholm, and P. Tague, "Power napping with loud neighbors: Optimal energy-constrained jamming and anti-jamming," in ACM Conference on Security and Privacy in Wireless & Mobile Networks. ACM, Jul. 2014.
[14]
C. Pielli, F. Chiariotti, N. Laurenti, A. Zanella, and M. Zorzi, "A game-theoretic analysis of energy-depleting jamming attacks," in IEEE International Conference on Computing, Networking and Communications (ICNC), Jan. 2017.
[15]
L. Xiao, D. Jiang, X. Wan, W. Su, and Y. Tang, "Anti-jamming under-water transmission with mobility and learning," IEEE Communications Letters, vol. 22, no. 3, pp. 542--545, Mar. 2018.
[16]
J. Heidemann, W. Ye, J. Wills, A. Syed, and Y. Li, "Research challenges and applications for underwater sensor networking," in IEEE Wireless Communications and Networking Conference (WCNC), vol. 1, Apr. 2006.
[17]
Y. Huang, P. Xiao, S. Zhou, and Z. Shi, "A half-duplex self-protection jamming approach for improving secrecy of block transmissions in underwater acoustic channels," IEEE Sensors Journal, vol. 16, no. 11, pp. 4100--4109, Jun. 2016.
[18]
P. Casari, M. Rossi, and M. Zorzi, "Towards optimal broadcasting policies for HARQ based on fountain codes in underwater networks," in IEEE/IFIP Conference on Wireless on Demand Network Systems and Services (WONS), Jan. 2008, pp. 11--19.
[19]
D. Abreu, "On the theory of infinitely repeated games with discounting," Econometrica: Journal of the Econometric Society, pp. 383--396, Mar. 1988.
[20]
J. Nash, "Non-cooperative games," Annals of Mathematics, vol. 54, no. 2, pp. 286--295, Sep. 1951.
[21]
"Teledyne-benthos acoustic modems," accessed: July. 2019. [Online]. Available: http://www.teledynemarine.com/acoustic-modems/
[22]
C. E. Lemke and J. T. Howson, Jr, "Equilibrium points of bimatrix games," Journal of the Society for Industrial and Applied Mathematics, vol. 12, no. 2, pp. 413--423, Jun. 1964.

Cited By

View all
  • (2021)SecRETACM Transactions on Autonomous and Adaptive Systems10.1145/343139015:1(1-26)Online publication date: 20-Jan-2021
  • (2020)A Game-Theoretic and Experimental Analysis of Energy-Depleting Underwater Jamming AttacksIEEE Internet of Things Journal10.1109/JIOT.2020.29826137:10(9793-9804)Online publication date: Oct-2020
  • (2020)Underwater Jamming Attacks as Incomplete Information GamesIEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)10.1109/INFOCOMWKSHPS50562.2020.9162758(1033-1038)Online publication date: Jul-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
WUWNet '19: Proceedings of the 14th International Conference on Underwater Networks & Systems
October 2019
210 pages
ISBN:9781450377409
DOI:10.1145/3366486
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 February 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Underwater acoustic networks
  2. block code
  3. game theory
  4. jamming
  5. security in underwater networks

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

WUWNET'19

Acceptance Rates

Overall Acceptance Rate 84 of 180 submissions, 47%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)15
  • Downloads (Last 6 weeks)3
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2021)SecRETACM Transactions on Autonomous and Adaptive Systems10.1145/343139015:1(1-26)Online publication date: 20-Jan-2021
  • (2020)A Game-Theoretic and Experimental Analysis of Energy-Depleting Underwater Jamming AttacksIEEE Internet of Things Journal10.1109/JIOT.2020.29826137:10(9793-9804)Online publication date: Oct-2020
  • (2020)Underwater Jamming Attacks as Incomplete Information GamesIEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)10.1109/INFOCOMWKSHPS50562.2020.9162758(1033-1038)Online publication date: Jul-2020
  • (2020)Replay-Attack Countermeasures for Underwater Acoustic NetworksGlobal Oceans 2020: Singapore – U.S. Gulf Coast10.1109/IEEECONF38699.2020.9389259(1-9)Online publication date: 5-Oct-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media