Loading…

Defend Jamming Attacks: How to Make Enemies Become Friends

In this paper, we consider a smart jammer that only attacks the channel if it detects activities of legitimate devices on that channel. To cope with smart jamming attacks, we propose an intelligent deception strategy in which the legitimate device will send fake transmissions to lure the jammer. The...

Full description

Saved in:
Bibliographic Details
Main Authors: Dinh, Thai Hoang, Alsheikh, Mohammad Abu, Gong, Shimin, Niyato, Dusit, Han, Zhu, Liang, Ying-Chang
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In this paper, we consider a smart jammer that only attacks the channel if it detects activities of legitimate devices on that channel. To cope with smart jamming attacks, we propose an intelligent deception strategy in which the legitimate device will send fake transmissions to lure the jammer. Then, if the jammer launches attacks to the channel, the legitimate device can either backscatter the jamming signals to transmit data or harvest energy from the jamming signals for future active transmission. In this way, we can not only undermine the attack ability of the jammer, but also leverage jamming attacks as means to enhance system performance. In addition, to find an optimal defense strategy for the legitimate device under uncertainty of wireless environment as well as incomplete information from the jammer, we develop Q-learning and deep Q-learning algorithms based on the Markov decision process. Through simulation results, we demonstrate that our proposed solution is able to not only deal with smart jamming attacks, but also successfully leverage jamming attacks to improve the system performance.
ISSN:2576-6813
DOI:10.1109/GLOBECOM38437.2019.9014094