1. Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities
- Author
-
Wade Trappe and Andrey Garnaev
- Subjects
021110 strategic, defence & security studies ,Computer Networks and Communications ,business.industry ,Wireless network ,Computer science ,Bandwidth (signal processing) ,0211 other engineering and technologies ,020206 networking & telecommunications ,Jamming ,02 engineering and technology ,Intrusion detection system ,Adversary ,Computer security ,computer.software_genre ,Computer engineering ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,Radio frequency ,Safety, Risk, Reliability and Quality ,business ,computer - Abstract
Unutilized spectra, i.e., spectrum holes, are opportunities that may be used for communication or adapting other services that use radio frequency (RF). Such opportunities can also represent an adversarial target, if his objective is to block the RF system from using such opportunities opened by spectrum holes. In this paper, we explore the challenge of finding spectrum holes in an adversarial environment. First , by means of a simple model, we show that an adversary’s attack designed to close spectrum holes can be more harmful for the spectrum holes than just random jamming. This calls for designing a scanning strategy to detect such an attack. Second , by applying a game-theoretical model, we design the optimal scanning strategy to detect such attacks. In particular, we show the efficiency of such a scanning strategy compared with uninformed random scanning. This efficiency is achieved by focusing scanning efforts on the bands that will be more likely under attack, and neglecting less promising bands. Beyond the benefits, though, such a strategy has also drawbacks since, if the adversary has a different objective, such as sneaking usage of the spectrum, he can sneak usage undetected by using the bands neglected by such specially tuned scanning. To deal with this problem, third , we suggest to combine this strategy with a strategy that maximizes detection probability in a learning algorithm that updates the beliefs about the adversary’s objective. The convergence of the combined algorithm is proven.
- Published
- 2017
- Full Text
- View/download PDF