Sunteți pe pagina 1din 11

This article has been accepted for publication in a future issue of this journal, but has not been

fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access

A One-leader Multi-follower Bayesian-Stackelberg


Game for Anti-jamming Transmission in UAV
Communication Networks
Yifan Xu, Student Member, IEEE, Guochun Ren, Jin Chen, Yunpeng Luo, Luliang Jia, Student Member, IEEE,
Xin Liu, Yang Yang, and Yuhua Xu, Member, IEEE

Abstract—This paper focuses on the anti-jamming transmis- be triggered, which is also a factor that deteriorates the system
sion problem in unmanned aerial vehicle (UAV) communication performance.
networks. Considering the incomplete information constraint and Since jamming attacks pose significant threat to the wireless
the co-channel mutual interference, a Bayesian Stackelberg game
is proposed to formulate the competitive relations between UAVs communication security, more attention has been paid to anti-
(users) and the jammer. Specifically, the jammer acts as the jamming studies in recent years [2]. A large number of anti-
leader, whereas users act as followers of the proposed game. jamming countermeasures were proposed for the purpose of
Based on their utility functions, the jammer and users select reducing or avoiding the influences from malicious jammer,
their optimal power control strategies respectively. In addition, e.g., [3]–[7]. In the anti-jamming transmission filed, there are
the observation error is also investigated in this paper. Due to the
incomplete information constraint and the existence of co-channel still several problems remaining unsolved. Firstly, it should
mutual interference, it is challenging to obtain Stackelberg Equi- be noticed that most existing studies rarely considered multi-
librium (SE) of the proposed game. Thus, a sub-gradient based users case in anti-jamming transmission field, and the co-
Bayesian Stackelberg iterative algorithm (SBBSIA) is proposed channel mutual interference, as an indispensable factor, has
to obtain SE. Finally, simulations are conducted to demonstrate hardly been investigated neither. Secondly, most existing work
the performance of the proposed algorithm, and the impact of
incomplete information and observation error on users’ utilities made an assumption that user-side and jammer-side can obtain
are also presented. complete information of their opponents, which is not realistic
in some cases.
Index Terms—Anti-jamming, unmanned aerial vehicle,
Bayesian Stackelberg game, power control, incomplete informa-
In this paper, we mainly concentrate on the anti-jamming
tion. transmission problem in UAV communication networks, and a
Bayesian Stackelberg game approach is proposed. The reason
for using this game model is twofold. Firstly, considering the
I. I NTRODUCTION hierarchical interactions between UAV-side and jammer-side
in the anti-jamming transmission field, and that each decision-
NMANNED aerial vehicles (UAV) communication net-
U works have been a hot topic recently [1]. In this re-
gard, anti-jamming transmission is playing an increasingly
maker makes decisions spontaneously and independently, S-
tackelberg game is a befitting game model to formulate.
Secondly, due to the mobility of UAVs, the acquisition of
important role in building UAV communication networks. information is more difficult in UAV communication networks
When UAVs suffer serious jamming, they can no longer build than in traditional wireless communication networks, which is
connections to other UAVs as well as the control site, which the main cause of incomplete information constraint.
is a crucial problem to be solved. In addition, when several In addition, we focus a UAV power transmission system
UAVs share one common channel, mutual interference would where jamming attack and mutual interference exist simul-
taneously. For jamming attack, the smart jammer, who can
This work was supported by the National Natural Science Foundation of
China under Grant No. 61771488, No. 61671473 and No. 61631020, in adjust its strategy adaptively, is mainly investigated. Whereas
part by the Natural Science Foundation for Distinguished Young Scholars for mutual interference, the co-channel interference is mainly
of Jiangsu Province under Grant No. BK20160034, and in part by the Open considered.
Research Foundation of Science and Technology on Communication Networks
Laboratory. (Corresponding author: Guochun Ren and Yuhua Xu.)
While analyzing all these factors mentioned above, we
Yifan Xu and Yuhua Xu are with the College of Communications En- formulate a Bayesian Stackelberg game in UAV communi-
gineering, Army Engineering University of PLA Nanjing 210000, China, cation networks to cope with the anti-jamming transmission
and the Science and Technology on Communication Networks Laborato-
ry, Shijiazhuang 050002, China (e-mail: yifanxu1995@163.com; yuhuaena-
problem among UAVs. Besides, we propose a sub-gradient
tor@gmail.com;). [8] based Bayesian Stackelberg iterative algorithm (SBBSIA),
Guochun Ren, Jin Chen, Yunpeng Luo, Luliang Jia, Yang Yang with which UAVs and the jammer can adjust their strategies
are with the College of Communications Engineering, Army Engi-
neering University of PLA Nanjing 210000, China (e-mail: guochun-
to be optimal. The main contributions of this paper can be
ren@yeah.net; chenjin99@263.net; 349492881@qq.com, jiallts@163.com; summarized as follows:
sheep 1009@163.com; ). • The anti-jamming transmission issue in UAV networks
Xin Liu is with the College of Information Science and Engi-
neering, Guilin University of Technology, Guilin 541000, China (e- is investigated using a Bayesian Stackelberg game, with
mail:liuxin2017125@glut.edu.cn). multi-users case taken into consideration. Besides, the co-

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access

channel mutual interference among users is also investi- was proposed to fight against sweep attack in cognitive ad-
gated in anti-jamming transmission field. hoc networks. In [25] and [26], Markov game was proposed
• The Stackelberg Equilibrium (SE) of the proposed game to formulate as well as to obtain the optimal strategy for the
is obtained. For the purpose of obtaining the SE, the legitimate transmitter. In [27], a three-player game consisting
SBBSIA algorithm is designed. In addition, the existence of two secondary users and a jammer was formulated with the
as well as the uniqueness of SE have been proved. awareness of ”rendezvous” channel.
• The process of the scheme is presented, and masses of In further analysis, considering the hierarchical interactions
simulations have been conducted to support the theoret- between user-side and jammer-side, Stackelberg game [28]
ical analysis. Simulation results show that the proposed [29] was formulated in anti-jamming transmission field. In
SBBSIA algorithm is effective. [30] [31], D. Yang et al. formulated the anti-jamming problem
Note that an anti-jamming Stackelberg game approach in using a Stackelberg game approach. The user was assumed
UAV communication networks was presented in our previous to be the leader who took actions firstly, while the smart
work [9], and the main differences and new contributions are: jammer acted secondarily as the follower. The strategy action
(i) Incomplete information and observation error are intro- of the jammer was based on the strategy action of the user. In
duced in this work. (ii) By introducing incomplete information [32], the author proposed an anti-jamming Stackelberg game
and observation error, it brings difficulty in analyzing the game in cooperative wireless networks, viewing the relay node as
model, and the model proposed in [9] can not be employed the vice leader of the game. In [33], a hierarchical learning
directly. Moreover, a Bayesian Stackelberg approach can be solution on discrete power strategies was proposed for anti-
found in our work [37]. The main differences are: (i) Multi- jamming Stackelberg game.
user case is mainly considered in our paper, while one-user There are also some literature taking incomplete information
case was investigated in [37]. (ii) By introducing the multi- into consideration. In [34], it was discussed that users did not
users case, co-channel mutual interference is also considered. have complete information about the traffic dynamics, channel
The rest part of this paper is organized as follows. In Section characteristics and other important parameters of other users
II, we review the related work. In Section III, the system in wireless networks, based on which, a jamming game was
model and problem formulation are presented. In Section IV, modeled. In [35], the authors solved the problem from game-
the anti-jamming Bayesian Stackelberg game with incomplete theoretic perspective under the assumption that the user knew
information is presented, and the operation process of the little about the distribution of jamming as well as certain
proposed game is shown. In Section V, plentiful simulations information of fading channel. Moreover, In [36], Xiao et
are conducted, and the convergence as well as the influence al. viewed the observation error as a influence factor while
of incomplete information and observation error are demon- proposing a Stackelberg game model containing one jammer
strated. In the end, we make conclusion in Section VI. and one user, and the power constraint of each side was inves-
tigated. In [37], Jia et al. applied an anti-jamming Bayesian
II. R ELATED W ORK Stackelberg game approach to investigate the best transmission
Under the background of wireless communication networks, schemes for both players. Theoretically, the demonstration of
abundant studies with respect to the anti-jamming transmission Bayesian Stackelberg game was also given smoothly.
problem have been proposed. For example, a network perfor- Different from most of the existing work, in this paper,
mance maximization problem under the existence of jammer we formulate the anti-jamming transmission problem as a
was modeled as a joint power control and user scheduling opti- one-leader multi-follower Bayesian Stackelberg game in UAV
mization in [6]. While considering the competition between the communication networks. Besides, the existence of malicious
user-side and jammer-side, game theory [10]–[17] is a fantastic jammer and co-channel mutual interference is considered
theoretical tool in modeling the jamming and anti-jamming simultaneously.
problems. In [18], the author applied game theory approaches
to study the competitive interactions between secondary user III. S YSTEM M ODEL AND P ROBLEM F ORMULATION
and jammer, and game theoretic solutions were also provided
in anti-jamming CRNs. In [19], the author proposed a novelty A. System Model
scheme which uses unmanned aerial vehicles (UAVs) to relay The system model is shown in Fig.1. It is assumed that there
the message of an OBU (onboard units) and to improve are one jammer and one UAV group which includes n users.
the communication performance of VANETs against smart A transmitter-receiver pair is treated as one user in the system.
jammers. Moreover, an anti-jamming UAV relay game was The UAV group is assigned with one common channel while
formulated. In [20], a non-zero-sum power control game was flying towards its destination. Simultaneously, the transmitters
modeled for the anti-jamming issue, with transmission cost in the group are transmitting to the receivers. In general case,
taken into consideration. In [21], a zero-sum game which when users are transmitting, the malicious jammer will disturb
provided several defense schemes for user-side was modeled the normal transmission among users. Both the smart jammer
in cognitive radio networks. Considering the time-varying and users can adjust their transmission power adaptively. In
spectrum environment, an anti-jamming stochastic game [22] the system model, the smart jammer has the ability to learn
was also proposed. In cognitive radio communications, the and to sense when and where the user would start transmitting,
interaction between secondary users and attackers was for- and it has the intention to jam the channel assigned to the UAV
mulated as a dogfight game [23]. In [24], a stochastic game group.

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access

the throughput of user i is presented as:


T ri = log2 (1 + γi (Pi , P−i , J)) . (3)
When users or smart jammer starts transmitting, it can not
Jammer be ignored that the existence of transmitting cost will have a
great impact on the decision of both user-side and jammer-
side. Motivated by [20], we introduce Cu and Cj for users
and the jammer, which denotes the transmission cost per unit
power. When transmitting with power Pi , the transmission cost
of user i can be denoted as:

Mutual interference T ci = Cu Pi . (4)


Similarly, the transmission cost of the smart jammer can be
expressed as:
Users T cj = Cj J. (5)
In the system model, the existence of both mutual interfer-
Fig. 1. The existence of malicious jammer and mutual interference in UAV
communication networks. ence and malicious jammer has been considered. However, in
a realistic scenario, there exist uncertainties for both users and
the smart jammer while sensing the precise information of the
According to the model mentioned above, the users’ set opponent. Motivated by [37], such uncertainties of the channel
is denoted as N = [1, 2, ..., N ], i ∈ N denotes the ith state information (CSI) have also been taken into consideration
user in the UAV group. It is assumed that the channel state in our paper.
keeps unchanged when users are transmitting. The power For users who can share internal information within a UAV
vector of the UAVs is denoted as P = [P1 , ..., Pi , ..., PN ]. group, it is assumed that each user knows the information of
Moreover, the smart jammer’s transmission power is denoted other users perfectly. However, users usually could not obtain
as J. The background noise is denoted as N0 for the purpose precise information about the smart jammer, they could only
of simplification. For user i, it suffers from the co-channel get the joint probability distribution of the opponent. Thus, the
mutual interference caused by other users, and the malicious description of the incomplete information for user i is shown
jamming signal caused by the smart jammer. The SINR level in Assumption 1.
of the user i is determined by: Assumption 1: As for user i, the jamming gain βi is
assumed to be G positive states, which could be denoted as
Pi αi βi (1) , ..., βi (g) , ..., βi (G). The probability of the gth state is
γi (Pi , P−i , J) = , (1)
N0 + βi J + Ii (P−i ) ∑G
σβi (g), and σβi (g) = 1.
where αi denotes the channel gain of user i’s transmission g=1
For the smart jammer, when it starts jamming the legitimate
link, and βi represents the channel gain of the smart jammer’s
communication of users, it has the intention to know the
jamming link to user i. P−i = [P0 , P1 , ..., Pi−1 , Pi+1 , ..., PN ]
channel gain and the mutual interference state as precisely as
is a vector of∑all users’ transmission power except user i.
possible. In Assumption 2, the description of the incomplete
Ii (P−i ) = m̸=i,m∈N Pm θm,i represents the co-channel information for the smart jammer is expressed as:
mutual interference, and θm,i is the mutual interference gain
Assumption 2: As for the jammer, the user
from user m to user i. Based on the simplified path-loss
i’s transmission gain αi has K states which are
model [38] which has been widely used in jamming and anti-
αi (1), ..., αi (k), ..., αi (K), and the mutual interference gain
jamming games [39]–[41], it is assumed that the signals are
θm,i has W states which are θm,i (1), ..., θm,i (w), ...θm,i (W ).
influenced by propagation losses and power decay. Specifical-
The joint probability is ρJ (αi (k) , θm,i (w)), where
ly, the channel gain of user i’s transmission link is denoted
θm,i (w) = (θ1,i (w) , ..., θi−1,i (w) , θi+1,i (w) , ..., θN,i (w))
as αi = d−δ
i , the channel gain of the smart jammers jamming denotes the wth combination of the mutual interference, and
link to user i is denoted as βi = dJ,i −δ , and the co-channel ∑
K ∑ W
mutual interference gain from user m to user i is represented as (ρJ (αi (k) , θm,i (w))) = 1.
θm,i = dm,i −δ , where δ is the path-loss exponent, di denotes k=1 w=1

the distance between the user i’s transmitter-receiver pair, dJ,i


B. Problem Formulation
represents the jamming distance to user i, and dm,i is the
distance from user m to user i. In UAV communication networks which consist of users as
According to the definition shown above, the user i’s well as a malicious jammer, the competitive interaction and
throughput can be denoted as: the incomplete information constraint between two sides make
the decision more complicated. Usually, the jammer’s signal
T ri (B) = Blog2 (1 + γi (Pi , P−i , J)) . (2) power is bigger than users’, and it has the intention to jam the
users proactively. Motivated by these, we use a Bayesian S-
After making a normalization on the channel bandwidth B, tackelberg game to formulate the anti-jamming system model.

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access

Based on the Bayesian Stackelberg game, we propose a one- Similarly, the mutual interference gain θm,i has W s-
leader, multi-followers scheme in which the smart jammer acts tates which are θm,i (1) , ..., θm,i (w) , ..., θm,i (W ) , the
firstly as leader of the game whereas users act secondarily after probabilities are σθm,i (1) , ..., σθm,i (w) , ..., σθm,i (W ), and
obtaining the strategy of the leader. In addition, the incomplete ∑
W
σθm,i (w) = 1.
information constraint is also formulated. Mathematically, the w=1
Bayesian Stackelberg game is denoted as: Considering the independent relationship between αi and
{ } θm,i , the smart jammer’s utility function is redefined as:
G = N , J, {Pi }i∈N , {J } , {Ui }i∈N , {Vj } , (6)

N ∑
K ∑
W
where {J } and {Pi } denote the jammer’s and users’ strategy Vj (J, P1 , ..., PN ) = − σαi (k) σθm,i (w)·
i=1 k=1 w=1
space set. Specifically, the strategy set of the smart jammer αi∑
(k)Pi
log2 (1 + )− Cj J.
can be denoted as: N0 +βi J+ Pm θm,i (w)
m̸=i

J = {J : 0 ≤ J ≤ Jmax } . (7) (11)


The parameters mentioned above have been defined in
Similarly, the strategy set of user i is given by: Section III-A. As for the jammer, it aims to maximize its utility
to increase the jamming payoff, which can be formulated as:
Pi = {Pi : 0 ≤ Pi ≤ Pmax } . (8)
max Vj (J, P1 , ..., PN ) . (12)
In equation (7) and equation (8), J and Pi represent trans- J≥0
mission power of the smart jammer and user i respectively. As for the user i, the optimization problem is presented as:
Jmax and Pmax denote the maximum value of jammer’s and ( )
user’s transmission power. Moreover, {Vj } and {Ui }i∈N are max Ui Pi , P−i , J˜ . (13)
Pi ≥0
utility functions of the jammer or users respectively.
Inspired by [30], considering the transmission payoff which While introducing the co-channel mutual interference and
includes the throughput and transmission cost, the user i’s incomplete information, the process of solving the optimiza-
utility function can be defined as: tion problem for users and the smart jammer is challenging,
which will be shown in the next section.
( ) ∑G
Ui Pi , P−i , J˜ = T ri (βi (g)) − T ci
g=1
IV. A NTI - JAMMING BAYESIAN S TACKELBERG G AME WITH
  I NCOMPLETE I NFORMATION

G (9)
σβi (g) log2 1 + αi P∑
˜
i  In this section, we make the definition of Stackelberg
= g=1
N0 +βi (g)J+ Pm θm,i
Equilibrium (SE) firstly. Subsequently, the process of the
m̸=i

−Cu Pi . solution will also be shown. Moreover, the SBBSIA algorithm


is also proposed.
As shown in equation (9), incomplete information and As for the formulated anti-jamming Stackelberg game,
observation error have been considered in users’ side, and J˜ the Stackelberg Equilibrium is the best strategy combi-
denotes the observation value of J. When transmission cost nation for users and the smart jammer. A strategy pair
is considerably high for UAVs to afford, it is not wise for (P1 ∗ , P2 ∗ , ..., PN ∗ , J ∗ ) is called SE if it is satisfied that J
UAVs to increase the transmission power as much as possible. maximizes the utility of the smart jammer, and for UAVs,
Making a tradeoff between the throughput and transmission (P1 ∗ , P2 ∗ , ..., PN ∗ ) is the best response to the jammer’s strat-
cost is more reasonable. egy. For any Pi > 0, i ∈ N , J > 0, the following conditions
From the opponent’s perspective, the purpose of the jammer should be satisfied:
is to minimize the communication throughput of UAV group. {
When it starts jamming, the transmission cost is also a non- Ui (Pi ∗ , P−i ∗ , J ∗ ) ≥ Ui (Pi , P−i ∗ , J ∗ ) ,
(14)
ignorable factor. Thus, the smart jammer’s utility function is Vj (J ∗ , P1 ∗ , ..., PN ∗ ) ≥ Vj (J, P1 ∗ , ..., PN ∗ ) ,
denoted as follows: ∗
where [·] denotes the best strategy of each decision-maker,

N ∑
K ∑
W
P−i ∗ denotes that all users choose the best strategies except
Vj = − T ri (αi (k) , θm,i (w)) − T cj
i=1 k=1 w=1 the ith user.

N ∑K ∑ W Stackelberg game is a kind of non-cooperative game. While
=− ρJ (αi (k) , θm,i (w))· (10)
i=1 k=1 w=1 in normal non-cooperative game, Nash equilibrium (NE) is a
αi∑
(k)Pi
log2 (1 + N0 +βi J+ Pm θm,i (w)
) − Cj J. stable point where no player can improve its utility unilaterally.
m̸=i
Moreover, SE can be decomposed into finding the NEs for
both users and the jammer [28].
Assuming that random variables αi and θm,i are indepen-
dent for the smart jammer. The channel gain of user i has K
states αi (1) , ..., αi (k) , ..., αi (K), the probabilities of these A. Followers Sub-game

K In this paper, we apply the backward induction method
states are σαi (1) , ..., σαi (k) , ..., σαi (K), and σαi (k) = to find the SE, which is drawn from [9], [37]. Given the
k=1
1. jammer’s transmission power, each user is going to take the

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access

best response independently for the purpose of maximizing When transmission power P−i and J˜ are known by user i,
its utility. Hence, the users’ strategies are firstly studied, and Pi can be obtained from equation (22).
then a non-cooperative game is formulated to describe the The optimization problem for any user is a convex optimiza-
competition among users, which is expressed as follows: tion problem, and the utility function holds a strong duality.
{ } Moreover, the duality gap is zero. Thus, the optimal solution
Gf = N , {Pi }i∈N , {Ui }i∈N . (15)
for the dual problem is the same as initial problem proposed.
When given the transmission power of the smart jammer and It is found that if there are more than three users in the
other users except user i, the user i’s optimization problem is UAV group, the optimization problem do not have a analytic
represented as: solution, and the numerical solution can been obtained instead.
( )
Pi = arg max Ui Pi , P−i , J˜ ,
(16)
s.t. 0 ≤ Pi ≤ Pmax . B. Leader Sub-game
Theorem 1: For user i, the best strategy is obtained through In our work, the smart jammer acts as the leader. Similar
solving the following equation: to the followers, the leader’s game can be formulated as:

G
σβi (g) αi GJ = {J, J , Vj } . (23)
( )
g=1 ∑
ln 2 N0 + βi (g) J˜ + Pm θm,i +αi Pi (17) Usually, the jammer’s optimal transmission power is able
m̸=i to be obtained after the following optimization problem being
− (Cu + λi ) = 0. solved:
Proof: For user i, the utility function is concave while J = arg max Vj (P1 (J) , ..., PN (J) , J)
(24)
taking the second partial derivative of Pi , since: s.t. 0 ≤ J ≤ Jmax
∂ 2 Ui ∑G
σβi (g) αi 2
− For the smart jammer, a discussion on the users’ actions
= ( )2 .
∂Pi 2 g=1 ∑ which are learned by the smart jammer is firstly made. As for
ln 2 N0 + βi (g) J˜ + Pm θm,i + αi Pi user i, the best response is shown in equation (17). However,
m̸=i
as for the smart jammer, the information of itself is completely
/ (18)
known, and the observation error can be eliminated as well.
It is obvious that ∂ 2 Ui ∂Pi 2 < 0 constantly established,
Thus, the estimation of the user i’s action from the smart
and the utility optimization problem of user i can be viewed
jammer’s perspective can be denoted as:
as a convex problem. Moreover, the user i’s utility function is
concave so that it can get the only one maximal value when αi
( ) − (Cu + λi ) = 0.
differentiating Ui in regard to Pi and setting the result equal ∑
to 0. Taking nonnegative dual variable λi into consideration, ln 2 N0 + βi J + Pm θm,i +αi Pi
m̸=i
the Lagrange function of user i is represented as: (25)
( )
Li Pi , P−i , J˜ = Then an analytic solution of the user i which is obtained in
the jammer-side can be expressed as:

G
α i Pi  ∑ +
σβi (g)log2 (1 + ∑ ) (19) N0 + βi J + Pm θm,i
g=1
N0 + βi (g) J˜ + Pm θm,i  1 m̸=i 
m̸=i Pi (J) =  −  ,
ln 2 (Cu + λi ) αi
−Cu Pi + λi (Pmax − Pi ) .
The Lagrange dual function is shown as follows: (26)
( ) + ∆
where (·) = max (·, 0). According to (26), if the transmission
˜ λi .
Di (λi ) = max Li Pi , P−i , J, (20)
Pi ≥0 power of the jammer is too large, which is shown as follows:
  
Moreover, the dual problem is: ∑
1  αi
d∗ = min Di (λi ) . (21) J≥ − N0 + Pm θm,i  , (27)
λi ≥0 βi ln 2 (Cu + λi )
m̸=i
On the basis of Karush-Kuhn-Tucker (KKT) conditions [8]
[42], by setting the resulting derivative equal to 0, which is then from the jammer’s perspective, user i will stop trans-
shown as: mitting which means Pi (J) = 0. Generally, let Λi , i ∈ N
˜ denote the ith threshold that influence the decision of the smart
∂Li (Pi , P−i , J) jammer, which can be expressed as:
=
∂Pi [ ( )]
∑G
σβi (g)αi ∑
( ) Λi = βi ln 2(Cu +λi ) − N0 +
1 αi
Pm θm,i ,i ∈ N,
(22)
g=1 ∑ m̸=i
ln 2 N0 + βi (g)J˜ + Pm θm,i + αi Pi Λmin = min (Λ1 , ..., ΛN ) ,
m̸=i
Λmax = max (Λ1 , ..., ΛN ) .
−Cu − λi = 0. (28)

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access

Moreover, assuming that Λmin = Λ1 ≤ Λ2 ≤ ... ≤ Λmax , as follows:


the jammer’s utility function can be expressed as follows after
∂Lj (J,P1 (J),...,PN (J))
substituting equation (26) into equation (11): ∂J =

N ∑ K ∑ W σαi (k)σθm,i (w)βi
V
j (J, P1 (J) , ..., PN (J)) = ( ) − Cj − µ = 0.


 ∑N ∑ K ∑ W i=1 k=1 w=1 ln 2 N0 +βi J+ Pm θm,i (w)

 − σαi (k) σθm,i (w)log2 ·

  
m̸=i


i=1 k=1 w=1 (33)



   According to equation (33), we can get the numerical

  ( 


αi (k) ) solution of J and find the best solution Jopt1 . Similarly, under

  ∑ 

 ln 2 N0 +βi J+ Pm θm,i (w) (Cu +λi ) the condition Λi−1 ≤ J ≤ Λi , i ∈ N , the best solution Jopti



 m̸=i
can be obtained as well. Thus, the best strategy J ∗ can be

 −Cj J, J ≤ Λmin ;
(29) obtained for different cases as equation (30) shows.
∑N ∑ K ∑ W

 − σαi (k) σθm,i (w)log2 ·

  i=i k=1 w=1 






 

  ( αi (k) )


C. Optimal Strategies for Users and the Jammer

  ∑ 

 From the users’ perspective, for different J ∗ , they obtain


ln 2 N0 +βi J+ Pm θm,i (w) (Cu +λi )

 different J˜∗ respectively. Substituting J˜∗ into (22), and the

m̸=i

 −Cj J, Λi−1 ≤ J ≤ Λi , i ∈ N ;

 best solution Popti of utility function Li (Pi , P−i , J) ˜ can
−Cj J, J ≥ Λmax . be obtained as well. Thus, the best strategies of users and
Theorem 2: The optimal transmission power J ∗ can be the smart jammer (P1 ∗ , ..., Pi ∗ , ..., PN ∗ , J ∗ ) are shown with
expressed as follows: following cases.

 0, Jopt1 ≤ 0, J ≤ Λmin ; 1) Jopt1 ≤ 0, J ≤ Λmin : In this case, the jammer’s utility



 Jopt1 , 0 ≤ Jopt1 ≤ Λmin , J ≤ Λmin ; function Lj (J, P1 (J) , ..., PN (J)) can obtain its maxi-



 min , Jopt1 ≥ Λmin , J ≤ Λmin ;
Λ mum value at J ∗ = 0, under this condition, the optimal
J∗ = Λi−1 , Jopti ≤ Λi−1 , Λi−1 ≤ J ≤ Λi , i ∈ N ; value of users can be obtained at Pi ∗ = Popti , i =


 Jopti , Λi−1 ≤ Jopti ≤ Λi , Λi−1 ≤ J ≤ Λi , i ∈ N ;

1, ..., N .

 2) 0 ≤ Jopt1 ≤ Λmin , J ≤ Λmin : In this case, the jammer’s

 Λi , Jopt1 ≥ Λi , Λi−1 ≤ J ≤ Λi , i ∈ N ;

Λmax , J ≥ Λmax . utility function Lj (J, P1 (J) , ..., PN (J)) can derive its
(30) maximum value at J ∗ = Jopt1 , under this condition,
Proof: As shown in equation (29), the jammer’s utility is the optimal value of users can be obtained at Pi ∗ =
a linear function in regard to J when J ≥ Λmax , and it is a Popti , i = 1, ..., N .
concave function with respect to J in interval J ≤ Λmin and 3) Jopt1 ≥ Λmin , J ≤ Λmin : In this case, the jammer’s
Λi−1 ≤ J ≤ Λi , i ∈ N , since utility function Lj (J, P1 (J) , ..., PN (J)) can achieve
 its maximum value at J ∗ = Λmin , under this con-

 ∑N ∑ K ∑ W σαi (k)σθm,i (w)βi 2

 − ( )2 , dition, the optimal value of users can be obtained at

 ∑


i=1 k=1 w=1
ln 2 N +β J+ P θ (w) Pi ∗ = Popti , i = 1, ..., N .


0 i m m,i

 4) Jopti ≤ Λi−1 , Λi−1 ≤ J ≤ Λi , i ∈ N : In this case,


∂ Vj  J ≤ Λmin
m̸=i
2
= the jammer’s utility function Lj (J, P1 (J) , ..., PN (J))
∂J 2   ∑N ∑ K ∑ W σαi (k)σθm,i (w)βi 2 can obtain its maximum value at J ∗ = Λi−1 , under this

 − ( )2 ,

 ∑ condition, the optimal value of users can be obtained at


i=i k=1 w=1
ln 2 N +β J+ P θ (w)


0 i m m,i
Px ∗ = Poptx , x = 1, ..., i; Px ∗ = 0, x = i + 1, ..., N .

 m̸=i

Λi−1 ≤ J ≤ Λi , i ∈ N . 5) Λi−1 ≤ Jopti ≤ Λi , Λi−1 ≤ J ≤ Λi , i ∈


(31) N : In this case, the jammer’s utility function
By introducing a non-negative dual variable µ, the Lagrange Lj (J, P1 (J) , ..., PN (J)) can obtain its maximum val-
function of the smart jammer is: ue at J ∗ = Jopti , under this condition, the optimal
Lj (J, P1 (J) , ..., PN (J)) = value of users can be derived at Px ∗ = Poptx , x =
∑N ∑ K ∑ W 1, ..., i; Px ∗ = 0, x = i + 1, ..., N .
− σαi (k) σθm,i (w)log2 · 6) Jopt1 ≥ Λi , Λi−1 ≤ J ≤ Λi , i ∈ N : In this case,
 i=1 k=1 w=1  the jammer’s utility function Lj (J, P1 (J) , ..., PN (J))
  (32) can obtain its maximum value at J ∗ = Λi , under this
 ( αi (k) )  condition, the optimal value of users can be obtained at
 ∑ 
ln 2 N0 +βi J+ Pm θm,i (w) (Cu +λi ) Px ∗ = Poptx , x = 1, ..., i; Px ∗ = 0, x = i + 1, ..., N .
m̸=i
7) J ≥ Λmax : In this case, the jammer’s utility function
−Cj J + µ (Jmax − J) . Lj (J, P1 (J) , ..., PN (J)) can achieve its maximum val-
Then, we differentiate Lj (J, P1 (J) , ..., PN (J)) with re- ue at Λmax , under this condition, the optimal value of
spect to J and set the result equal to zero, which can be shown users can be obtained at Pi ∗ = 0, i = 1, ..., N .

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access

Algorithm 1: Sub-gradient based Bayesian Stackelberg iterative


D. Existence and Uniqueness of Stackelberg Equilibrium 1. Initialization
The definition of Stackelberg Equilibrium has been given (1) Initialization of followers:
Transmission power Pi (t), maximum power Pmax ,
in Section IV. In this part, the demonstration of existence and channel gain αi , dual variable λi (t),
uniqueness of SE are presented. transmission cost Cu , possible state βi (g),
Theorem 3: The Stackelberg Equilibrium could always ex- and the probability σβi (g). i = 1, ..., N ; g = 1, ..., G.
(2) Initialization of leader:
ist in the proposed game. Transmission power J (t), maximum power Jmax ,
Proof: For users, when the jammer’s power J is given, the channel gain βi , dual variable µi (t),
followers sub-game is a non-cooperative game for each user. transmission cost Cj , possible state αi (k),
and the probability σαi (k).
Moreover, the strategy space of users is a non-empty, compact Possible mutual interference state θm,i (w),
and convex subset of some Euclidean space. Furthermore, each and the probability σθm,i (W ),
user’s utility function is continuous and concave with respect i = 1, ..., N ; k = 1, ..., K; w = 1, ..., W .
to its transmission power. According to [43], there exists no (3) Set iteration count t=0 and the maximum iteration count tmax .
2. Repeat iterations
less than one NE for each follower when given a value J. Let (1) t = t + 1.
NE (J) denote the best response combination of users when (2) for i=1:N
given J, and then the SE is expanded as: (3) Users obtain the observation( value J˜ (t) of the jammer.)
(4) Pi ∗ (t + 1) = arg max Li Pi , P−i (t) , J˜ (t) , λi (t) .
Vj (J ∗ , N E (J ∗ )) ≥ Vj (J, N E (J)) . (34) (5) The optimal strategies of followers in leader’s sight:

 +
N0 +βi J+ Pm (t)θm,i

Thus, it is easy to prove that there exists J which satisfies
Pi (J, t + 1) =  ln 2(C 
m̸=i
1
− .
the following condition: u +λi (t)) αi

Vj (J ∗ , N E (J ∗ )) = sup Vj (J, N E (J)) . (35) (6) end for


J≥0 (7) J ∗ (t + 1) =
arg max Lj (J, Pi (J, t + 1) , ..., PN (J, t + 1) , µ (t)).
The existence of SE has been proved as shown in equation (8) for i=1:N
(34) and (35). [ ]+
(9) λi (t + 1) = λi (t) − ∆tλ (Pmax − Pi ∗ (t + 1)) ,
i
Theorem 4: The Stackelberg Equilibrium is unique in the where ∆tλ is the iteration step of λi .
i
anti-jamming hierarchical power control game. (10) end for
[ ]+
Proof: Based on equation (18), the/ second-order deriva- (11) µ (t + 1) = µ (t) − ∆tµ (Jmax − J ∗ (t + 1)) ,
tive of every user, it shows that ∂ 2 Ui ∂Pi 2 < 0. Thus, the where ∆tµ is the iteration step of µ.
utility function Ui of user i is a concave function of Pi (12) Until t ≥ tmax .
˜ Therefore, End iterations
when given the observational transmission power J. 3. Output
based on duality optimization theory [8] [42], for every user (1) for i=1:N
in UAV group, the existence of the best response NE (J ∗ ) (2) Obtain Pi ∗ (tmax ).
(3) end for
is unique. In addition, for the smart jammer, an exhaustive (4) Obtain J ∗ ((tmax ). )
analysis has been given in Section IV-B, which shows that the (5) Obtain Ui Pi ∗ (tmax ) , P−i ∗ (tmax ) , J˜∗ (tmax ) .
jammer has a unique optimal J ∗ . (6) Obtain Vj (J ∗ (tmax ) , P1 ∗ (tmax ) , ..., PN ∗ (tmax )).
Thus, the Stackelberg Equilibrium is unique in the proposed
game.
Power update of the jammer
E. Operation Process of the Game and Algorithm
J * (t ) J * ( t + 1) J * (t + 2) J * ( t + 3)
In this part, the operation process of the Bayesian Stack-
elberg game and the SBBSIA algorithm are presented in
Converge to SE
detail. The operation process is shown in Fig. 2. Moreover,
the details of the proposed algorithm are shown in Algorithm
P1* ( t ) ,..., PN* ( t ) P1* ( t + 1) ,..., PN * ( t + 1) P1* ( t + 2 ) ,..., PN * ( t + 2 )
1. The initialization process is implemented when users and
the jammer start collecting information which is incomplete Power update of users
but relevant to the opponent. Specifically, for users, they are
going to acquire the information about the possible state and
corresponding probability of the jammer’s channel gain. While Fig. 2. Implementation process of the proposed game.
for the jammer, it is going to acquire the users’ channel
information as well as the mutual interference gain. Firstly,
the jammer selects its strategy and determines the jamming In addition, the convergence proof of the proposed algorithm
power. Then, for users, the transmission power is updated is also presented in this section.
until the followers sub-game converges to equilibrium, and Theorem 5: The proposed algorithm can converge to the
the transmission power combination of users composes an NE SE.
which maximizes the utility of each user. Finally, both the Proof: In this paper, we have given the demonstration
leader and followers sub-game converge to equilibrium after of the existence and uniqueness of SE according to Theorem
several iterations, which means the proposed game converges 3 and Theorem 4 in Section IV-D. Moreover, the process
to the SE. of iterative Algorithm 1 is also presented in Section IV-E.

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access

In brief, the convergence of Algorithm 1 is supported by 4


the demonstration of the existence and uniqueness of SE, 3.5
and the operation process of Algorithm 1 is the reflection of
3
obtaining SE for the proposed Bayesian Stackelberg game. In
addition, the convergence of the sub-gradient update method 2.5

Position (km)
is analyzed, which is shown as follows: 2 Jammer
[ ]+
λi (t + 1) = λi (t) − ∆tλi (Pmax − Pi ∗ (t + 1)) , (36) 1.5 UAV group

[ ]+ 1
µ (t + 1) = µ (t) − ∆tµ (Jmax − J ∗ (t + 1)) . (37)
0.5 User 1 User 2
On the basis of the theoretical analysis in [8], the con- 0
vergence of the sub-gradient iterative can be guaranteed on -0.5
condition that the iteration step ∆tλi and ∆tµ are chosen -0.5 0 0.5 1 1.5 2 2.5 3 3.5 4
Position (km)
appropriately.
Combine the analysis on the existence and uniqueness of Fig. 3. Locations of the jammer and the UAV group.
SE, the operation process of iterative Algorithm 1, and the
convergence proof of the sub-gradient update method, we can
make the conclusion that the proposed algorithm converges As is shown in the Repeat iterations step (7), the com-
to the SE, and it has also been verified that the Algorithm 1 putation complexity of computing J ∗ (t + 1) is O (C4 )
converges quickly in the simulation parts. , where C4 is a constant determined by equation (33) in
our paper.
F. Complexity Analysis of the Proposed Algorithm 5) The part of sub-gradient update:
[ ]+
In this part, we analyze the computation complexity of the λi (t + 1) = λi (t) − ∆tλi (Pmax − Pi ∗ (t + 1)) ,
SBBSIA algorithm. Motivated by [44], denote the number of
convergence iterations as Nit , and the number of users as N , [ ]+ (40)
µ (t + 1) = µ (t) − ∆tµ (Jmax − J ∗ (t + 1)) . (41)
the computational complexity is shown in Table I. Moreover,
the details are shown as follows: As is shown in the Repeat iterations step (9) and
1) The computation complexity of obtaining the observa- step (11), the computation complexity for every user
tion value J˜ (t) for every user i is O (C1 ), where C1 is i to compute λi (t + 1), and for the smart jammer to
a constant determined by the observation process. Then compute µ (t + 1) is C5 , where C5 is a small constant.
the computation for all users to obtain J˜ (t) is O (N C1 ). Thus, the computational complexity for all players to
This part is shown in the Repeat iterations step (3). update sub-gradient is O (N C5 + C5 ).
2) The computation (
complexity of computing) In a word, the total computation complexity of the proposed
Pi ∗ (t + 1) = arg max Li Pi , P−i (t) , J˜ (t) , λi (t) algorithm can be expressed as:
for every user i is O (C2 ), where C2 is a constant Calg =
determined by the computing process shown in Nit (O (N C1 ) + O (N C2 ) + O (N C3 ) (42)
equation (22). Then the computation for all users to +O (C4 ) + O (N C5 + C5 ))
obtain Pi ∗ (t + 1) is O (N C2 ). This part is shown in
the Repeat iterations step (4). It is shown that the computation complexity is related to
3) The process of computing the optimal strategies of the iterations Nit and the user number N . In our paper, the
followers in leader’s sight: algorithm can converge quickly with a small Nit , and the user
number N is assumed to be 2. Thus, the proposed Algorithm
P (J, t + 1) =
i ∑ + 1 has relatively low complexity.
N0 +βi J+ Pm (t)θm,i
(38)
 1

m̸=i
 .
ln 2(Cu +λi (t)) αi V. S IMULATION R ESULTS
In this part, simulations results are presented. The location
As is shown in the Repeat iterations step (5), for setting is shown in Fig. 3. Assuming there are four nodes
every user i, the computation complexity of computing in the UAV group, two of them constitute user 1, whereas
Pi (J, t + 1) is O (C3 ), where C3 is a small constant. the rest constitute user 2. The coordinates of the transmitter
The demonstration is shown in equation (26). Thus, and receiver in user 1 are (0km, 1km) and (0km, 0km). The
the computation for all users to obtain Pi (J, t + 1) is coordinates of the transmitter and receiver in user 2 are (1km,
O (N C3 ). 1km) and (1km, 0km). The jammer is located in (2.5km,
4) The computation complexity of computing the jammers 2.5km).
best strategy: The parameters are given as follow: δi = δJ,i = δm,i =
J ∗ (t + 1) = 2, i = 1, ..., N ; m = 1, ..., i − 1, i + 1, ..., N. N0 = -174
arg max Lj (J, Pi (J, t + 1) , ..., PN (J, t + 1) , µ (t)) . dBm, Cu =0.12, Cj =0.05, di , dJ,i and dm,i can be calculated
(39) through the locations given in Fig. 3. Thus, the values of

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access

TABLE I
C OMPLEXITY ANALYSIS OF THE PROPOSED ALGORITHM .

Computation Complexity
J˜ (
(t) ) O (Nu C1 )
Pi ∗ (t + 1) = arg max Li Pi , P−i (t) , J˜ (t) , λi (t) O (Nu C2 )
 ∑ +
N0 +βi J+ Pm (t)θm,i

Pi (J, t + 1) =  ln 2(C 
m̸=i
1
− O (Nu C3 )
u +λi (t)) αi

J ∗ (t + 1) = arg max Lj (J, Pi (J, t + 1) , ..., PN (J, t + 1) , µ (t)) O (C4 )


[ ]+
λi (t + 1) = λi (t) − ∆tλ (Pmax − Pi ∗ (t + 1))
[ i ]+ O (Nu C5 + C5 )
µ (t + 1) = µ (t) − ∆tµ (Jmax − J ∗ (t + 1))

channel gain, mutual interference gain and jamming gain 60


can be obtained. The maximal transmission power of users
P1
is Pmax =10W, and the maximal transmission power of the 50 P2
J
jammer is Jmax =100W. The dual variable λi = 5, i = 1, ..., N ,

Transmission power (W)


µ = 10. The iteration steps are set as 0.2 in all simulations. 40

Moreover, to describe the incomplete information and ob-


30
servation error more specifically, the fluctuation coefficient fu ,
fj and the observation error coefficient er are introduced.
20
From the jammer’s perspective, assuming that the channel
gain of user i has two states [αi , αi + fu αi ] with probability 10
[0.5, 0.5], and the mutual interference gain of user i also
has two combined states [θm,i , θm,i + fu θm,i ] with the same 0
0 5 10 15 20 25 30
probability. fu represents the fluctuation coefficient of users. Iteration number ( t)
Whereas from the user i’s perspective, the channel gain of
the jammer has two states [βi , βi + fj βi ] with probability Fig. 4. The convergence of the transmission power.
[0.5, 0.5], fj denotes the fluctuation coefficient of the jammer.
The observation error coefficient from the followers to the 0.6
leader can be expressed as:

er=0

˜ er=0.1

J − J 0.55 er=0.2
er=0.3
er = . (43)
J
Utility of user 1

0.5
A. Convergence of the Proposed Game
The convergence to the SE can be shown in this part for 0.45

both users and the jammer. As is shown in Fig. 4, there are


two users in the UAV group. The iteration number is set to 0.4
be 30. With the algorithm carrying out, user 1, user 2 and the
jammer converge to the only equilibrium value (SE), which is
0.35
consistent with the theoretical analysis that there exists only 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
Fluctuation coefficient ( f u)
one SE in the proposed game. 3-user case and 4-user case in
the UAV group have also been simulated, and the analysis can Fig. 5. Influence of incomplete information and observation error on user 1.
be proved to be analogous to the 2-user case.

B. Influence of Incomplete Information and Observation Error power control strategies of users will be. Thus, observation
The influence of incomplete information and observation error on the jammer will influence the utility of users as shown
error on users are shown in Fig. 5 and Fig. 6. The different in simulation results.
values of fluctuation coefficient fu and observation error
coefficient er are compared. With the increase of fu , the utility
of both user 1 and user 2 increased, while with the increase of C. The Influence of Locations
er , the utility of both user 1 and user 2 will decrease instead. Without loss of generality, the flying path should be con-
As a result, the fluctuation coefficient fu reflects the accura- sidered due to the fact that the distance variation between
cy degree of information obtained by the jammer. If fu is too the users and jammer may influence the utility of the user.
large, it means the decline of the jamming ability. Observation The mobility of users in the scenario shown in Fig. 3 is not
error coefficient er reflects the observation accuracy of user- considered, i.e., the UAV can hover motionless in the air.
side. The smaller the observation error is, the more accurate Thus, we evaluate the utility performance depicted in Fig. 7

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access

10

0.5 0.65

0.45 er=0 0.6 User 1


User 2
er=0.1
0.55
0.4 er=0.2
er=0.3
0.5
0.35
Utility of user 2

Utility of users
0.45
0.3
0.4
0.25
0.35
0.2
0.3
0.15
0.25

0.1 0.2

0.05 0.15
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
Fluctuation coefficient ( f u) Center location of UAV group(x range from 0 to 5,y=0)(km)

Fig. 6. Influence of incomplete information and observation error on user 2. Fig. 9. The utility of users in the second path.

4.5
There is a downward trend in the utilities of the users when
4
the abscissa of the center location ranges from 0km to 2km.
3.5 The reason is that the decrease of distance between users and
3
Jammer
the jammer leads to the enhancement of the jamming ability
which results in the reduction of utility and vice versa. ii)
Position (km)

2.5

2 When the abscissa of the UAV group center is 2.5km, the


UAV group center
1.5
utilities of user 1 and 2 are equal since the jamming distance
1
are totally equal. Moreover, in Fig. 9, when the jammer is too
far away from UAV group, the best choice for the jammer is
0.5
adjusting its transmission power equal to zero. Thus, it can be
0
observed that the utility of user 1 and 2 are the same and the
-0.5
-0.5 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 utility for users when the abscissa is 0km, 0.25km, 4.75km
Position (km)
and 5km, which indicates that the smart jammer is not willing
to jam anymore because of the high transmission cost.
Fig. 7. The path distribution of UAV group.

VI. C ONCLUSION
0.6

User 1
In our paper, we mainly focused on anti-jamming transmis-
0.5
User 2
sion problem with incomplete information. A multi-user case
was investigated, and co-channel mutual interference was also
0.4 taken into consideration. A Bayesian-Stackelberg game was
Utility of users

proposed in modeling the interactions between UAVs and the


0.3
smart jammer. Moreover, it was proved that the formulated
game can converge to the Stackelberg Equilibrium. An optimal
0.2
power control scheme for the UAV group was proposed and
0.1
simulation results could verify the convergence. The influence
of incomplete information, observation error together with the
0 locations on user-side were also discussed in the simulation
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
Center location of UAV group(x range from 0 to 5,y=0.5)(km)
part.

Fig. 8. The utility of users in the first path.


R EFERENCES
[1] L. Gupta, R. Jain, and G. Vaszkun, “Survey of important issues in UAV
communication networks,” IEEE Commun. Survey & Tutorials, vol. 18,
where there are two paths for the UAV group. Specifically, no. 2, pp. 1123-1152, Second Quarter. 2016.
the jammer is located in (2.5km, 2.5km). The ordinates of [2] Y. Zou, J. Zhu, X. Wang, et al., “A survey on wireless security: Technical
the UAV group center in path 1 and 2 are 0.5km and 0km challenges, recent advances, and future trends,” Proceedings of the IEEE,
vol. 104, no. 9, pp. 1727–1765, Sept. 2016.
respectively while the abscissa of the UAV group center is [3] C. Chen, M. Song, C. Xin, et al., “A game-theoretical anti-jamming
changed from 0km to 5km with interval of 0.25km. scheme for cognitive radio networks,” IEEE Network, vol. 27, no. 3, pp.
Fig. 8 and Fig. 9 show the variation trends of users’ utilities 22–27, May. 2013.
[4] L. Zhang, Z. Guan, and T. Melodia, “United against the enemy: Anti-
when center location changes with different flying paths. Some jamming based on cross-layer cooperation in wireless networks,” IEEE
significant results can be observed from these two figures: i) Trans. Wireless Commun., vol. 15, no. 8, pp. 5733–5747, Aug. 2016.

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access

11

[5] H. Zhu, C. Fang, Y. Liu, et al., “You can jam but you cannot hide: [29] X. Kang, R. Zhang, and M. Motani, “Price-based resource allocation
Defending against jamming attacks for geo-location database driven for spectrum-sharing femtocell networks: A stackelberg game approach,”
spectrum sharing,” IEEE J. Sel. Areas Commun., vol. 34, no. 10, pp. IEEE J. Sel. Areas Commun., vol. 30, no. 3, pp. 538–549, Apr. 2012.
2723–2737, Oct. 2016. [30] D. Yang, J. Zhang, X. Fang, et al., Optimal transmission power control
[6] S. D’Oro, E. Ekici, and S. Palazzo, “Optimal power allocation and in the presence of a smart jammer, in Proc. IEEE Globecom 2012, pp.
scheduling under jamming attacks,” IEEE/ACM Trans. Networking, 5506-5511.
vol. 25, no. 3, pp. 1310–1323, Jun. 2017. [31] D. Yang, G. Xue, J. Zhang, et al., Coping with a smart jammer in
[7] F. Yao, L. Jia, Y. Sun, et al., “A hierarchical learning approach wireless networks: A stackelberg game approach, IEEE Trans. Wireless
to anti-jamming channel selection strategies,” Wireless Netw., doi: Commun., vol. 12, no. 8, pp. 4038-4047, Aug. 2013.
10.1007/s11276-017-1551-9. [32] Y. Li, L. Xiao, J. Liu, et al., “Power control stackelberg game in
[8] G. Ding, Q. Wu, and J. Wang, Sensing confidence level-based joint cooperative anti-jamming communications,” in Proc. GAMENETS 2014,
spectrum and power allocation in cognitive radio networks, Wireless Pers. pp. 1–6.
Commun., vol. 72, no. 1, pp. 283-298, Jan. 2013. [33] L. Jia, F. Yao, Y. Sun, et al., “A hierarchical learning solution for anti-
[9] Y. Xu, G. Ren, J. Chen, L. Jia, and Y. Xu, “Anti-jamming transmission in jamming stackelberg game with discrete power strategies,” IEEE Wireless
UAV communication networks: a Stackelberg game approach,” in Proc. Commun. Lett., vol. 6, no. 6, pp. 818–821, Aug. 2017.
IEEE/CIC ICCC 2017, pp. 1-1 [34] Y. E. Sagduyu, R. A. Berry, and A. Ephremides, “Jamming games in
[10] Z. Han, et al., Game theory in wireless and communication networks. wireless networks with incomplete information,” IEEE Commun. Mag.,
Cambridge University Press, 2012. vol. 49, no. 8, pp. 112–118, Aug. 2011.
[35] E. Altman, K. Avrachenkov, and A. Garnaev, “Jamming in wireless
[11] Y. Xu, J. Wang, Q. Wu, et al., “A game-theoretic perspective on self-
networks under uncertainty,” in Proc. WiOpt 2009, pp. 1–7.
organizing optimization for cognitive small cells,” IEEE Commun. Mag.,
[36] L. Xiao, T. Chen, J. Liu, et al., “Anti-jamming transmission stackelberg
vol. 53, no. 7, pp. 100–108, Jul. 2015.
game with observation errors,” IEEE Commun. Lett., vol. 19, no. 6, pp.
[12] Y. Sun, Q. Wu, J. Wang, et al., “Veracity: Overlapping coalition 949–952, June. 2015.
formation-based double auction for heterogeneous demand and spectrum [37] L. Jia, F. Yao, Y. Sun, et al., “Bayesian stackelberg game for antijamming
reusability,” IEEE J. Sel. Areas Commun., vol. 34, no. 10, pp. 2690–2705, transmission with incomplete information,” IEEE Commun. Lett., vol. 20,
Oct. 2016. no. 10, pp. 1991–1994, Oct. 2016.
[13] H. Shao, Y. Sun, H. Zhao, et al., “Locally cooperative traffic-offloading [38] A. Goldsmith, Wireless communications. Cambridge University Press,
in multi-mode small cell networks: Potential games,” in Proc. WCSP 2005.
2015, pp. 1–5. [39] R. El-Bardan, S. Brahma and P. K. Varshney, “Strategic power allocation
[14] Y. Sun, J. Wang, F. Sun, et al., “Local altruistic coalition formation with incomplete information in the presence of a jammer,” IEEE Trans.
game for spectrum sharing and interference management in hyper-dense Commun., vol. 64, no. 8, pp. 3467-3479, Aug. 2016.
cloud-rans,” IET Commun., vol. 10, no. 15, pp. 1914–1921, 2016. [40] R. El-Bardan, S. Brahma and P. K. Varshney, “Power control with
[15] Q. Wu, Y. Xu, J. Wang, et al., “Distributed channel selection in time- jammer location uncertainty: A Game Theoretic perspective,” in Proc.
varying radio environment: Interference mitigation game with uncoupled CISS 2014, pp. 1-6.
stochastic learning,” IEEE Trans. Veh. Technol., vol. 62, no. 9, pp. 4524– [41] L. Yu, Q. Wu, Y. Xu, et al., “Power control games for multi-user anti-
4538, Nov. 2013. jamming communications,” Wireless Netw., doi: 10.1007/s11276-018-
[16] J. Zheng, Y. Cai, Y. Xu, et al., “Distributed channel selection for inter- 1664-9.
ference mitigation in dynamic environment: A game-theoretic stochastic [42] S. Boyd and L. Vandenberghe, Convex optimization. Cambridge Univer-
learning solution,” IEEE Trans. Veh. Technol., vol. 63, no. 9, pp. 4757– sity Press, 2004.
4762, Nov. 2014. [43] J. B. Rosen, Existence and uniqueness of equilibrium points for concave
[17] J. Zheng, Y. Cai, W. Yang, et al., “A fully distributed algorithm for N-person games, Ecnometrica, vol. 33, no. 3, pp. 520-534, Jul. 1965.
dynamic channel adaptation in canonical communication networks,” IEEE [44] Y. Xu, Q. Wu, L. Shen, et al.,“Opportunistic spectrum access with spatial
Wireless Commun. Lett., vol. 2, no. 5, pp. 491–494, Oct. 2013. reuse: graphical game and uncoupled learning solutions,”, IEEE Trans.
[18] L. Xiao, Anti-jamming Transmissions in Cognitive Radio Networks. Wireless Commun., vol. 12, no. 10, pp.4814-4826, Oct. 2013.
Springer, 2015, ISBN: 978-3-319-24290-3.
[19] L. Xiao, X. Lu, D. Xu, Y. Tang, L. Wang and W. Zhuang, “UAV Relay
in VANETs Against Smart Jamming with Reinforcement Learning,” IEEE
Trans. Veh. Technol., vol. PP, no. 99, pp. 1-1.
[20] E. Altman, K. Avrachenkov, and A. Garnaev, A jamming game in
wireless networks with transmission cost, in Proc. NET-COOP 2007, pp.
1-12.
[21] Y. Wu, B. Wang, K. Liu, et al., Anti-jamming games in multichannel
cognitive radio networks, IEEE J. Sel. Areas Commun., vol.30, no. 1, pp.
4-15, Jan. 2012.
[22] B. Wang, Y. Wu, K. Liu, et al., An anti-jamming stochastic game for
cognitive radio networks, IEEE J. Sel. Areas Commun., vol. 29, no. 4,
pp. 877-889, Apr. 2011.
[23] R. K. Sharma and D. B. Rawat, “Advances on security threats and
countermeasures for cognitive radio networks: A survey,” IEEE Commun.
Survey & Tutorials, vol. 17, no. 2, pp. 1023–1043, Second Quarter 2015.
[24] M. G. Oskoui, P. Khorramshahi, and J. A. Salehi, “Using game theory
to battle jammer in control channels of cognitive radio ad hoc networks,”
in Proc. IEEE ICC 2016 , pp. 1–5.
[25] M. K. Hanawal, M. J. Abdel-Rahman, and M. Krunz, “Joint adaptation
of frequency hopping and transmission rate for anti-jamming wireless
systems,” IEEE Trans. Mobile Comput., vol. 15, no. 9, pp. 2247–2259,
Sept. 2016.
[26] M. K. Hanawal, M. J. Abdel-Rahman, and M. Krunz, “Game theoretic
anti-jamming dynamic frequency hopping and rate adaptation in wireless
systems,” in Proc. WiOpt 2014, pp. 247–254.
[27] M. J. Abdel-Rahman and M. Krunz, “Game-theoretic quorum-based
frequency hopping for anti-jamming rendezvous in dsa networks,” in
Proc. IEEE DYSPAN 2014, pp. 248–258.
[28] Y. Sun, J. Wang, F. Sun, et al., “Energy-aware joint user scheduling
and power control for two-tier femtocell networks: A hierarchical game
approach,” IEEE Syst. J., vol. PP, no. 99, pp. 1–12, 2017.

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

S-ar putea să vă placă și