Qingsi Wang, Shang-Pin Sheng, Jacob D. Abernethy, M. Liu
{"title":"Jamming defense against a resource-replenishing adversary in multi-channel wireless systems","authors":"Qingsi Wang, Shang-Pin Sheng, Jacob D. Abernethy, M. Liu","doi":"10.1109/WIOPT.2014.6850301","DOIUrl":null,"url":null,"abstract":"We revisit the jamming defense problem in a multi-channel wireless system, using a general formulation of online learning against an adversary via repeated game-playing. We provide the explicit form of the worst-case optimal channel-hopping strategy of a legitimate user in a multi-stage interaction with a resource-replenishing jamming attacker. Interestingly, we show that the worst imaginary enemy can be given as an adversary who behaves in an i.i.d. manner in this multi-stage interaction, and the optimal strategy of the user is determined by the induced random walk of the adversarial behavior. In addition to the jamming defense, our framework is also applicable to other competitive game problems with finite action spaces.","PeriodicalId":381489,"journal":{"name":"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WIOPT.2014.6850301","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
We revisit the jamming defense problem in a multi-channel wireless system, using a general formulation of online learning against an adversary via repeated game-playing. We provide the explicit form of the worst-case optimal channel-hopping strategy of a legitimate user in a multi-stage interaction with a resource-replenishing jamming attacker. Interestingly, we show that the worst imaginary enemy can be given as an adversary who behaves in an i.i.d. manner in this multi-stage interaction, and the optimal strategy of the user is determined by the induced random walk of the adversarial behavior. In addition to the jamming defense, our framework is also applicable to other competitive game problems with finite action spaces.