2021 17th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) 2021
DOI: 10.1109/wimob52687.2021.9606382
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Jamming and Catching Games over AWGN Channels with Mobile Players

Abstract: We study a wireless jamming problem consisting of the competition between a legitimate receiver and a jammer, as a zero-sum game with the value to maximize/minimize being the channel capacity at the receiver's side. Most of the approaches found in the literature consider the two players to be stationary nodes. Instead, we investigate what happens when they can change location, specifically moving along a linear geometry. We frame this at first as a static game, which can be solved in closed form, and subsequen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 41 publications
(56 reference statements)
0
3
0
Order By: Relevance
“…Envisioned extensions of the present paper include the analysis of an optimized schedule with stateful information [5], also investigating the costs for tracking the eavesdropper and detecting whether data was actually captured. Moreover, a natural follow-up would be to consider the analysis of this adversarial setup from a game theoretic standpoint [30], with an eavesdropper that is able to strategically regulate the data capture probability. Finally, an extension to pervasive data networks, especially for what concerns the scalability of the analysis, is key to bring the present investigation in the context of future generation communication systems [31].…”
Section: Discussionmentioning
confidence: 99%
“…Envisioned extensions of the present paper include the analysis of an optimized schedule with stateful information [5], also investigating the costs for tracking the eavesdropper and detecting whether data was actually captured. Moreover, a natural follow-up would be to consider the analysis of this adversarial setup from a game theoretic standpoint [30], with an eavesdropper that is able to strategically regulate the data capture probability. Finally, an extension to pervasive data networks, especially for what concerns the scalability of the analysis, is key to bring the present investigation in the context of future generation communication systems [31].…”
Section: Discussionmentioning
confidence: 99%
“…In particular, we point out that in our problem, the legitimate transmitter is fully informed that the adversary is present and trying to obstruct the communication, but the countermove to this can only be to peek around the obstruction. Clearly, catching games can also be analyzed (as we did in [18]) but they would be inherently different from the one under analysis here. Another direction out of the scope of the present paper, but certainly possible as a future extension, would be a scenario with incomplete information about the possible but not certain presence of a malicious obstacle, where, beyond finding a good path to the destination, the legitimate transmitter can also be interested in performing adversarial detection as well [37].…”
Section: Game Theoretic Analysismentioning
confidence: 99%
“…First of all, mmWave communications can provide high data rates, but when the positions of the users vary, the channel tends to change significantly, depending on whether a line-of-sight (LoS) exists between the transmitter and the receiver [15]- [17]. At the same time, moving away from a source of noise or changing location to avoid channel fades is a quite natural behavior adopted by real receivers, even those acting without any pretence of optimality [18], [19]; thus, in a game theoretic context, it can be considered as available to a rational player [20]. Finally, we point out that, in mmWave communications, we do not require an advanced adversary to undertake elaborate actions, we can focus on the case where it is merely placing an obstacle to cause blockage to the receiver, which in turn tries to evade it [21].…”
Section: Introductionmentioning
confidence: 99%