Jamming Games for Power Controlled Medium Access with Dynamic Traffic

Similar documents
CORRELATED jamming, the situation where the jammer

Resource Allocation Challenges in Future Wireless Networks

Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 24, NO. 2, APRIL Sang-Yoon Chang, Member, IEEE, Yih-ChunHu, Member, IEEE, and Nicola Laurenti

Cognitive Radios Games: Overview and Perspectives

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents

How (Information Theoretically) Optimal Are Distributed Decisions?

Symmetric Decentralized Interference Channels with Noisy Feedback

Transmit Power Allocation for BER Performance Improvement in Multicarrier Systems

Distributed Approaches for Exploiting Multiuser Diversity in Wireless Networks

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach

Pareto Optimization for Uplink NOMA Power Control

MULTICARRIER communication systems are promising

Stability Regions of Two-Way Relaying with Network Coding

Energy-Efficient Power and Rate Control with QoS Constraints: A Game-Theoretic Approach

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

Multi-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction

Multiuser Scheduling and Power Sharing for CDMA Packet Data Systems

Joint Relaying and Network Coding in Wireless Networks

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2

PERFORMANCE OF DISTRIBUTED UTILITY-BASED POWER CONTROL FOR WIRELESS AD HOC NETWORKS

Wireless Multicasting with Channel Uncertainty

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1

Dynamic Subcarrier, Bit and Power Allocation in OFDMA-Based Relay Networks

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks

Multiple Antenna Processing for WiMAX

Deep Learning for Launching and Mitigating Wireless Jamming Attacks

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks

A Game-Theoretic Framework for Interference Avoidance in Ad hoc Networks

Cooperation in Random Access Wireless Networks

DEGRADED broadcast channels were first studied by

Error Performance of Channel Coding in Random-Access Communication

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay

Dynamic Resource Allocation for Efficient Wireless Packet Data Communcations

Spectrum Leasing via Distributed Cooperation in Cognitive Radio

On the Value of Coherent and Coordinated Multi-point Transmission

/13/$ IEEE

Downlink Erlang Capacity of Cellular OFDMA

Compressed Sensing for Multiple Access

Power Controlled Random Access

Relay for Data: An Underwater Race

Adversarial Deep Learning for Cognitive Radio Security: Jamming Attack and Defense Strategies

Power Minimization for Multi-Cell OFDM Networks Using Distributed Non-cooperative Game Approach

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

SC - Single carrier systems One carrier carries data stream

Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna

Transmission Scheduling in Capture-Based Wireless Networks

Degrees of Freedom of the MIMO X Channel

Decentralized Resource Allocation and Effective CSI Signaling in Dense TDD Networks

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory

Throughput-Efficient Dynamic Coalition Formation in Distributed Cognitive Radio Networks

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks

WIRELESS communication channels vary over time

Wireless Network Security Spring 2016

Delay Tolerant Cooperation in the Energy Harvesting Multiple Access Channel

Wireless Network Security Spring 2015

THROUGHPUT AND CHANNEL CAPACITY OF MULTI-HOP VIRTUAL CELLULAR NETWORK

Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints

A Cross-Layer Cooperative Schema for Collision Resolution in Data Networks

TSIN01 Information Networks Lecture 9

Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling

Modeling the Dynamics of Coalition Formation Games for Cooperative Spectrum Sharing in an Interference Channel

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Optimal Power Allocation over Fading Channels with Stringent Delay Constraints

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks

c 2013 Sang-Yoon Chang

Analysis of Bottleneck Delay and Throughput in Wireless Mesh Networks

Information Theory at the Extremes

A Secure Transmission of Cognitive Radio Networks through Markov Chain Model

Feedback via Message Passing in Interference Channels

Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless

Maximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users

REVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY

A Distributed Opportunistic Access Scheme for OFDMA Systems

Regret Minimization-based Robust Game Theoretic Solution for Dynamic Spectrum Access

Spectrum Sharing with Distributed Interference Compensation

A Quality of Service aware Spectrum Decision for Cognitive Radio Networks

IN recent years, there has been great interest in the analysis

A Noncooperative Power Control Game for Multirate CDMA Data Networks

Resource Management in QoS-Aware Wireless Cellular Networks

Channel Capacity Estimation in MIMO Systems Based on Water-Filling Algorithm

Game Theory and MANETs: A Brief Tutorial

Pseudorandom Time-Hopping Anti-Jamming Technique for Mobile Cognitive Users

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying

Transmission Policies for Interference Management in Full-Duplex D2D Communication

Wireless Communication

IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. X, NO. X, XXX Optimal Multiband Transmission Under Hostile Jamming

Lectures 8 & 9. M/G/1 Queues

Energy-Optimized Low-Complexity Control of Power and Rate in Clustered CDMA Sensor Networks with Multirate Constraints

Gradient-based scheduling and resource allocation in OFDMA systems

Coalition Formation of Vehicular Users for Bandwidth Sharing in Vehicle-to-Roadside Communications

Transcription:

Jamming Games for Power Controlled Medium Access with Dynamic Traffic Yalin Evren Sagduyu Intelligent Automation Inc. Rockville, MD 855, USA, and Institute for Systems Research University of Maryland College Park, MD 74, USA Email: yalinsagduyu@ieee.org Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern University Evanston, IL 68, USA Email: rberry@ece.northwestern.edu Anthony Ephremides Department of Electrical and Computer Engineering, and Institute for Systems Research University of Maryland College Park, MD 74, USA Email: etony@umd.edu Abstract Due to the broadcast nature of the wireless medium, wireless networks are highly susceptible to jamming attacks. Such attacks are often studied in a game theoretic framework under the assumption of uninterrupted traffic continuous jamming opportunities. Instead, we analyze the effect of dynamically changing traffic on jamming games for power controlled medium access. Random packet arrivals raise the possibility that the transmitter queues may be empty when jamming attacks start and thus waste the energy of jammers. We consider a noncooperative game in which transmitters and jammers select their transmission power to balance the transmission cost delay and energy constraints. We show that jammers incur a significant performance loss when they do not have knowledge of transmitter queue states. Dynamic traffic increases the immunity to jamming attacks and gives insights into defense mechanisms. Index Terms Jamming; Non-cooperative game; Power control; Medium access control; Queue stability; Energy; Delay. I. INTRODUCTION Wireless networks are inherently based on broadcast transmissions thereby increasing their vulnerability to denial of service attacks via jamming at the medium access control MAC layer. Such jamming problems can be modeled as a non-cooperative game [] [] in which selfish transmitters try to maximize their own performance, while malicious jamming nodes attempt to degrade the system performance. It is typically assumed that the selfish transmitters always have packets available to transmit. However, in most networks, packet traffic will vary dynamically, i.e., transmitters may receive bursty traffic from applications or may receive random traffic to be relayed. With dynamic traffic, a jammer will only be successful when the transmitter queues are not empty. However, in a distributed wireless network, jammers may not have access to the queue state of transmitters, and transmitters may benefit from concealing this information from jammers. In this paper we consider game theoretic models for jamming in wireless networks with dynamic traffic and asses the effect of random traffic on the effectiveness of jamming attacks. R. A. Berry was supported in part by NSF under grant CCF-954. A. Ephremides was supported in part by NSF under grants CCF-954 and CCF-78966, by ONR under grant N4964, and by U.S. Army under MURI grant W9NF-5--46. We assume that transmitters are sending randomly arriving traffic to receivers and jammers attempt to interfere with these transmissions in form of a denial of service attack. We assume a power controlled MAC where nodes select their individual transmission powers. The interactions between transmitters and jammers are modeled as a non-cooperative game. In these games, each transmitter seeks to minimize its average energy cost a target rate constraint, which can be modeled as an upper bound on the average packet delay. On the other hand, each jammer seeks to maximize the average energy costs of transmitters its own average energy constraint. We start by focusing on a single transmitter-jammer pair at one receiver and subsequently generalize the model to arbitrary sets of transmitters and jammers communicating to a single receiver and then to multiple channels and receivers. In the latter cases, we allow a transmitter-jammer pair to choose at which channels and receivers they transmit and interfere. In each case, we compare the performance when jammers know the queue state of transmitters and do not. This performance is measured by evaluating the Nash equilibrium strategies of the resulting games and calculating the maximum feasible throughput of the selfish nodes in stable operation. We show that jammers experience performance loss i.e., the feasible throughput is larger and the average energy cost is smaller for transmitters without knowledge of whether the transmitter queues are empty or not, i.e., traffic uncertainty is beneficial to transmitters in power control games Similar results apply to other MAC models, e.g., random access games where nodes select their transmission probabilities [8].. This phenomenon is similar to the performance loss of jammers under type uncertainty [9], i.e., when nodes do not know whether the opponents are selfish or malicious. In terms of related work, an information-theoretic framework has been considered in [], where a transmitter-jammer pair balances the mutual information as the objective function. The model has been extended as a non-cooperative game to MIMO fading channels [] and to MAC channels with two users in the presence of a jammer [3]. The energy cost has been incorporated into jamming games over multiple Gaussian channels in [4], where the jammer signal is treated as noise,

and the effects of random channels on jamming games have been analyzed in [5]. In addition, power control games have been considered in [6], [7] where transmitters and jammers choose their transmission powers to balance their throughput rewards and energy costs. All this previous work was based on the common assumption of backlogged transmitters. The rest of this paper is organized as follows. Section II introduces the system model for one transmitter-jammer pair at a single receiver. The case without queue state information at the jammer is studied in Section III and it is followed in Section IV by the case where the jammer has access to the transmitter s queue state information. Section V imposes an average packet delay constraint on the equilibrium strategies derived in Sections III-IV, and the feasible rate performance is compared. Then, we extend the analysis to an arbitrary number of transmitters and jammers in Section VI, and we consider the case with multiple channels at different receivers in Section VII. We conclude the paper in Section VIII. II. SINGLE TRANSMITTER-JAMMER PAIR MODEL We start by examining a scenario with one transmitter node and one jammer node. Packets randomly arrive at node and are buffered in a queue until they can be transmitted to a single receiver over a single channel. Node does not have its own traffic and simply wants to jam the transmissions of node. We make two simplifying assumptions: A we assume a synchronous slotted system, in which each packet transmission or jamming attempt takes one time slot, and A we assume that the packet arrivals are independent and identically distributed over time with rate packets per slot. We consider a non-cooperative game in which the two nodes are players. Each player i spreads their signal over a common frequency band with power P i and treats interference as noise. The objectives of node are: i to meet a target minimum rate constraint r, D which could depend on a Quality of Service parameter D, and ii minimize the average energy cost constraint i. The objectives of node are: i to maximize the average transmission cost of node, and ii satisfy an upper bound E on its own average energy cost. Node transmits with power P only if it has a packet in its queue. Node transmits at a constant power P creating interference that is treated as noise by node. We model the resulting service rate using the Shannon rate: µp, P = log + h P h P + N, where h i is the channel gain for user i and N is the noise Both of these limit the ability of the jammer; for example. A precludes the jammer from waiting to detect the start of a transmission before jamming, while A makes it more difficult for the jammer to infer the queue state of the transmitter than, for example, a case where packets arrive in batches. In Section V, we look at a specific model where D corresponds to a packet delay constraint, however the following results hold for any such function for which r, D >, which ensures that when this constraint is satisfied, node s queue is stable. power. 3 The transmission energy cost of node i =, is the power P i, whenever node i transmits. All parameters h i, E i, i =,, and N are fixed and known to each node. III. NO QUEUE STATE INFORMATION AT JAMMER We assume that jammer node does not know whether transmitter node has a packet to transmit, or not. We consider a one-shot game in which the jammer chooses a fixed strategy P for all time. Packets of node are served with rate µp, P given by. The probability that there exists a packet in node s queue is given by the utilization factor µp,p according to Little s result []. Node s average transmission cost is µp P,P. Hence, node s objective in the game is to solve the following optimization problem max u P, P := P µp, P r, D. Node chooses power P to maximize the average energy cost of node its own energy constraint P E, namely solves the following optimization problem max u P, P := P P E. 3 We characterize the outcome of this game by finding the Nash equilibrium strategies Pi of node i =,, which satisfy u i P i, P i u i P i, P i, P i, P i C, i =,, 4 for any strategy P i, i =,, where P i is the strategy of the node other than node i and C is the constraint set given by C = {P i, i =,, µp, P r, D, P E }. 5 At Nash equilibrium, node continuously transmits with the largest possible power P = E that satisfies the average energy constraint. Given a choice of P, node s utility is strictly decreasing in P and so node will select its power P to satisfy µ P, P = r, D. Hence, in this case there is always a unique Nash equilibrium given by P = r,d h E + N, P h = E. 6 The model assumes that the jammer transmits with a fixed power P. If the jammer chooses P randomly, the utility functions need to be formulated as expected payoffs over P. In that case, the jammer seeks to maximize its expected utility E[u P, P ] or to minimize the expected service rate E[µP, P ] of the transmitter, where the expectation is taken over P. Since µp, P is convex in P, E[µP, P ] µp, E[P ] follows from Jensen s inequality. Therefore, the 3 This rate can be approached only under sufficiently long blocks of codes. However, the performance gap of practical codes from the informationtheoretic limits is small for fading channels with sufficiently long coherence times []. We use as the maximum reference rate. The results would extend to other suboptimal rate formulations depending on the Signal-to- Interference-plus-Noise-Ratio given by h P h P +N.

average service rate cannot be reduced by randomizing P and the best strategy for the jammer is to choose a fixed transmission power under the average energy constraint. Next, we introduce an average energy constraint E on node given by r,d P E since it transmits with power P with probability r,d only when its queue is not empty. Then, from 6 the set of node s feasible rates S is S = { : h E r, D r,d h E + N }. 7 If the arrival rate is not feasible, then the transmitter cannot satisfy the target rate and delay constraints, and the Nash equilibrium does not exist for the jamming game. IV. QUEUE STATE INFORMATION AT JAMMER Now we turn to the case, where the jammer node knows whether transmitter node has a packet to transmit, or not. This also includes the special case when the transmitter queue is backlogged. In this case, node can adjust its strategy so as to conserve energy by not transmitting when node does not have a packet. Node transmits with power P only if the queue of node is not empty, which occurs with probability µp,p ; otherwise, node stays idle. Therefore, node now seeks to solve the following optimization problem max P u P, P := µp, P P E. 8 This is accomplished by choosing the largest possible P. Node faces the same objective as in and thus again will choose P to satisfy µp, P = r, D. Hence, the unique Nash equilibrium for this game is given by P = r,d r, D h E + N, 9 h P r, D = E. Given the average energy constraint r,d P E, the set of feasible arrival rates for node is given by { } h E r, D S = : r,d r,d h E + N. The maximum feasible rate in is smaller than the maximum feasible rate in 7, showing that the jamming attack is more effective given the queue state information. The stable rates in 7 and approach each other, as increases to r, D. In this limit, the transmitter queue becomes saturated and so queue state information is of little value. V. JAMMING GAMES UNDER A DELAY CONSTRAINT In this section, we examine a simple model for relating the target rate constraint r, D in the previous games to an average delay constraint D. This provides an example to show how the resulting equilibria may vary depending on such a delay constraint. The service time of node s packets is deterministic and given by µp, P. Then, with Poisson arrivals node s packets can be viewed as waiting in a M/D/ queue. Using the Pollaczek-Khinchin formula [], the average total packet delay T, P, P is given by T, P, P = µp, P µp, P µp, P. Hence, the delay constraint T, P, P D corresponds to the service rate constraint µp, P r, D, where r, D = D + + D +. 3 D The maximum feasible throughput rates 7 and are compared in Figure. The transmitter can significantly improve its maximum feasible throughput if the jammer does not know the transmitter queue state and when the delay constraint is small. However, this rate improvement decreases and the maximum feasible rate for the two cases approach each other, as D increases and the transmitter queue becomes backlogged. A similar behavior is also observed as h decreases such that the jamming effect disappears. Maximum Feasible Rate packets/slot.8.7.6.5.4.3.. without queue information E =, E = with queue information E =, E = without queue information E =, E = with queue information E =, E = without queue information E =, E = with queue information E =, E = 5 5 5 3 35 4 45 5 Delay D slots Fig.. The maximum feasible throughput for h =, h =, and N =.. VI. EXTENSION TO AN ARBITRARY NUMBER OF NODES Next we consider n T nodes transmitting to a single receiver and n J jammer nodes with the objectives of interfering with the packet transmissions. We assume a symmetric system, in which the transmitters and jammers are common average energy costs E T and E J, respectively. The total arrival rate is and it is equally shared by n T transmitters. Each transmitter is the same target rate constraint of r n T, D, which again could depend on a delay parameter D. We focus on characterizing symmetric equilibria, under which all transmitters or jammers chose the same strategy. All transmitters and jammers transmit with powers P T and P J over channels with gains h T and h J, respectively. The service rate of any transmitter queue is given by µp T, P J = log + h T P T P P T, P J, 4

where the total interference and noise power, P, is P P T, P J = h T n T P T + h J n J P J + N. 5 The symmetric equilibrium strategy for any transmitter is PT = r n,d T P P h T, PJ, 6 T and the symmetric equilibrium strategy for any jammer is P J = E J, 7 if jammers do not have the queue state information of the transmitters. Otherwise, jammers transmit with higher power PJ = E J n T r n T, D. 8 Hence, as with the single transmitter-jammer pair model, the transmission power of jammers is increased compared to the case without queue state information. This reduces the maximum feasible rates of the transmitters each with average energy constraint E T, as shown in Figure for n T =. Maximum Feasible Rate packets/slot.5.45.4.35.3.5..5..5 without queue information D = 3 with queue information D = 3 without queue information D = 5 with queue information D = 5 without queue information D = with queue information D = 3 4 5 6 7 8 9 3 4 5 n J : Number of Jammers Fig.. The maximum feasible throughput for E T =, E J =, h T =, h J =, and N =.. VII. JAMMING AT MULTIPLE RECEIVERS We now extend the model in Section II for a single transmitter-jammer pair to one with n receivers with independent channels from transmitter node and jammer node. Node allocates its transmission resources among these n channels and node attempts to jam the transmissions on each channel. Node is limited by an average cost over all channels. This may also model transmissions to a single receiver over multiple sub-carriers as in orthogonal frequency division multiplexing OFDM systems. Node buffers the incoming packets to be transmitted on each channel i {,..., n} in a separate queue with arrival rate i and service rate µ i. The packet traffic is split to the individual channels e.g., with different priorities or Quality of Service requirements such that n i =. We assume that the packets transmitted on channel i are the target service rate r i i, D i. A. Fixed Traffic Rates on Channels First, we assume that the traffic rates { i } n and delay constraints {D i } n are predetermined with the target service rates {r i i, D i } n so that we have i < r i i, D i for each channel i =,..., n. The service rate on channel i is given by µ i P,i, P,i = log + h,ip,i, 9 h,i P,i + N i where P j,i and h j,i are the transmission power and the gain of node j on channel i, respectively, and N i is the noise power on channel i. All these system parameters are fixed and known to both nodes. Node chooses the transmission powers P,i, i =,..., n, to maximize the utility u {P,i, P,i } n = n i µ i P,i, P,i P,i µ i P,i, P,i r i i, D i. Given the equilibrium power P,i of node, node chooses in Nash equilibrium the smallest possible power P,i = h,ip,i +Ni h,i rii,di to satisfy the rate constraint on each channel i with equality, i.e., µp,i, P,i = r i i, D i. If node does not know whether node has a packet to transmit on each channel or not, it maximizes the utility n u {P,i, P,i } n = i µ i P,i, P,i P,i P,i E. If equilibrium strategies P,i and P,i satisfy µp,i, P,i = r i i, D i, average energy is n f i, D i P,i + Ni h,i for node, where f i, D i = r i i,d i h,i i h i, r i i,d i. From, node assigns all available power to one particular channel i to maximize node s average energy: P,i = E for i = arg max f i, D i,,...,n If node knows whenever node has a packet to transmit on each channel, then the utility of node is changed to u {P,i, P,i } n = i µ i P,i, P,i P,i i µ i P,i, P,i P,i E. 3 The jammer assigns all power to a particular channel i : P,i = E r i i, D i i for i = arg max,...,n f i, D i, 4 where f i, D i = r i i,d i h,i h i, such that node s average energy is written as n f i, D i P,i + Ni h,i, In both cases with and without queue state information at the jammer, if i is not unique in and 4, the jammer divides its power arbitrarily among channels i. For P,i given by or 4, node chooses P,i to satisfy the target rate constraint on each channel i with equality.

B. Optimal Traffic Rates on Channels Next, we consider the case in which node further optimizes the channel rates { i } n. Node chooses the transmission powers {P,i } n and channel rates { i} n, where P,i, i and n i =, to maximize the utility u {P,i, i, P,i } n = n i µ P ip,i,p,i,i, where P,i = rii,di h,ip,i+n i h,i, µ i P,i, P,i r i i, D i and i < µ i P,i, P,i. If node does not have the queue state information, it maximizes the utility u {P,i, i, P,i } n = n i r P i i,d i,i n P,i E. In Nash equilibrium, node chooses { i } n to make node indifferent to its strategies {P,i } n. This is realized by choosing the multiplying terms {f i, D i } n of {P,i} n in utility u {P,i, i, P,i } n equal to each other n i =. At Nash equilibrium node chooses {P,i }n such that n P,i = E and the equilibrium strategies { i }n of node minimize its average energy cost n f i, D i P,i + Ni h,i. If the jammer has the queue state information, the energy constraint is changed to n i µ ip,i,p,i P,i E and f i, D i is replaced by f i, D i, as given in Section VII- A. In both cases, node chooses P,i to satisfy µ i P,i, P,i = r i i, D i for the equilibrium strategies P,i and i. For illustration purposes, we consider two receivers. The Nash equilibrium solutions are shown in Figures 3 and 4 for different gains h, of node on channel, where =, E =, h, = h, = h, =, N i =. and D i = D, i =,. The results again show that the jamming attack is less successful, if the packet traffic is random and the jammer does not know node s queue state information. Node assigns higher traffic rate to a channel with larger gain. As the channel gains approach each other, the rate assignments become equivalent and the total transmission power of node decreases. If the queue state information is not available at jammer, the total power of node to sustain the target rate and delay is smaller for all channel gains, and the feasible rate increases, which indicates a performance loss for the jammer. Equilibrium Subchannel Rates for Transmitter.9.8.7.6.5.4.3.. without queue information with queue information without queue information with queue information.5...3.4.5.6.7.8.9 h,: Channel Gain of Transmitter or Subchannel Fig. 3. The equilibrium channel rates of node where D = 5. Total Equilibrium Power of Transmitter 9 8 7 6 5 4 3 without queue information D = 5 with queue information D = 5 without queue information D = with queue information D =.5...3.4.5.6.7.8.9 h, : Channel Gain of Transmitter for Channel Fig. 4. The total equilibrium transmission power of node. VIII. CONCLUSIONS We studied the effects of dynamic traffic on jamming attacks in power controlled MAC. The Nash equilibrium is evaluated for jamming games with delay and energy cost constraints. The results show significant performance loss for jammers i.e., transmitters improve feasible throughput if they do not know the queue state information. Dynamic traffic serves as an example that wireless networks are more immune to jamming attacks under uncertainty. This model should be extended to network layer attacks, where the jammer performance depends on the instantaneous availability of packet flows. REFERENCES [] M. Medard, Capacity of Correlated Jamming Channels, in Proc. Allerton Conf. Communications, Control and Computing, Oct. 997. [] A. Kashyap, T. Basar, and R. Srikant, Correlated Jamming on MIMO Gaussian Fading Channels, IEEE Trans. Inform. Theory, vol. 5, no. 9, pp. 9 3, Sep. 4. [3] S. Shafiee and S. Ulukus, Capacity of Multiple Access Channels with Correlated Jamming, IEEE Trans. Inform. Theory, vol. 55, no., pp. 4598 467, Oct. 9. [4] E. Altman, K. Avratchenkov, and A. Garnaev, A Jamming Game in Wireless Networks with Transmission Cost, Lecture Notes in Computer Science, vol. 4465, pp., 7. [5], Jamming in Wireless Networks under Uncertainty, in Proc. Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks WiOpt, Seoul, Korea, June 9. [6] R. K. Mallik, R. A. Scholtz, and G. P. Papavassilopoulos, Analysis of an OnOff Jamming Situation as a Dynamic Game, IEEE Trans. Commun, vol. 48, no. 8, pp. 36 373, Aug.. [7] Y. E. Sagduyu and A. Ephremides, SINR-based MAC Games for Selfish and Malicious Users, in Proc. Information Theory and Applications Workshop, San Diego, CA, Jan. 7. [8] Y. E. Sagduyu, R. Berry, and A. Ephremides, Wireless Jamming Attacks under Dynamic Traffic Uncertainty, in Proc. Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks WiOpt, Avignon, France,. [9], MAC Games for Distributed Wireless Network Security with Incomplete Information of Selfish and Malicious User Types, in Proc. Intl. Conf. on Game Theory for Networks, Istanbul, Turkey, May 9. [] J. Zander, Jamming in Slotted ALOHA Multihop Packet Radio Networks, IEEE Transactions on Communications, vol. 39, no., pp. 55 53, Oct.99. [] R. Berry and E. Yeh, Cross-layer Wireless Resource Allocation, IEEE Signal Processing Magazine, vol., no. 5, pp. 59 68, Sep. 4. [] D. Bertsekas and R. Gallager, Data Networks. Englewood Cliffs, NJ: Prentice Hall, 99.