Sunteți pe pagina 1din 13

IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 15, NO.

9, SEPTEMBER 2016 2247

Joint Adaptation of Frequency Hopping


and Transmission Rate for Anti-Jamming
Wireless Systems
Manjesh K. Hanawal, Mohammad J. Abdel-Rahman, Member, IEEE, and Marwan Krunz, Fellow, IEEE

Abstract—Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and transmission rate
adaptation (RA) have been separately used to mitigate jamming. When RA is used alone, it has been shown that a jammer who
randomizes its power levels can force the transmitter to always operate at the lowest rate, by maintaining the average jamming power
above a certain threshold. On the other hand, when only FH is used, a high throughput overhead is incurred due to frequent channel
switching. In this paper, we propose to mitigate jamming by jointly optimizing the FH and RA techniques. This way, the transmitter can
escape the jammer by changing its channel, adjusting its rate, or both. We consider a power-constrained “reactive-sweep” jammer
who aims at degrading the throughput of the wireless link. The jammer sweeps through the set of channels, jamming a subset of them
at a time, using the optimal jamming power. We model the interactions between the legitimate transmitter and jammer as a constrained
zero-sum Markov game. The transmitter’s optimal defense strategy is derived by obtaining the equilibria of the constrained Markov
game. This policy informs the transmitter when to hop to another channel and when to stay on the current channel. Furthermore, it
gives the best transmission rate to use in both cases (hop or stay). The structure of the transmitter’s optimal policy is shown to be
threshold type, whereby the transmitter stays on the same channel up to a certain number of time slots after which it hops.
We analyze the “constrained Nash equilibrium” of the Markov game and show that the equilibrium defense strategy of the transmitter
is deterministic. Numerical investigations show that the new scheme improves the average throughput and provides better
jamming resiliency.

Index Terms—Dynamic frequency hopping, jamming, Markov decision processes, Markov games, rate adaptation

1 INTRODUCTION

T HE broadcast nature of wireless communications leaves


them vulnerable to various security threats, including
jamming attacks. Adversaries can use readily available off-
channel reactive jammer that can listen to various channels
and react accordingly. We assume packetized transmis-
sions in which each data packet is explicitly acknowledged
the-shelf commercial products to launch stealth jamming by the receiver (many wireless communication systems,
attacks [1], [2], [3]. In such attacks, an adversary injects inter- such as Wi-Fi, 4G, and LTE are packet-switched). The strat-
fering power into the wireless medium, hindering legitimate egy adopted by the jammer to detect link activity depends
transmissions in one of two ways: (i) the jamming power can on whether the jammer is in the range of the transmitter
degrade the signal-to-interference-plus-noise ratio (SINR) at and/or receiver.1 If the jammer is in the transmitter’s range,
a legitimate receiver, or (ii) in carrier-sensing networks, con- it learns about the link activity by listening to the channels
tinuous jamming may prevent the legitimate transmitter at the beginning of each time slot. On the other hand, if the
from accessing the medium, creating a DOS attack. In this jammer can listen only to the receiver, then it learns about
paper, we are concerned with the first type of attacks. the link activity by listening to the feedback messages from
Several jamming behaviors have been studied in the lit- the receiver. In this paper, we primarily focus on the latter
erature, including random, constant, proactive, and reac- case, which arises in several scenarios, e.g., when the jam-
tive jamming (see, for example, [2], [4] and the references mer is hidden from the transmitter but not the receiver, or
therein). In this paper, we consider a time-slotted multi- when the transmitter prevents the jammer from listening to
it by using beam-forming techniques. In particular, we con-
sider a “reactive-sweep” jammer that attacks the legitimate
 M.K. Hanawal is with the Department of Industrial Engineering and
Operations Research, Indian Institute of Technology, Bombay, India. receiver by jamming several channels in each time slot.
E-mail: manjesh.k@gmail.com. Unlike a typical sweep jammer, which continuously sweeps
 M.J. Abdel-Rahman is with the Department of Electrical and Computer through channels irrespective of the previous jamming out-
Engineering, Virginia Polytechnic Institute and State University,
Blacksburg, VA 24061. E-mail: mo7ammad@vt.edu.
comes, the considered reactive-sweep jammer changes its
 M. Krunz is with the Department of Electrical and Computer Engineering, sweep strategy based on its listening outcome at the end of
University of Arizona, Tucson, AZ 85721. each slot. If link activity is detected on a given channel, the
E-mail: krunz@email.arizona.edu. jammer switches from a multi-channel attack (where it dis-
Manuscript received 24 Dec. 2014; revised 10 July 2015; accepted 12 Sept. tributes its power among m channels) to a single-channel
2015. Date of publication 19 Oct. 2015; date of current version 2 Aug. 2016.
For information on obtaining reprints of this article, please send e-mail to:
reprints@ieee.org, and reference the Digital Object Identifier below. 1. The terms ‘transmitter/receiver’ are used to denote the nodes that
Digital Object Identifier no. 10.1109/TMC.2015.2492556 transmit/receive the data packets.
1536-1233 ß 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
2248 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 15, NO. 9, SEPTEMBER 2016

attack during the subsequent slot (where the jammer con- adjusts its jamming power level while satisfying an
centrates its power on one channel). If the transmitter hops average jamming power constraint.
away from the jammed channel, the jammer resorts back to  The optimal defense strategy of the transmitter is
its multi-channel jamming strategy. Although transmitting derived by obtaining the equilibria of the con-
continuously at the maximum power enables the jammer strained Markov game, and the structure of the opti-
to cause the maximum harm, this happens at the cost of mal policy is shown to be threshold type.
high energy consumption and, more importantly, a high Specifically, it is “optimal” for the transmitter to stay
likelihood of being detected. Hence, in this work, we on a channel up to a maximum number of time slots
assume a power-constrained jamming model. More details after which it needs to hop. We analyze the
of this model will be given in Section 3.2. “constrained Nash equilibrium (NE)” of the Markov
Frequency hopping (FH) [5], [6] and rate adaptation game and show that the equilibrium defense strategy
(RA) [7], [8] are commonly used techniques to mitigate jam- of the transmitter is deterministic.
ming. However, these techniques are shown to be ineffective  We compare the average throughput and success
when applied separately [9], [10], [11]. In the case of RA with rate (percentage of unjammed transmissions) under
no FH, it was shown in [9] that by randomizing its power the proposed technique with a game-theoretic
levels while maintaining the average jamming power above dynamic FH design (with no RA). Through numeri-
a certain threshold, the jammer can force the transmitter cal investigations, we show that the new scheme sig-
to always operate at the lowest rate. Experiments on nificantly improves the average throughput and
IEEE 802.11 networks with different RA schemes (e.g., jamming resiliency, especially when the number of
SampleRate [12], AMRR [13]) also confirm this observation. channels is small and/or the hopping cost is high.
On the other hand, it was shown in [10], [11] that FH is inade- For instance, when the number of channels is
quate in coping with jamming attacks on 802.11 networks. In between 3 and 6: (i) the throughput gain achieved by
particular, when the number of channels is small and chan- the new scheme ranges from  15 to  1.37, and
nels are not perfectly orthogonal, the jammer can degrade (ii) the improvement in the success rate varies from
the average link throughput significantly [10], [11]. Many  1.7 to  1.13.
wireless systems (e.g., IEEE 802.11) are equipped with both Paper organization—The rest of the paper is organized as
FH and RA capabilities, but these capabilities are not used in follows. We discuss the related work in Section 2. The chan-
an integrated fashion against jamming attacks. Our aim in nel, link, and jamming models are presented in Section 3. In
this paper is to study the effectiveness of a jointly optimized Section 4, we use a zero-sum Markov game to study the
RA and FH technique to mitigate jamming. interactions between the transmitter and jammer. Using this
One aspect of FH that has been largely overlooked is that game, we derive the optimal defense strategies in Section 5.
it results in a throughput reduction due to channel switch- Our numerical experiments are presented in Section 6.
ing [14] (i.e., “settling time” that is needed when switching Finally, in Section 7 we conclude the paper and provide
between channels). This loss depends on the specific imple- directions for future research.
mentation. If the hopping rate is too high, a significant
throughput loss will be incurred. On the other hand, operat-
ing on the same channel for a longer period increases the
2 RELATED WORK
risk of being hit by the sweep jammer. In adapting its trans- In this section, we briefly review existing works on anti-jam-
mission rate, the transmitter faces a similar dilemma. A ming FH and RA techniques. As explained before, current
high rate increases the jammer’s chances of corrupting the techniques in the literature employ either FH or RA to miti-
packet. On the other hand, a lower rate increases the signal’s gate jamming, but not both.
robustness to jamming, but reduces the throughput. We FH-based anti-jamming schemes—Several FH schemes have
seek to derive a jointly optimal FH and RA policy for the been proposed in the literature to mitigate jamming. In [1]
transmitter against a reactive-sweep jammer. This policy and [5], two reactive FH schemes were proposed. In these
informs the transmitter when to switch (hop) to another schemes, the legitimate transmitter and receiver hop to a
channel and when to continue (stay) on the current channel. new channel once they determine that the current channel
It also determines the best transmission rate to use in both is jammed. A proactive anti-jamming FH scheme was pro-
cases (hop or stay). By optimizing the hop and stay deci- posed in [6], in which the transmitter and receiver proac-
sions taken by the transmitter, we minimize the hop/ tively hop between channels without attempting to verify
switching rate of the transmitter’s channel. Hence, the the status of the channels hopped from/to. Compared to a
throughput loss incurred due to channel switching is mini- proactive approach, reactive FH minimizes the hopping
mized and the throughput is maximized. rate. However, in proactive FH, the legitimate transmitter
Main contributions—The main contributions of the paper and receiver do not need to detect the presence of a jammer.
are as follows: The problem of anti-jamming FH without pre-shared keys
was studied in [15]. The authors in [15] proposed an uncoor-
 We model the interactions between a legitimate dinated FH (UFH) scheme, in which the transmitter and
transmitter and a power-constrained reactive-sweep receiver perform random FH. Other UFH schemes were
jammer as a constrained zero-sum Markov game. proposed in [16], [17]. The efficiency of UFH-based commu-
The transmitter dynamically decides when to switch nication was studied in [18]. In [19], coordinated and unco-
the operating channel and what transmission rate to ordinated FH schemes were proposed for timely delivery of
use. On the other hand, the jammer dynamically short warning messages in sensor networks. Recently,
HANAWAL ET AL.: JOINT ADAPTATION OF FREQUENCY HOPPING AND TRANSMISSION RATE FOR ANTI-JAMMING WIRELESS SYSTEMS 2249

Fig. 2. Rate versus SINR relationship for data packets.

close to the ground station can overhear the downlink feed-


back messages from the satellite. However, because of the
directionality of the uplink transmission, the jammer cannot
overhear the uplink transmissions from the ground station
to the satellite. The scenario in Fig. 1 also occurs when the
jammer is hidden from the transmitter but not the receiver.
This scenario is commonly referred to as ‘hidden terminal
problem’ in 802.11 systems [33].
Fig. 1. Transmission model. The jammer (Jx) is within the transmission
range of the receiver (Rx) but not the transmitter (Tx). Tx, Rx, and Jx 3.1 Transmission Model
follow a time-slotted FH communication system.
We consider a packet-based time-slotted system. During a
following a game-theoretic framework, the authors in [20] time slot, the parameters for the transmitter (Tx) and jam-
used FH for jamming mitigation in cognitive radio net- mer (Jx) are assumed to remain unchanged. The Tx and
works. In [21], the authors developed a combinatorial receiver (Rx) are each equipped with a single radio, and can
game-theoretic framework for anti-jamming rendezvous in communicate on any one of K available channels in a given
dynamic spectrum access networks. FH was shown to be slot. Let F ¼ ff1 ; f2 ; . . . ; fK g denote the set of non-overlap-
largely inadequate in coping with jamming attacks in IEEE ping channels. We assume that the Tx supports M þ 1
802.11 WLANs [10], [11]. different transmission rates R ¼ fR0 ; R1 ; . . . ; RM g, where
RA-based anti-jamming schemes–Several algorithms were R0 < R1 <    < RM . These rates are obtained through
proposed for RA [22], [23], [24], [25], [26], [27], [28], [29]. RA different combinations of modulation and coding schemes.
for the IEEE 802.11 protocol was investigated in [7], [30], In addition to jamming, channel may also experience addi-
[31]. Experimental and theoretical analysis of optimal jam- tive white Gaussian noise with variance s 2 , which is
ming strategies against commonly deployed RA schemes in assumed to be the same across all channels. On each chan-
IEEE 802.11 WLANs indicate that the performance can be nel, the rate that can be achieved by the Tx depends on the
significantly degraded with very few interfering pulses [9]. received SINR. On a given channel, let the received power
To mitigate such interference, the authors in [32] proposed from the Tx be PR , and let PJ be the jamming power emitted
RA and power control schemes. However, the performance by Jx. The received jamming power at the Rx will be attenu-
of their schemes has not been studied under jamming. The ated by a factor a; 0  a  1. Then, the SINR at the Rx,
authors in [7] studied the ability of RA and power control in denoted by h, is given by:
mitigating jamming. Following a game-theoretic frame-
work, it was shown in [9] that if only RA is used to mitigate PR
h¼ : (1)
jamming, then the jammer can force the transmitter to aPJ þ s 2
always operate at the lowest rate by merely randomizing its
power levels, provided that the average jamming power is Since the main focus in this work is to study the effect of
above a given threshold. The results in [9] corroborate our jamming, the above channel model is sufficient to capture
claim that RA on a single channel is not effective, and moti- the interactions between the Jx and the Tx even though it
vates the need for jointly considering RA and FH. ignores the effect of channel attenuation. Similar channel
model is used in [9], [34] where transmission failures are
primarily due to jamming.
3 TRANSMISSION AND JAMMING MODELS For a given received SINR, only certain rates can be
We consider a legitimate transmitter that communicates decoded at the Rx. The relationship between the
with its receiver in the presence of a jammer, as shown in “achievable” rates (i.e., rate of a decodable packet) and the
Fig. 1. The jammer can overhear the receiver’s feedback SINR is shown in Fig. 2. For i ¼ 1; . . . ; M, when g i1 
messages (e.g., ACKs, NACKs), but not the transmitter’s h < g i , only rates R0 ; R1 ; . . . ; Ri1 can be decoded at the Rx.
messages. This scenario arises in numerous wireless sys- We assume that the packets are sufficiently long and if the
tems, including uplink satellite communications (i.e., Tx sends a packet at rate Ri or higher but the received SINR
ground station to satellite). The footprint of the satellite is less than g i , the transmitted packet will be completely
beam on Earth is typically large. Therefore, a jammer who is lost. We also assume the availability of a feedback
2250 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 15, NO. 9, SEPTEMBER 2016

As in [9], we assume a power-limited jamming model


(recall that only RA was considered in [9]). In each time slot,
Jx can emit on each of the m channels a maximum power of
Pmax . The Jx also has a constraint Pavg on its time-average
power, where Pavg < Pmax . In each time slot, the Jx can

choose from M þ 1 discrete power levels PJ0 ; PJ1 ; . . . ;
PJM g. We assume that the Jx emits the same power level on
def
all m channels. Let M ¼ f0; 1; . . . ; Mg. PJi is given by:

PR
g Mi  s2
PJi ¼ ; i 2 M: (2)
a

PJi ; i 2 M, is calculated by setting h in (1) to g Mi in


Fig. 2 and finding the corresponding PJ in (1). Similar to [9],
under an average-power constraint, the attack strategy is to
choose a distribution on the set of available powers that sat-
Fig. 3. Example of a typical sweep Jx (K ¼ 9 and m ¼ 3). Three sweep isfies the average-power constraint. Let PJ be the vector that
cycles are shown.
contains the Jx’s set of pure strategies. Let Js denote the
strategy space of the Jx and Y be an ðM þ 1Þ-probability
mechanism from Rx to Tx. If the transmission is successful, simplex. Then, Js  Y and is given by:
the Rx sends an ACK message to the Tx. On the other hand, ( )
if transmission fails, the Rx sends a negative ACK (NACK) X
M

to the Tx. The ACK/NACK messages can be overheard by Js ¼ y ¼ ðy0 ; y1 ; . . . ; yM Þ; yi ¼ 1; yPTJ  Pavg : (3)
i¼0
the Jx, but we assume they cannot be jammed because of the
Tx-Jx distance and the fact that feedback messages are often
sent at the lowest transmission rate. Switching and jamming costs—When hopping from one
channel to another, the Tx needs to remain idle for a brief
3.2 Jamming Model period, called the settling time. The duration of this time
We consider a time-slotted multi-channel reactive-sweep Jx. period depends on the device (e.g., for the Anthros chipset
The Jx sweeps through the K channels, jamming m channels card, this time is about 7.6 ms [6]). The settling time is
at a time, where m  K (fixed). A typical sweep Jx is required to reconfigure the device on the new channel.
depicted in Fig. 3 with K ¼ 9 and m ¼ 3 (hence the length Additional loss in throughput occurs due to the lack of syn-
of the sweep cycle is K=m ¼ 3). Consider the first sweep chronization between the Tx and Rx’s hopping instances.
cycle. The Jx attacks channels f1 ; f6 , and f7 in the first slot, Collectively, we denote the average loss in throughput due
f2 ; f4 , and f9 in the second slot, and f3 ; f5 , and f8 in the third to hopping by C, and refer to it as hopping cost. Outage peri-
slot. Note that in each slot, the Jx selects three channels that ods also occur when the Tx is jammed. Jamming disrupts
have not been jammed since the start of the current sweep the link between the Tx and the Rx, which needs to be re-
cycle. A randomly generated sweep pattern is selected at established through exchanging several control packets that
the start of each new sweep cycle, as can be seen from the do not contribute to data throughput. We denote the aver-
second and third sweep cycles in Fig. 3. age loss in throughput due to jamming by L, and refer to it
To implement a reactive-sweep jammer, we modify the as jamming cost. We account for C and L in deriving the opti-
classic sweep jamming model as follows. After injecting its mal defense policy of the Tx.
interference power into the channel, the Jx listens to ACK/ We assume that the Tx has some prior belief about the
NACK messages over the attacked channels. Detecting an Pavg of the jammer. The Tx used this belief to compute its
ACK means that the Jx is on the same channel as the Tx-Rx optimal defense strategy. If the Tx does not have any infor-
pair but its jamming power was not sufficient to prevent mation about Pavg , it can set Pavg ¼ Pmax . In this case, the
data reception. If the Jx detects a NACK, then the legitimate Tx’s policy will be pessimistic.
transmission was successfully jammed. If no messages were
detected by the Jx, this means the Tx-Rx have been tuned to 4 DYNAMIC FH GAME WITH RA
a different channel than the Jx’s channel. Based on this out- In this section, we develop a repeated game model between
come, the Jx decides to either: (i) continue sweeping accord- the reactive-sweep Jx and the Tx. Using this model, we
ing to the current sweep pattern, (ii) stop sweeping and derive the optimal attack (defense) strategy of the Jx (Tx).
focus on one channel, or (iii) restart the sweep cycle using a We first discuss the attack (defense) strategies that can be
new random sweep pattern. The details of the Jx sweeping adopted by the Jx (Tx). As noted in [20], these attack and
strategy will be explained in Section 4.1. When the reactive- defense strategies mimic an arms race. If the Jx improves its
sweep Jx decides to stop sweeping, the jamming attack attack strategy, the Tx counters that with an improved
changes from a multi-channel attack (in which the Jx distrib- defense strategy, and vice versa. The strategies adopted by
utes its power among m channels) to a single-channel attack each player also depend on hardware and computational
(in which the Jx emits all of its power on a single channel). resources. Below we discuss the attack and defense
HANAWAL ET AL.: JOINT ADAPTATION OF FREQUENCY HOPPING AND TRANSMISSION RATE FOR ANTI-JAMMING WIRELESS SYSTEMS 2251

strategies, considering the jamming and transmission mod-


els of Section 3.

4.1 Attack and Defense Strategies


During any time slot, the Jx emits its jamming power and
then listens for an ACK/NACK message at the end of the
slot. If the Jx overhears an ACK/NACK on one of the m
jammed channels, it concludes that the Tx is on that chan-
nel.2 If K ¼ 1, the only way for the Tx to escape from the Jx
is to adapt its rate. In this case, it is shown in [9] that by ran-
domizing its power levels, the Jx can enforce the Tx to use
the lowest rate. Therefore, when K > 1, it is better for the
Tx to hop to another channel and avoid having to reduce its
rate. Knowing this, the Jx may also decide to hop between
channels in search of the Tx.
In [20], a few rounds of arms race have been discussed. It
is argued that the best strategy for the Jx is to sweep through
all the K channels sequentially, jamming m channels in each Fig. 4. Illustration of reactive-sweep Jx in a single slot.
slot, and to restart a new sweep cycle with a randomly
selected sweep pattern. In our model, we allow the Jx to fur-
4.2 Frequency Hopping Strategies
ther aggravate its attack strategy by making use of its listen-
The hopping pattern of the reactive-sweep Jx can be
ing capability. Specifically, when Jx overhears either an
described as follows. The Jx sweeps through the K channels
ACK or a NACK on a channel, it learns that the Tx is operat-
sequentially, jamming m non-overlapping channels in each
ing on that channel. Accordingly, the Jx attacks the detected
slot. At the end of each slot, the Jx will take one of the fol-
channel, allocating all of its power to that channel until the
lowing actions based on what it overheard. First, if no
Tx leaves the channel. Unlike the Jx, the Tx does not always
ACK/NACK is overheard, Jx continues to jam the next m
learn the presence of the Jx based on the ACK/NACK mes-
channels in the sweep cycle (we refer to this action as
sages. If a NACK is received, the Tx learns the Jx’s presence
‘continue’). If an ACK is overheard on a particular channel,
on the channel. However, if an ACK is received, the Tx does Jx continues to jam only that channel in the next slot, chang-
not have this information.3 Therefore, when a NACK is ing its attack from a multi-channel attack to a single-channel
received, it is better for the Tx to hop to a new channel; attack (we refer to this action as ‘engage’ since the Jx stops
because otherwise it will be jammed again in the subse- sweeping and keeps attacking the current channel). Finally,
quent slot. Being aware of this, the Jx will also leave the if a NACK is overheard or the sweep cycle ends, a new ran-
channel after receiving a NACK and will start a new sweep dom cycle is restarted immediately (we call this action as
cycle with a randomly generated sweep pattern.4 When the ‘restart’). The various actions of the reactive-sweep Jx are
Jx receives an ACK, it continues to stay on the same channel illustrated in Fig. 4.
until it either receives a NACK or hears nothing. If the Jx For the Tx, we assume that it does not have any means to
does not hear any feedback messages, it continues with the know the quality of various channels and it does not assign
current sweep cycle. We refer to the Jx that adopts the priority to any channel. The Tx-Rx pair follows a common
channel hopping strategy derived in the last round of the FH pattern, generated by a pseudorandom noise (PN)
aforementioned arms race as a reactive-sweep Jx. sequence. We note that our optimization of the Tx’s channel
We consider a jamming game between the Tx and the reac- hopping policy is in terms of how long it stays on a channel
tive-sweep Jx. Although the hopping decisions of the Jx are (in number of slots) before it hops to a new channel.5
fixed, the Jx still needs to decide about the amount of
power to emit in each slot while satisfying its average 4.3 Reward
and maximum power constraints. The Tx’s decision con- Recall that a data transmission at rate Ri is successful only if
sists of what transmission rate to use and also whether to the SINR at the Rx is at least g i . If an ACK is received after
stay on the same channel or to hop to a new channel. We transmitting at rate Ri , the Tx obtains a reward of Ri units.
model the interactions between the Tx and the reactive- In line with [20], we define the Tx payoff in a given slot as
sweep Jx as a zero-sum game and derive the optimal the difference between the reward and the costs it incurs in
attack and defense policies. that slot. Let Un denote the Tx’s payoff in slot n. Then,

2. A NACK is generated when the transmission fails either due to a Un ¼ RðnÞ  L  1½successful jamming  C  1½Tx hops ;
jamming attack or due to a bad channel. We restrict our attention to
transmission failures due to jamming attacks. where RðnÞ 2 R is the transmission rate in slot n and 1½ is
3. The transmission is successful in the presence of the Jx if the Tx
uses a sufficiently low rate that is de-codable at the given jamming the indicator function. An action taken by the Tx in a given
power. slot affects its payoff in future slots. Thus, we will consider
4. In arriving at this strategy space we assumed a pessimistic sce- a total discounted payoff (U)  with a discount factor
nario where Tx always leaves the jammed channel. However, this pessi-
mistic assumption leads to pessimistic Tx’s strategy, and Tx only
benefits if the Jx deviates from its strategy. 5. This duration is referred to as the channel residency time in [6].
2252 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 15, NO. 9, SEPTEMBER 2016

d 2 ð0; 1Þ, which indicates how much the Tx values its future 5.1.3 Immediate Reward
payoff over its current payoff. Formally, Un ¼ Un ðx; a1 ; a2 ; x0 Þ represents the immediate reward the
X Tx receives after going from state x to state x0 when the
U ¼ dn1 Un : (4) actions taken by the Tx and the Jx are a1 2 A and a2 2 PJ ,
n respectively. This reward does not depend on the slot index,
hence we drop the subscript n. For any ða1 ; a2 ; xÞ 2
In the next section, we model the interactions between A  PJ  X, the immediate payoff of the Tx is given by:
the Tx and Jx as a zero-sum Markov game and derive the Uð; a1 ; a2 ; x0 Þ ¼
constrained NE (recall that the Jx is average-power con- 8
> L  C; if x0 ¼ J; a1 ¼ hi ; a2 ¼ PJj ; j > M  i
strained). We also characterize the properties of the optimal >
>
< Ri  C; if x0 ¼ 1; a1 ¼ hi ; a2 ¼ PJj ; j  M  i
policies using Markov decision processes (MDPs).
>
> L; if x0 ¼ J; a1 ¼ si ; a2 ¼ PJj ; j > M  i
>
:
5 ZERO-SUM MARKOV GAME Ri ; if x0 6¼ J; a1 ¼ si ; a2 ¼ PJj ; j  M  i:
A Markov game is characterized by a state space, an action
space, an immediate reward for each player, and transition Note that the Tx’s reward depends only on the action it
probabilities. The decision epochs are taken at the end of takes and the new state it enters, and not on its current state.
each time slot, and the effect of the decision takes place at Since the Jx cannot observe the state of the Tx, it chooses its
the beginning of the next slot. power level such that its average-power constraint is satisfied.

5.1 Game Formulation 5.1.4 Transition Probabilities


In this section, we formulate our zero-sum Markov game. Let P ðx0 jx; a1 ; a2 Þ denote the transition probability to state x0
given that the current state is x, the Tx chooses action
5.1.1 State Space a1 2 A, and the Jx chooses action a2 2 PJ . First, let us con-
The state of the system identifies the status of the Tx. The sider the case where the Tx’s action involves hopping to a
Tx’s status is described by: (i) determining whether the new channel. Let the Tx be on channel f after hopping.
Tx is jammed or not, and (ii) if not, for how many slots When action hi is taken in any state, the state on the new
the Tx has been successful on the current channel. Keep- channel can be either J or 1, 8i 2 M. Let x ¼ J. Then, on tak-
ing track of the channels that the Tx used in the past and ing action hi the system enters state J again only if the Jx also
the residency times of these channels is not helpful to the hops into channel f and uses a power level that does not
Tx. The reason for this is that while the Tx is operating allow the Tx to succeed at rate Ri . Recall that on each success-
on a channel, say f, it does not know which channels the ful jamming the Tx hops to a new channel, and the Jx repeats
Jx is currently sweeping unless it receives a NACK, and if the jamming process with a new sweep pattern that is inde-
the Tx is successful on channel f for k successive slots, it pendent of its past sweep pattern. Then, the Tx and Jx hop to
can only infer that the Jx did not successfully jam channel the same channel with probability m=ðK  1Þ. Hence,
f in the last k slots. P ðJjJ; hi ; PJj Þ ¼ 1  P ð1jJ; hi ; PJj Þ; i 2 M, is given by:
Let X denote the state space. Then, 
m=ðK  1Þ; if j > M  i
   P ðJjJ; hi ; PJj Þ ¼ (7)
K 0; otherwise.
X¼ J; 1; 2; . . . ; ; (5)
m
  Taking action hi ; i 2 M; in state x 2 X n J, say x ¼ x~, the
where J denotes that the Tx is jammed and i ¼ 1; 2; . . . ; K
m Tx’s next state can be either x0 ¼ J or 1. x0 will be equal to 1
denotes that the Tx has been successful on the current chan-
if any of the following happens: (i) channel f is already
nel for the last i consecutive slots.
swept by the Jx, (ii) channel f is not swept by the Jx and the
Jx does not hop to it in the next time slot, or (iii) the Jx hops
5.1.2 Action Space to f and uses a power level that does not disrupt the trans-
At the end of each slot, the Tx decides whether to stay on mission at rate Ri . Let a1 ¼ hi ; a2 ¼ PJj and j > M  i, then
the current channel or hop to a new channel. It also decides the Tx is successful on f if the Jx does not hop into f. Thus,
which rate to use from the set R. Therefore, the set of actions assuming j > M  i
available to the Tx for any state in X is as follows:
P ð1jx; hi ; PJj Þ ¼ 1  P ðJjx; hi ; PJj Þ
A ¼ fðs; R0 Þ; . . . ; ðs; RM Þ; ðh; R0 Þ; . . . ; ðh; RM Þg;
K  1  mx n o
(6)
mx m
¼ þ 1 (8)
where ðs; Ri Þ; i 2 M represents the decision to stay on the K1 K1 K  1  mx
current channel and use rate Ri , and ðh; Ri Þ represents the ¼ 1  m=ðK  1Þ:
decision to hop to a new channel and use rate Ri . For nota- Therefore,
def def
tional convenience, we write si ¼ ðs; Ri Þ and hi ¼ ðh; Ri Þ; 
8i 2 M. From the discussion in Section 5.2, the Tx takes 1  m=ðK  1Þ; if j > M  i
P ð1jx; hi ; PJj Þ ¼ (9)
actions fðh; R0 Þ; . . . ; ðh; RM Þg once it is in state J. In all other 1; otherwise.
states, it can take any action in A.
HANAWAL ET AL.: JOINT ADAPTATION OF FREQUENCY HOPPING AND TRANSMISSION RATE FOR ANTI-JAMMING WIRELESS SYSTEMS 2253

Now consider the case where the Tx decides to stay on its The Tx’s objective is to choose a policy f that results in
current channel. Suppose that the Tx is on channel f and the highest expected reward starting from any state x 2 X,
state x 2 X n J, say x ¼ x~, and takes action si ; i 2 M. Then, and is defined as:
the Tx enters into state x0 ¼ J or x0 ¼ x~ þ 1. x0 will be equal VT ðx; yÞ ¼ max V~ðx; f; yÞ: (13)
to J in one of two cases. First, if the Jx did not sweep f in f2Fs
the last x~ slots, hops into f in the next slot, and jams at a
In contrast, the Jx’s objective is to choose a strategy y that
power that does not allow decoding at rate Ri . Second, if
minimizes the Tx’s expected discounted payoff
the Jx is already on f and jams at a power that does not
allow decoding at rate Ri . The probability of the first case VJ ðx; fÞ ¼ min V~ðx; f; yÞ: (14)
y2Js
can be computed as m=ðK  m~ xÞ and the probability of the
second case is m~ x=K. Note that if the jamming power is PJj Note that the strategy space of the Jx is constrained,
in the first case, then it is mPJj in the second case (i.e., sin- whereas the Tx can choose any stationary policy. A strategy
def PR pair ðf
; y
Þ is constrained NE if the following two condi-
gle-channel attack). Let gðj; mÞ ¼ amPJj þs 2
. Then,
tions are satisfied:

P ðJjx; si ; PJj Þ ¼ 1  P ðx þ 1jx; si ; PJj Þ  y


2 Js .
8 mðxþ1Þ  8x 2 X; f 2 Fs , and y 2 Js ,
>
< K ; if x < K=m and j > M  i (10)
¼ mx ; if x < K=m and gðj; mÞ < g i V~ðx; f; y
Þ  V~ðx; f
; y
Þ  V~ðx; f
; yÞ: (15)
>
:K
0; otherwise. def
Let V
ðxÞ ¼ V~ðx; f
; y
Þ. Then, fV
ðxÞ; x 2 Xg is referred
to as the value of the zero-sum game.6
Next, we introduce the required notations to define the
Tx and Jx strategies and their objective functions, following Theorem 1. The zero-sum game has a stationary constrained NE.
the notational convention of [35]. In each time slot, the Tx Proof. While the Jx aims to minimize the Tx’s payoff, it
takes an action that depends on its past observation. We needs also to meet its average-power constraint. Since
will only consider Markov stationary policies, where the Tx the Jx does not know the value of the current state,
takes an action based on its current state only (note that the its average-power constraint for any strategy y (i.e.,
state has information of past history). As stated in [36, Ch.
yPTJ  Pavg ) can be equivalently written as a constraint
4], for any given history-dependent policy, there exists a
on an expected discounted cost, as follows:
Markov policy that is equally good. The set of Markov sta- ( )
tionary policies of the Tx is denoted by Fs . Let MðAÞ denote X
f;y n1
Cb ðf; yÞ ¼ ð1  bÞE b CðXn ; A1n ; A2n Þ
the distribution on set A and f : X ! MðAÞ denote the strat- n (16)
def
egy of the Tx. Let fðxÞ ¼ ffðx; a1 Þ; a1 2 Ag, where fðx; a1 Þ is  Pavg
the probability of choosing action a1 2 A in state x 2 X.
Similarly, let the Jx’s strategy be g : X ! PJ , and let for some b 2 ð0 1Þ. CðXn ; A1n ; A2n Þ denotes the cost for
def the Jx, which is the power it chooses in slot n, i.e.,
gðxÞ ¼ fgðx; a2 Þ; a2 2 PJ g, where gðx; a2 Þ is the probability
Cð; ; A2n Þ ¼ A2n . Further, by choosing a strategy y0 such
of choosing action a2 2 PJ in state x 2 X. Since the Jx does
that y00 ¼ 1, the constraint on the expected discounted
not know the state, for any Jx’s strategy P y ¼ ðy0 ; . . . ;
cost is strictly met. Thus, strong Slater condition in [37] is
yM Þ 2 Js , gðxÞ ¼ y; 8x 2 X. Define Yi ¼ j > Mi yj ; i 2 M,
verified and the existence of stationary constrained NE
i.e., Yi denotes the probability that the Jx chooses a power follows from [37, Theorem 2.1]. u
t
larger than PJi .
Let r : X  A  PJ ! R denote the immediate reward for
5.2 Tx Optimal Defense Strategy
the Tx. For any actions a1 and a2 taken by the Tx and Jx,
respectively, and any state x, rðx; a1 ; a2 Þ is given by: In this section, we study the properties of the Tx’s optimal
defense strategy against a fixed Jx’s strategy. The expected
X reward of the Tx when the Jx’s strategy is y is denoted by
rðx; a1 ; a2 Þ ¼ Uðx; a1 ; a2 ; x0 ÞP ðx0 jx; a1 ; a2 Þ: (11)
ry : X  A ! R. For a given state-action pair ðx; aÞ, ry ðx; aÞ
x0
is given by:
For given f 2 Fs and y 2 Js , the expected discounted pay- X
M

off of the Tx when the initial state is x is: ry ðx; aÞ ¼ yi rðx; a; PJi Þ: (17)
i¼0
( )
X
V~ðx; f; yÞ ¼ Ef;y dn rðXn ; A1n ; A2n Þj X0 ¼ x ; (12) Let Py ðx0 jx; aÞ denote the probability that the Tx enters
n state x0 . Then,
X
M
where fðXn ; A1n ; A2n Þ : n ¼ 1; 2; . . .g is a sequence of ran- Py ðx0 jx; aÞ ¼ yi P ðx0 jx; a; PJi Þ: (18)
dom variables, denoting the state and the actions of the Tx i¼0
and Jx in each slot, respectively. This sequence evolves
according to the policy ðf; yÞ. The operator Ef;y denotes the 6. If ð~f; y
~Þ is another equilibrium, it also results in the same value of
expectation over the process induced by the policies f and y. the game [35, Section 3.1].
2254 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 15, NO. 9, SEPTEMBER 2016

Let fy
ðXÞ denote the policy that maximizes the expected
discounted reward function when the Jx uses strategy y.
Since y does not depend on the state, the optimal policy
fy
ðXÞ can be obtained by solving a single player MDP with
the reward and transition probabilities defined in (17)
and (18), respectively. Then, fy
ðXÞ is a deterministic pol-
icy [36], i.e, fy
: X ! A. For notational convenience, we do
not explicitly indicate this dependency on y, and write
def
V ðxÞ ¼ VT ðx; yÞ.
We use the value iteration method [36, Ch. 6] to derive
the optimal defense strategy and its properties. The well-
known Bellman equations for the expected discounted
utility maximization problem in (13) can be written as
Fig. 5. Example of the Tx optimal policy (K ¼ 6; M ¼ 2, and K
¼ 4).
follows:
X Proof. See Appendix B, available in the online supplemental
def
Qðx; aÞ ¼ ry ðx; aÞ þ d Py ðx0 jx; aÞV ðx0 Þ material. u
t
x0 2X
X
The above proposition says that when the Tx hops to a
¼ Py ðx0 jx; aÞ ry ðx; a; x0 Þ þ dV ðx0 Þ ; (19)
new channel it will stay on this channel until it is either
x0 2X
jammed or it spent K
successive slots on that channel.
V ðxÞ ¼ max Qðx; aÞ: While operating on a given channel, the Tx adapts its trans-
a2A
mission rate—the Tx reduces its rate as the number of suc-
Note that in our formulation, states J and dK=me are cessive successful transmissions increases. When the Tx
equivalent because the Jx will start the sweep cycle afresh hops, it always uses a fixed rate, which is the maximum
and the Tx can only take hop decisions in these states. available rate (RM ) if ry ð0; si Þ is decreasing in the index i.
Hence, when the Tx begins in either state (J or dK=me), it A typical example of the Tx optimal policy is shown in
will get the same total discounted reward, i.e., Fig. 5 for K ¼ 6; M ¼ 2, and K
¼ 4. Once jammed, the Tx
V ðJÞ ¼ V ðdK=meÞ. From (19), for any x ¼ J; 1; . . . ; K  1, hops to channel f1 in the first time slot, and starts communi-
V ðxÞ is expressed in terms of V ðJÞ and V ðx þ 1Þ. Below we cating over f1 using the highest rate, R2 . In the second and
establish the monotonicity of V on the state space X n J by third slots, the Tx stays on f1 , but reduces its rate to R1 . In
restricting the Tx’s reward in state dK=me, and use this the fourth slot, it reduces its rate further to R0 . After K
¼ 4
monotonicity property to establish the structure of the opti- slots, the Tx hops to channel f3 and stays on it for only three
mal policy.7 For ease of exposition, we provide the analysis slots because it gets jammed after that (in slot 8). Then, in
for the case m ¼ 1. Similar analysis follows when m > 1. the ninth slot, the Tx hops again and tunes to channel f2
using the highest rate, and so on.
Lemma 1. V ðÞ is a decreasing function on f1; 2; . . . ; Kg: Note that since the Tx hops once it reaches state K
, it
Proof. See Appendix A, which can be found on the Com- never enters into a state larger than K
. Thus, if K
< K,
puter Society Digital Library at http://doi. the resulting Markov chain is reducible.
ieeecomputersociety.org/10.1109/TMC.2015.2492556. t
u Corollary 1. The threshold K
is decreasing in L, and increasing
in both K and C.
From (7) and (8), we note that when the Tx takes action Proof. The proof follows by noting that for any x0 > x,
hi ; i 2 M, the probability of entering into state J or 1 does Qðx0 ; si Þ  Qðx; si Þ is increasing in L and decreasing in
not depend on the current state. We make use of this obser- K; 8i 2 M. Moreover, Qðx; hi Þ is decreasing in
vation and the monotonicity of the function V ðÞ to derive C; 8i 2 M; x 2 X. This verifies that K
is increasing in C.t
u
the following structure of the optimal policy.
Next, we return to the study of the Markov game.
Proposition 1. The optimal policy f
satisfies:

 There exists constants K


2 f1; . . . ; K  1g and 5.3 Equilibrium of the Markov Game
i
 M such that: In this section, we compute the constrained NE of the zero-
sum Markov game and study its properties. For a given
f
ðxÞ ¼ hi
for K
 x  K  1 and f
ð0Þ ¼ si
: defense strategy y 2 Js , the following linear program solves
the recursive equations in (19) [35, Section 2.3]:
 For any integers x and y, if 1  x < y < K
, 1X
f
ðxÞ ¼ sj , and f
ðyÞ ¼ sk , then j k. minimize V ðxÞ
N x
 If ry ðJ; si Þ is decreasing in the index i, then i
¼ 1. X
subject to : V ðxÞ ry ðx; aÞ þ d Py ðx0 jx; aÞV ðx0 Þ; (20)
x0 2X
7. This assumption is made only to establish the structure of the pol-
icy analytically. Our simulations show that the same property holds in 8x 2 X; a 2 A:
general.
HANAWAL ET AL.: JOINT ADAPTATION OF FREQUENCY HOPPING AND TRANSMISSION RATE FOR ANTI-JAMMING WIRELESS SYSTEMS 2255

From Theorem 1, we know that the zero-sum Markov


game has a constrained NE. We use a nonlinear version of
the above program to compute the equilibria. First, we
establish the required notation. Let RðxÞ ¼ ½rðx; a; pÞ a2A;p2PJ
P
and T ðx; V Þ ¼ ½ x0 P ðx0 jx; a; pÞV ðx0 Þ a2A;p2PJ be the reward
and transition probability matrices, respectively. Consider
the following nonlinear program:

1 Xn o
minimize V1 ðxÞ þ V2 ðxÞ
N x
subject to : V1 ðxÞ1 RðxÞy þ dT ðx; V1 Þy; 8x 2 X
(21)
V2 ðxÞ1 fðxÞRðxÞ þ dfðxÞT ðx; V2 Þ;
Fig. 6. Example illustrating the Tx-Rx rendezvous process.
8x 2 X
PJ yT  Pavg ; 8x 2 X; Pavg . We use the set of rates adopted by IEEE 802.11a [38],
i.e., 6, 9, 12, 18, 24, 36, 48, and 54 Mbps. Unless stated other-
where 1 denotes a vector of all ones of size M when the state
wise, we use the following default parameter values: K ¼ 4,
is J or K, and of size 2M for all other states. L ¼ 25 Mbps, C ¼ 50 Mbps, m ¼ 1, and Pavg =Pmax ¼ 25=30.
Theorem 2. Let ðV1
ðxÞ; V2
ðxÞ; f
ðxÞ; y
Þ denote the minimum The jamming and switching costs are interpreted as
of the nonlinear program (21). Then, ðf
ðxÞ; y
Þ is the optimal throughput loss. Because of this, we represent L and C in
constrained NE of the game. Mbps. We implement our game in MATLAB. The optimal
defense and attack strategies of the Tx and Jx, respectively,
Proof. The nonlinear program (21) is the same as the one are obtained by solving (21). The 95 percent confidence
in [35, Section 3.7] with the additional average-power intervals are shown in all the simulation figures.
constraint on the Jx’s strategy. The proof follows We compare the joint FH and RA scheme with the FH
from [35, Theorem 3.7.2]. u
t scheme proposed in [20]. In [20], the Tx optimally decides
Note that although the optimal strategy of the Tx for a to hop or stay while fixing its transmission rate. We imple-
given Jx’s strategy is deterministic, the equilibrium strategy ment two versions of the FH scheme in [20]: one with a fixed
may not be deterministic. The strategy y
is the same for all transmission rate of 24 Mbps and the other with a fixed rate
x 2 X as the Jx does not know the state. We know from the of 54 Mbps. The FH game in [20] is implemented in MAT-
previous section that the optimal Tx’s strategy against any LAB. The optimal defense and attack strategies of the Tx
given y is deterministic. Therefore, at equilibrium, the strat- and Jx, respectively, are obtained by solving a linear pro-
gram that is similar to (21). The difference is that the action
egy of the Tx is deterministic.
Tx-Rx rendezvous—As explained in the paper, the Tx space of the FH game consists of two actions only: hop and
stay, whereas the action space of the joint FH and RA
dynamically adjusts its FH sequence according to its opti-
scheme consists of 2N actions, as explained earlier. The joint
mal anti-jamming strategy. In this case, how does the Rx
FH and RA scheme is compared with the FH schemes based
know the Tx’s channel in a given slot?
on the average throughput (in Mbps), success rate, and the
Initially, the Tx and Rx share a common PN sequence.
hop rate. Recall that in the RA scheme, the Jx can force the
The Tx follows this PN sequence. However, it optimizes
Tx to always operate at the lowest rate by maintaining the
how many slots to stay in each channel before switching to
average jamming power above a certain threshold.
the next channel in the PN sequence. As stated in Proposi-
tion 1, the optimal policy of the Tx is to stay on each channel
6.1 Effect of the Number of Channels (K)
K
slots as long as it is not jammed. Once jammed, the Tx
Fig. 7 depicts the average throughput versus K. The joint
will switch to a new channel. The Tx optimal policy is also
scheme achieves a significant improvement in the average
shared with the Rx. Therefore, the Rx will follow the com-
throughput compared to the FH schemes. This improvement
mon PN sequence staying on each channel K
slots unless it
reaches  15x when K ¼ 3. The improvement in the average
is jammed, in this case it will switch to the next channel. By
throughput is due to two factors. First, the increase in the
knowing the initial PN sequence and K
, the Rx can induce
success rate, and accordingly the reduction in the jamming
the Tx’s channel in any time slot, based on its jammed slots.
cost, as shown in Fig. 8. Second, a reduction in the hop rate,
The Tx conveys the value of K
to the Rx along with the ini-
hence a reduction in the switching cost, as shown in Fig. 9.
tial PN sequence before start hopping from one channel to
The higher success rate results from the fact that in
another. The Rx can also obtain the value of K
by solving
the joint scheme the Tx can evade the Jx by hopping to a
the zero-sum Markov game between the Tx and Jx. Fig. 6
different channel and/or reducing its transmission rate.
shows an example illustrating the Tx-Rx channel synchroni-
Note from Fig. 8 that the improvement in the success rate is
zation (rendezvous) process.
more significant when K is small, and it decreases with K.
As a result, the improvement in the average throughput
6 PERFORMANCE EVALUATION achieved by the joint scheme reduces as K increases. The
In this section, we study the performance of the joint FH and reason for this is that RA plays a role in jamming avoidance
RA scheme for various system parameters, K, C, L, and only when both the Tx and Jx are on the same channel. As
2256 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 15, NO. 9, SEPTEMBER 2016

Fig. 7. Average throughput versus K. Fig. 10. Average throughput versus C.

Fig. 8. Success rate versus K. Fig. 11. Success rate versus C.

Fig. 9. Hop rate versus K. Fig. 12. Hop rate versus C.

K increases, the likelihood that the two will select the same increase (recall that the success rate of the joint scheme does
channel decreases, hence the gain obtained by the added not improve significantly with K).
RA capability is lower. As K increases, the success rates of
the FH schemes improve significantly, because of the reduc- 6.2 Effect of the Hop Cost (C)
tion in the probability that the Tx and Jx are on the same The effect of C on the average throughput, the success rate,
channel. In contrast, the difference in the success rate of the and the hop rate is studied in Figs. 10, 11, and 12, respec-
joint scheme when K varies from 3 to 9 is not significant. tively. The average throughput of the joint scheme (FH
The reason is that even though the probability that the Tx schemes) is a nonincreasing (decreasing) function in C. We
and Jx are on a common channel increases as K decreases, vary C between 6 Mbps (which is the lowest transmission
the Tx uses its RA capability to evade the Jx and keep its rate) and 78 Mbps (which is close to 1:5 times the maximum
success rate high. transmission rate). The improvement in the average
Expectedly, the hop rate of the joint scheme is smaller throughput achieved by the joint scheme reaches to  22
than that of the FH schemes. In the joint scheme, in order to when C ¼ 75 Mbps. As can be seen from Fig. 10, the
save the hop cost, the Tx tries to evade the Jx by employing improvement in the average throughput achieved by the
RA only (if it can), hence reducing the hop rate as much as joint scheme is more significant when C is sufficiently large.
it can. The hop rates of all schemes reduce as K increases Fig. 12 shows that when C increases, the hop rate of all the
since the likelihood of the Tx and Jx meet on a common schemes decreases. As a result, the success rate of the FH
channel decreases. The reduction in the hop rate of the joint schemes decreases (see Fig. 11). In contrast, when the hop
scheme as K increases causes the average throughput to rate of the joint scheme decreases (due to the increase in C),
HANAWAL ET AL.: JOINT ADAPTATION OF FREQUENCY HOPPING AND TRANSMISSION RATE FOR ANTI-JAMMING WIRELESS SYSTEMS 2257

Fig. 13. Average throughput versus L (C ¼ 50 Mbps). Fig. 16. Average throughput versus Pavg .

Fig. 14. Success rate versus L (C ¼ 50 Mbps). Fig. 17. Success rate versus Pavg .

increases, the hop rate of the FH schemes increases, and as a


result the success rate of the FH schemes increases (see
Figs. 14 and 15). Although the success rate of the FH
schemes improves with L, the average throughput
decreases due to the increase in the hopping cost. In contrast
to the FH schemes, when L increases the hop rate of the
joint scheme decreases. This is due to the large value of C,
which leads the Tx to use its RA capability for jamming mit-
igation instead of hopping (recall from Fig. 12 that the hop
rate decreases with C). As L increases, the Tx tends to use
low rates more often to avoid jamming. As a result, the aver-
age throughput of the joint scheme reduces with L, but the
jamming probability also reduces, which causes the hop
Fig. 15. Hop rate versus L (C ¼ 50 Mbps).
rate to decrease.
the success rate remains the same or increases, as shown in
Fig. 11. This is because of the added RA capability in the 6.4 Effect of the Average Jamming Power (Pavg )
joint scheme. When C is significantly large ( > 75 Mbps in We study the effect of Pavg in Figs. 16, 17, and 18 with
Figs. 10, 11, and 12), the Tx tends to avoid jamming by Pmax ¼ 30. For each of the two FH schemes, there is a thresh-
reducing its transmission rate more often than switching to old on Pavg that depends on the scheme. When Pavg is less
another channel, hence the hop rate reduces, the average than this threshold, the success rate decreases and the
throughput decreases, but the success rate increases. hop rate increases with Pavg . When Pavg exceeds this
When C ¼ 6 Mbps which is significantly smaller than threshold, the success and hop rates become almost unaf-
L ¼ 25 Mbps, the hop rate of all the schemes is 100 percent fected by Pavg . The reason is that for each fixed transmis-
and the maximum average throughput is attained. sion rate there is a corresponding average jamming
power that enables the Jx to successfully jam the Tx when
6.3 Effect of the Jamming Cost (L) they are on the same channel. Increasing the average jam-
Figs. 13, 14, and 15 depict the average throughput, the suc- ming power beyond this threshold does not change the
cess rate, and the hop rate of all the schemes versus L when performance of the FH scheme. A similar behavior is also
C ¼ 50 Mbps. The average throughput of all the schemes observed for the joint scheme.
decreases with L. Indeed, the FH scheme with a rate fixed Note that when Pavg is very small, the Tx can successfully
at 24 Mbps results in zero throughput. When L ¼ 6 Mbps transmit at high rates even when it is on the same channel as
which is significantly smaller than C ¼ 50 Mbps, the hop the Jx. Therefore, the gain achieved by the added RA capabil-
rate of the two FH schemes is  40 percent. When L ity is less significant compared to the case when Pavg is large.
2258 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 15, NO. 9, SEPTEMBER 2016

part by the Army Research Office (grant W911NF-13-1-0302).


Any opinions, findings, conclusions, or recommendations
expressed in this paper are those of the author(s) and do not
necessarily reflect the views of NSF or ARO. Preliminary
results in this paper were presented at the WiOpt Conference,
May 2014 [39].

REFERENCES
[1] W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The feasibility of
launching and detecting jamming attacks in wireless networks,”
in Proc. ACM MobiHoc Conf., Urbana-Champaign, IL, USA, 2005,
pp. 46–57.
[2] S. Khattab, D. Mosse, and R. Melhem, “Jamming mitigation in
Fig. 18. Hop rate versus Pavg . multi-radio wireless networks: Reactive or proactive?” presented
at the ACM SecureComm Conf., Istanbul, Turkey, Sep. 2008.
6.5 Effect of the Number of Jammed [3] R. Gummadi, D. Wetherall, B. Greenstein, and S. Seshan,
Channels per Slot (m) “Understanding and mitigating the impact of RF interference on
802.11 networks,” in Proc. ACM SIGCOMM Conf., Kyoto, Japan,
For a given K, increasing m decreases the length of the 2007, pp. 385–396.
sweep cycle. Increasing m a times is equivalent to decreas- [4] E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B.
ing K a times and keeping m ¼ 1, e.g., K ¼ 8 and m ¼ 4 is Thapa, “On the performance of IEEE 802.11 under jamming,” in
Proc. IEEE INFOCOM Conf., Phoenix, AZ, USA, Apr. 2008,
equivalent to K ¼ 2 and m ¼ 1. Therefore, increasing m has pp. 1939–1947.
the same impact as decreasing K for the case when m ¼ 1. [5] W. Xu, T. Wood, W. Trappe, and Y. Zhang, “Channel surfing and
spatial retreats: Defenses against wireless denial of service,” in Proc.
ACM WiSe Workshop, Philadelphia, PA, USA, Oct. 2004, pp. 80–89.
7 CONCLUSIONS AND FUTURE RESEARCH [6] V. Navda, A. Bohra, S. Ganguly, and D. Rubenstein, “Using channel
In this paper, we analyzed a joint FH and RA defense scheme hopping to increase 802.11 resilience to jamming attacks,” in Proc.
IEEE INFOCOM Conf., Anchorage, AK, USA, 2007, pp. 2526–2530.
against a reactive-sweep Jx. We modeled the interactions [7] K. Pelechrinis, I. Broustis, S. Krishnamurthy, and C. Gkantsidis,
between the Tx and Jx as a zero-sum Markov game, and “ARES: An Anti-jamming reinforcement system for 802.11
derived the optimal equilibrium defense strategy against the networks,” in Proc. ACM CoNEXT Conf., Rome, Italy, 2009,
worst attack strategy. Our numerical results show that the pp. 181–192.
[8] J. Zhang, K. Tan, J. Zhao, H. Wu, and Y. Zhang, “A practical SNR-
new scheme provides significant improvements in the aver- guided rate adaptation,” in Proc. IEEE INFOCOM Conf., Phoenix,
age throughput and jamming resiliency, especially when the AZ, USA, Apr. 2008, pp. 146–150.
number of channels is small and/or the hopping cost is high. [9] K. Firouzbakht, G. Noubir, and M. Salehi, “On the capacity of Rate-
adaptive packetized wireless communication links under jamming,”
For instance, when the number of channels is between 3 and in Proc. ACM WiSec Conf., Tucson, AZ, USA, 2012, pp. 3–14.
6: (i) the throughput gain achieved by the new scheme ranges [10] K. Pelechrinis, C. Koufogiannakis, and S. Krishnamurthy,
from  15 to  1.37, and (ii) the improvement in the suc- “Gaming the jammer: Is frequency hopping effective?” in Proc.
cess rate varies from  1.7 to  1.13. ACM WiOpt Conf., Seoul, Korea, Jun. 2009, pp. 187–196.
[11] K. Pelechrinis, C. Koufogiannakis, and S. V. Krishnamurthy, “On
As a future research, we aim to study the case when the the efficacy of frequency hopping in coping with jamming attacks
Jx can also listen to the Tx’s messages. In this case, the Jx in 802.11 networks,” IEEE Trans. Wireless Commun., vol. 9, no. 10,
can adopt the following strategy. It senses the channel for a pp. 3258–3271, Oct. 2010.
[12] R. T. Morris, J. C. Bicket, and J. C. Bicket, “Bit-rate selection in wire-
short period at the beginning of each time slot and emits less networks,” Master’s thesis, MIT, Cambridge, MA, USA, 2005.
power only if a Tx activity is detected; otherwise, it does not [13] S. Pal, S. R. Kundu, K. Basu, and S. K. Das, “IEEE 802.11 rate con-
emit any power. Because the Jx conserves power by not trol algorithms: Experimentation and performance evaluation in
attacking the Tx in each time slot, it can use all of its power infrastructure mode,” presented at the Passive Active Meas.
Conf., Adelaide, S.A., Australia, 2006.
when it detects the Tx in a slot and cause maximum damage [14] R. Vedantham, S. Kakumanu, S. Lakshmanan, and R. Sivakumar,
(i.e., the Jx emits either no power or emits maximum power “Component based channel assignment in single radio, Multi-
depending on whether it detects Tx activity in a slot). channel ad hoc networks,” in Proc. ACM MobiCom Conf., 2006,
We also plan to analyze the joint FH and RA game when pp. 378–389.
[15] 
M. Strasser, S. Capkun, C. P€ 
opper, and M. Cagalj, “Jamming-resis-
carrier aggregation is enabled (i.e., the Tx can communicate tant key establishment using uncoordinated frequency hopping,”
over multiple channels in each time slot). In this case, in in Proc. IEEE Symp. Security Privacy, 2008, pp. 64–78.
addition to optimally deciding to hop or stay and which [16] D. Slater, P. Tague, R. Poovendran, and B. J. Matt, “A coding-theo-
retic approach for efficient message verification over insecure
transmission rate to use, the Tx needs to optimally select the channels,” in Proc. ACM WiSec Conf., 2009, pp. 151–160.
number of channels to be aggregated in each slot. Aggregat- [17] Q. Wang, P. Xu, K. Ren, and M. Li, “Delay-bounded adaptive
ing more channels leads to higher rates if transmission is UFH-based anti-jamming wireless communication,” in Proc. IEEE
successful, but also increases the probability of being hit by INFOCOM Conf., 2011, pp. 1413–1421.
[18] M. Strasser, C. P€ 
opper, and S. Capkun, “Efficient uncoordinated
the sweep Jx. FHSS Anti-jamming communication,” in Proc. ACM MobiHoc
Conf., New Orleans, LA, USA, 2009, pp. 207–218.
[19] 
M. Cagalj, 
S. Capkun, and J.-P. Hubaux, “Wormhole-based
ACKNOWLEDGMENTS antijamming techniques in sensor networks,” IEEE Trans. Mobile
The authors would like to thank Diep Nguyen, Macquarie Comput., vol. 6, no. 1, pp. 100–114, Jan. 2007.
University, for his helpful discussions. This research was sup- [20] Y. Wu, B. Wang, K. J. Liu, and T. C. Clancy, “Anti-jamming games
in Multi-channel cognitive radio networks,” IEEE J. Sel. Areas
ported in part by the US National Science Foundation (NSF) Commun., vol. 30, no. 1, pp. 4–15, Jan. 2012.
(grants IIP-1265960 , IIP-1432880, and CNS-1409172) and in
HANAWAL ET AL.: JOINT ADAPTATION OF FREQUENCY HOPPING AND TRANSMISSION RATE FOR ANTI-JAMMING WIRELESS SYSTEMS 2259

[21] M. J. Abdel-Rahman and M. Krunz, “Game-theoretic quorum- Mohammad J. Abdel-Rahman (S’12-M’15)


based frequency hopping for anti-jamming rendezvous in DSA received the PhD degree in electrical and com-
networks,” in Proc. IEEE DySPAN Conf., Apr. 2014, pp. 248–258. puter engineering from The University of Arizona,
[22] G. Holland, N. Vaidya, and P. Bahl, “A rate-adaptive MAC proto- Tucson, AZ, in 2014. He is currently a postdoc-
col for multi-hop wireless networks,” in Proc. 7th Annu. Int. Conf. toral research associate with the Department of
Mobile Comput. Netw., Rome, Italy, 2001, pp. 236–251. Electrical and Computer Engineering, Virginia
[23] G. Judd, X. Wang, and P. Steenkiste, “Efficient Channel-aware rate Polytechnic Institute and State University, Blacks-
adaptation in dynamic environments,” in Proc. MobiSys Conf., burg, VA. His research interests include the areas
Breckenridge, CO, USA, 2008, pp. 118–131. of wireless communications and networking, with
[24] J. Camp and E. Knightly, “Modulation rate adaptation in urban and emphasis on wireless network virtualization,
vehicular environments: Cross-layer implementation and experi- dynamic spectrum access networks, wireless
mental evaluation,” in Proc. ACM MobiCom Conf., 2008, pp. 315–326. security, resource management, adaptive protocols, satellite communi-
[25] J. Kim, S. Kim, S. Choi, and D. Qiao, “CARA: Collision-aware rate cations, and wireless sensor networks. He serves as a reviewer for sev-
adaptation for IEEE 802.11 WLANs,” in Proc. IEEE INFOCOM eral international conferences and journals. He is a member of the IEEE.
Conf., 2006, pp. 1–11.
[26] H. Rahul, F. Edalat, D. Katabi, and C. G. Sodini, “Frequency-
aware rate adaptation and MAC protocols,” in Proc. ACM Mobi- Marwan Krunz received the PhD degree in elec-
Com Conf., Beijing, China, 2009, pp. 193–204. trical engineering from Michigan State University
[27] K. Ramachandran, R. Kokku, H. Zhang, and M. Gruteser, in 1995. He is the Kenneth VonBehren Endowed
“Symphony: Synchronous two-phase rate and power control in professor in the Department of ECE, University of
802.11 WLANs,” IEEE/ACM Trans. Netw., vol. 18, no. 4, pp. 1289– Arizona. He holds a joint appointment as a pro-
1302, Aug. 2010. fessor in the Department of Computer Science.
[28] M. Vutukuru, H. Balakrishnan, and K. Jamieson, “Cross-layer He is also the site co-director in BWAC, the US
wireless bit rate adaptation,” vol. 39, no. 4, pp. 3–14, Aug. 2009. National Science foundation (NSF) industry/uni-
[29] S. H. Y. Wong, H. Yang, S. Lu, and V. Bharghavan, “Robust rate versity cooperative research center that focuses
adaptation for 802.11 wireless networks,” in Proc. ACM MobiCom on broadband wireless access and applications.
Conf., 2006, pp. 146–157. He previously served as the UA site director for
[30] G. Noubir, R. Rajaraman, B. Sheng, and B. Thapa, “On the robust- Connection One, an NSF I/UCRC center that focuses on wireless com-
ness of IEEE 802.11 rate adaptation algorithms against smart munication circuits and systems. He joined the University of Arizona in
jamming,” in Proc. ACM WiSec Conf., Hamburg, Germany, Jun. January 1997, after a brief postdoctoral stint at the University of Mary-
2011, pp. 97–108. land. In 2010, he was a visiting chair of excellence at the University of
[31] I. Broustis, K. Pelechrinis, D. Syrivelis, S. V. Krishnamurthy, and Carlos III de Madrid, and concurrently a visiting researcher at the Insti-
L. Tassiulas, “FIJI: Fighting implicit jamming in 802.11 WLANs,” tute IMDEA Networks. In 2011, he received a Fulbright Senior Expert
in Proc. 5th Int. ICST Conf. Security Privacy Commun. Netw., 2009, Award, through which he visited with the University of Jordan, King
pp. 21–40. Abdullah II School of Information Technology. He previously held various
[32] V. Mhatre, K. Papagiannaki, and F. Baccelli, “Interference mitiga- visiting positions at INRIA, France, HP Labs, University of Paris VI, Uni-
tion through power control in high density 802.11 WLANs,” in versity of Paris V, and US West Advanced Technologies. His research
Proc. IEEE INFOCOM Conf., 2007, pp. 535–543. interests lie in the areas of wireless communications and networking,
[33] L. Kleinrock and F. Tobagi, “Packet switching in radio channels with emphasis on resource management, adaptive protocols, and secu-
part II - the hidden node problem in carrier sense multiple rity issues. Recently, he has been involved in projects related to dynamic
access nodes and the busy tone solution,” IEEE Trans. Commun., spectrum access, wireless security, power-controlled protocols for wire-
vol. C-23, no. 12, pp. 1417–1433, Dec. 1975. less networks, multichannel MIMO systems, secure satellite communi-
[34] Y. E. Sagduyu, R. A. Berry, and A. E. Ephremides, “Jamming cations, energy management in solar-powered WSNs, and full-duplex
games in wireless networks with incomplete information,” IEEE communications. He has published more than 220 journal articles and
Commun. Mag., vol. 49, no. 8, pp. 112–118, Aug. 2011. peer-reviewed conference papers. He was an Arizona Engineering
[35] J. Filar and K. Vrieze, Competitive Markov Decision Processes. New Faculty Fellow (2011-2014) and an IEEE Communications Society Dis-
York, NY, USA: Springer-Verlag, 1997. tinguished lecturer (2013-2014). He received the 2012 IEEE Communi-
[36] M. L. Puterman, Markov Decision Processes: Discrete Stochastic cations Society’s TCCC Outstanding Service Award and the NSF
Dynamic Programming. New York, NY, USA: Wiley, 1994. CAREER Award (1998). Currently, he serves on the editorial board for
[37] E. Altman and A. Shwartz, “Constrained Markov games: Nash the IEEE Transactions on Cognitive Communications and Networking.
equilibria,” Adv. Dynamic Games Appl., vol. 5, pp. 213–221, 2000. He previously served on the editorial boards for the IEEE/ACM Transac-
[38] Wireless LAN medium access control (MAC) and physical layer (PHY) tions on Networking (2001-2008), the IEEE Transactions on Mobile
specifications, IEEE Std. 802.11, Jun. 2007. Computing (2006-2011), the IEEE Transactions on Network and Service
[39] M. K. Hanawal, M. J. Abdel-Rahman, and M. Krunz, “Game theo- Management (2010-2014), the International Journal of Distributed Sen-
retic anti-jamming dynamic frequency hopping and rate adapta- sor Networks (2013-2014), and the Computer Communications Journal
tion in wireless systems,” in Proc. Int. Symp. Modeling and (2001-2011). He was the general co-chair for the ACM WiSec 2012 Con-
Optimization in Mobile, Ad Hoc, and Wireless Net. (WiOpt), Hamma- ference, and served as a TPC chair for various international conferen-
met, Tunisia, May 2014, pp. 247–254. ces, including INFOCOM’04, SECON’05, and WoWMoM’06. He has
served and continues to serve on the executive and technical program
Manjesh K. Hanawal received the BE degree in committees of numerous international conferences, and on the panels
electronics and communication from the National of several funding agencies. He was the keynote speaker, an invited pan-
Institute of Technology, Bhopal, India, and the elist, and a tutorial presenter at various international conferences. He is
MSc degree in electrical communication engineer- a fellow of the IEEE.
ing from the Indian Institute of Science, Bangalore,
India, in 2009. He received the PhD degree from
INRIA, Sophia Antipolis, France, and the " For more information on this or any other computing topic,
University d’Avignon, Avignon, France, in 2013. please visit our Digital Library at www.computer.org/publications/dlib.
Between 2004 to 2007, he was with the Centre for
Artificial Intelligence and Robotics, Bangalore,
where he worked on various cryptographic proj-
ects. Currently, he is an assistant professor in the Department of Industrial
Engineering and Operations Research, Indian Institute Technology, Bom-
bay, India. His master’s thesis received the best MSc Thesis Medal (Prof.
F.M. Mowdawalla Medal) and he is recipient of INSPIRE faculty award
from Government of India.

S-ar putea să vă placă și