TY - GEN
T1 - MAC games for distributed wireless network security with incomplete information of selfish and malicious user types
AU - Sagduyu, Yalin Evren
AU - Berry, Randall
AU - Ephremides, Anthony
PY - 2009
Y1 - 2009
N2 - We consider game theoretic models of wireless medium access control (MAC) in which each transmitter makes individual decisions regarding their power level or transmission probability. This allows for scalable distributed operation; however, it can also enable users to pursue malicious objectives such as jamming other nodes to deny them service. We study games with two types of players: selfish and malicious transmitters. Each type is characterized by a utility function depending on throughput reward and energy cost. Furthermore, we focus on the setting where the transmitters have incomplete information regarding other transmitters' types, modeled as probabilistic beliefs. We first analyze a power-controlled MAC game in which the nodes select powers for continuous transmissions and then extend this to a random access MAC in which nodes choose transmission probabilities. For each case, the Bayesian Nash equilibrium strategies are derived for different degrees of uncertainty, and the resulting equilibrium throughput of selfish nodes is characterized. We identify conditions in which the throughput improves with increasing type uncertainty and introduce Bayesian learning mechanisms to update the type beliefs in repeated games. For unknown types and costs, we also specify the equilibrium cut-off thresholds for monotonic transmission decisions. The analysis provides insights into the optimal defense mechanisms against denial of service attacks at the MAC layer in wireless networks.
AB - We consider game theoretic models of wireless medium access control (MAC) in which each transmitter makes individual decisions regarding their power level or transmission probability. This allows for scalable distributed operation; however, it can also enable users to pursue malicious objectives such as jamming other nodes to deny them service. We study games with two types of players: selfish and malicious transmitters. Each type is characterized by a utility function depending on throughput reward and energy cost. Furthermore, we focus on the setting where the transmitters have incomplete information regarding other transmitters' types, modeled as probabilistic beliefs. We first analyze a power-controlled MAC game in which the nodes select powers for continuous transmissions and then extend this to a random access MAC in which nodes choose transmission probabilities. For each case, the Bayesian Nash equilibrium strategies are derived for different degrees of uncertainty, and the resulting equilibrium throughput of selfish nodes is characterized. We identify conditions in which the throughput improves with increasing type uncertainty and introduce Bayesian learning mechanisms to update the type beliefs in repeated games. For unknown types and costs, we also specify the equilibrium cut-off thresholds for monotonic transmission decisions. The analysis provides insights into the optimal defense mechanisms against denial of service attacks at the MAC layer in wireless networks.
KW - Bayesian games
KW - Distributed operation
KW - Incomplete information
KW - MAC
KW - Malicious users
KW - Power control
KW - Random access
KW - Security
KW - Selfish users
UR - http://www.scopus.com/inward/record.url?scp=70349996116&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70349996116&partnerID=8YFLogxK
U2 - 10.1109/GAMENETS.2009.5137394
DO - 10.1109/GAMENETS.2009.5137394
M3 - Conference contribution
AN - SCOPUS:70349996116
SN - 9781424441778
T3 - Proceedings of the 2009 International Conference on Game Theory for Networks, GameNets '09
SP - 130
EP - 139
BT - Proceedings of the 2009 International Conference on Game Theory for Networks, GameNets '09
T2 - 2009 International Conference on Game Theory for Networks, GameNets '09
Y2 - 13 May 2009 through 15 May 2009
ER -