Documente Academic
Documente Profesional
Documente Cultură
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access
Abstract—This paper focuses on the anti-jamming transmis- be triggered, which is also a factor that deteriorates the system
sion problem in unmanned aerial vehicle (UAV) communication performance.
networks. Considering the incomplete information constraint and Since jamming attacks pose significant threat to the wireless
the co-channel mutual interference, a Bayesian Stackelberg game
is proposed to formulate the competitive relations between UAVs communication security, more attention has been paid to anti-
(users) and the jammer. Specifically, the jammer acts as the jamming studies in recent years [2]. A large number of anti-
leader, whereas users act as followers of the proposed game. jamming countermeasures were proposed for the purpose of
Based on their utility functions, the jammer and users select reducing or avoiding the influences from malicious jammer,
their optimal power control strategies respectively. In addition, e.g., [3]–[7]. In the anti-jamming transmission filed, there are
the observation error is also investigated in this paper. Due to the
incomplete information constraint and the existence of co-channel still several problems remaining unsolved. Firstly, it should
mutual interference, it is challenging to obtain Stackelberg Equi- be noticed that most existing studies rarely considered multi-
librium (SE) of the proposed game. Thus, a sub-gradient based users case in anti-jamming transmission field, and the co-
Bayesian Stackelberg iterative algorithm (SBBSIA) is proposed channel mutual interference, as an indispensable factor, has
to obtain SE. Finally, simulations are conducted to demonstrate hardly been investigated neither. Secondly, most existing work
the performance of the proposed algorithm, and the impact of
incomplete information and observation error on users’ utilities made an assumption that user-side and jammer-side can obtain
are also presented. complete information of their opponents, which is not realistic
in some cases.
Index Terms—Anti-jamming, unmanned aerial vehicle,
Bayesian Stackelberg game, power control, incomplete informa-
In this paper, we mainly concentrate on the anti-jamming
tion. transmission problem in UAV communication networks, and a
Bayesian Stackelberg game approach is proposed. The reason
for using this game model is twofold. Firstly, considering the
I. I NTRODUCTION hierarchical interactions between UAV-side and jammer-side
in the anti-jamming transmission field, and that each decision-
NMANNED aerial vehicles (UAV) communication net-
U works have been a hot topic recently [1]. In this re-
gard, anti-jamming transmission is playing an increasingly
maker makes decisions spontaneously and independently, S-
tackelberg game is a befitting game model to formulate.
Secondly, due to the mobility of UAVs, the acquisition of
important role in building UAV communication networks. information is more difficult in UAV communication networks
When UAVs suffer serious jamming, they can no longer build than in traditional wireless communication networks, which is
connections to other UAVs as well as the control site, which the main cause of incomplete information constraint.
is a crucial problem to be solved. In addition, when several In addition, we focus a UAV power transmission system
UAVs share one common channel, mutual interference would where jamming attack and mutual interference exist simul-
taneously. For jamming attack, the smart jammer, who can
This work was supported by the National Natural Science Foundation of
China under Grant No. 61771488, No. 61671473 and No. 61631020, in adjust its strategy adaptively, is mainly investigated. Whereas
part by the Natural Science Foundation for Distinguished Young Scholars for mutual interference, the co-channel interference is mainly
of Jiangsu Province under Grant No. BK20160034, and in part by the Open considered.
Research Foundation of Science and Technology on Communication Networks
Laboratory. (Corresponding author: Guochun Ren and Yuhua Xu.)
While analyzing all these factors mentioned above, we
Yifan Xu and Yuhua Xu are with the College of Communications En- formulate a Bayesian Stackelberg game in UAV communi-
gineering, Army Engineering University of PLA Nanjing 210000, China, cation networks to cope with the anti-jamming transmission
and the Science and Technology on Communication Networks Laborato-
ry, Shijiazhuang 050002, China (e-mail: yifanxu1995@163.com; yuhuaena-
problem among UAVs. Besides, we propose a sub-gradient
tor@gmail.com;). [8] based Bayesian Stackelberg iterative algorithm (SBBSIA),
Guochun Ren, Jin Chen, Yunpeng Luo, Luliang Jia, Yang Yang with which UAVs and the jammer can adjust their strategies
are with the College of Communications Engineering, Army Engi-
neering University of PLA Nanjing 210000, China (e-mail: guochun-
to be optimal. The main contributions of this paper can be
ren@yeah.net; chenjin99@263.net; 349492881@qq.com, jiallts@163.com; summarized as follows:
sheep 1009@163.com; ). • The anti-jamming transmission issue in UAV networks
Xin Liu is with the College of Information Science and Engi-
neering, Guilin University of Technology, Guilin 541000, China (e- is investigated using a Bayesian Stackelberg game, with
mail:liuxin2017125@glut.edu.cn). multi-users case taken into consideration. Besides, the co-
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access
channel mutual interference among users is also investi- was proposed to fight against sweep attack in cognitive ad-
gated in anti-jamming transmission field. hoc networks. In [25] and [26], Markov game was proposed
• The Stackelberg Equilibrium (SE) of the proposed game to formulate as well as to obtain the optimal strategy for the
is obtained. For the purpose of obtaining the SE, the legitimate transmitter. In [27], a three-player game consisting
SBBSIA algorithm is designed. In addition, the existence of two secondary users and a jammer was formulated with the
as well as the uniqueness of SE have been proved. awareness of ”rendezvous” channel.
• The process of the scheme is presented, and masses of In further analysis, considering the hierarchical interactions
simulations have been conducted to support the theoret- between user-side and jammer-side, Stackelberg game [28]
ical analysis. Simulation results show that the proposed [29] was formulated in anti-jamming transmission field. In
SBBSIA algorithm is effective. [30] [31], D. Yang et al. formulated the anti-jamming problem
Note that an anti-jamming Stackelberg game approach in using a Stackelberg game approach. The user was assumed
UAV communication networks was presented in our previous to be the leader who took actions firstly, while the smart
work [9], and the main differences and new contributions are: jammer acted secondarily as the follower. The strategy action
(i) Incomplete information and observation error are intro- of the jammer was based on the strategy action of the user. In
duced in this work. (ii) By introducing incomplete information [32], the author proposed an anti-jamming Stackelberg game
and observation error, it brings difficulty in analyzing the game in cooperative wireless networks, viewing the relay node as
model, and the model proposed in [9] can not be employed the vice leader of the game. In [33], a hierarchical learning
directly. Moreover, a Bayesian Stackelberg approach can be solution on discrete power strategies was proposed for anti-
found in our work [37]. The main differences are: (i) Multi- jamming Stackelberg game.
user case is mainly considered in our paper, while one-user There are also some literature taking incomplete information
case was investigated in [37]. (ii) By introducing the multi- into consideration. In [34], it was discussed that users did not
users case, co-channel mutual interference is also considered. have complete information about the traffic dynamics, channel
The rest part of this paper is organized as follows. In Section characteristics and other important parameters of other users
II, we review the related work. In Section III, the system in wireless networks, based on which, a jamming game was
model and problem formulation are presented. In Section IV, modeled. In [35], the authors solved the problem from game-
the anti-jamming Bayesian Stackelberg game with incomplete theoretic perspective under the assumption that the user knew
information is presented, and the operation process of the little about the distribution of jamming as well as certain
proposed game is shown. In Section V, plentiful simulations information of fading channel. Moreover, In [36], Xiao et
are conducted, and the convergence as well as the influence al. viewed the observation error as a influence factor while
of incomplete information and observation error are demon- proposing a Stackelberg game model containing one jammer
strated. In the end, we make conclusion in Section VI. and one user, and the power constraint of each side was inves-
tigated. In [37], Jia et al. applied an anti-jamming Bayesian
II. R ELATED W ORK Stackelberg game approach to investigate the best transmission
Under the background of wireless communication networks, schemes for both players. Theoretically, the demonstration of
abundant studies with respect to the anti-jamming transmission Bayesian Stackelberg game was also given smoothly.
problem have been proposed. For example, a network perfor- Different from most of the existing work, in this paper,
mance maximization problem under the existence of jammer we formulate the anti-jamming transmission problem as a
was modeled as a joint power control and user scheduling opti- one-leader multi-follower Bayesian Stackelberg game in UAV
mization in [6]. While considering the competition between the communication networks. Besides, the existence of malicious
user-side and jammer-side, game theory [10]–[17] is a fantastic jammer and co-channel mutual interference is considered
theoretical tool in modeling the jamming and anti-jamming simultaneously.
problems. In [18], the author applied game theory approaches
to study the competitive interactions between secondary user III. S YSTEM M ODEL AND P ROBLEM F ORMULATION
and jammer, and game theoretic solutions were also provided
in anti-jamming CRNs. In [19], the author proposed a novelty A. System Model
scheme which uses unmanned aerial vehicles (UAVs) to relay The system model is shown in Fig.1. It is assumed that there
the message of an OBU (onboard units) and to improve are one jammer and one UAV group which includes n users.
the communication performance of VANETs against smart A transmitter-receiver pair is treated as one user in the system.
jammers. Moreover, an anti-jamming UAV relay game was The UAV group is assigned with one common channel while
formulated. In [20], a non-zero-sum power control game was flying towards its destination. Simultaneously, the transmitters
modeled for the anti-jamming issue, with transmission cost in the group are transmitting to the receivers. In general case,
taken into consideration. In [21], a zero-sum game which when users are transmitting, the malicious jammer will disturb
provided several defense schemes for user-side was modeled the normal transmission among users. Both the smart jammer
in cognitive radio networks. Considering the time-varying and users can adjust their transmission power adaptively. In
spectrum environment, an anti-jamming stochastic game [22] the system model, the smart jammer has the ability to learn
was also proposed. In cognitive radio communications, the and to sense when and where the user would start transmitting,
interaction between secondary users and attackers was for- and it has the intention to jam the channel assigned to the UAV
mulated as a dogfight game [23]. In [24], a stochastic game group.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access
Based on the Bayesian Stackelberg game, we propose a one- Similarly, the mutual interference gain θm,i has W s-
leader, multi-followers scheme in which the smart jammer acts tates which are θm,i (1) , ..., θm,i (w) , ..., θm,i (W ) , the
firstly as leader of the game whereas users act secondarily after probabilities are σθm,i (1) , ..., σθm,i (w) , ..., σθm,i (W ), and
obtaining the strategy of the leader. In addition, the incomplete ∑
W
σθm,i (w) = 1.
information constraint is also formulated. Mathematically, the w=1
Bayesian Stackelberg game is denoted as: Considering the independent relationship between αi and
{ } θm,i , the smart jammer’s utility function is redefined as:
G = N , J, {Pi }i∈N , {J } , {Ui }i∈N , {Vj } , (6)
∑
N ∑
K ∑
W
where {J } and {Pi } denote the jammer’s and users’ strategy Vj (J, P1 , ..., PN ) = − σαi (k) σθm,i (w)·
i=1 k=1 w=1
space set. Specifically, the strategy set of the smart jammer αi∑
(k)Pi
log2 (1 + )− Cj J.
can be denoted as: N0 +βi J+ Pm θm,i (w)
m̸=i
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access
best response independently for the purpose of maximizing When transmission power P−i and J˜ are known by user i,
its utility. Hence, the users’ strategies are firstly studied, and Pi can be obtained from equation (22).
then a non-cooperative game is formulated to describe the The optimization problem for any user is a convex optimiza-
competition among users, which is expressed as follows: tion problem, and the utility function holds a strong duality.
{ } Moreover, the duality gap is zero. Thus, the optimal solution
Gf = N , {Pi }i∈N , {Ui }i∈N . (15)
for the dual problem is the same as initial problem proposed.
When given the transmission power of the smart jammer and It is found that if there are more than three users in the
other users except user i, the user i’s optimization problem is UAV group, the optimization problem do not have a analytic
represented as: solution, and the numerical solution can been obtained instead.
( )
Pi = arg max Ui Pi , P−i , J˜ ,
(16)
s.t. 0 ≤ Pi ≤ Pmax . B. Leader Sub-game
Theorem 1: For user i, the best strategy is obtained through In our work, the smart jammer acts as the leader. Similar
solving the following equation: to the followers, the leader’s game can be formulated as:
∑
G
σβi (g) αi GJ = {J, J , Vj } . (23)
( )
g=1 ∑
ln 2 N0 + βi (g) J˜ + Pm θm,i +αi Pi (17) Usually, the jammer’s optimal transmission power is able
m̸=i to be obtained after the following optimization problem being
− (Cu + λi ) = 0. solved:
Proof: For user i, the utility function is concave while J = arg max Vj (P1 (J) , ..., PN (J) , J)
(24)
taking the second partial derivative of Pi , since: s.t. 0 ≤ J ≤ Jmax
∂ 2 Ui ∑G
σβi (g) αi 2
− For the smart jammer, a discussion on the users’ actions
= ( )2 .
∂Pi 2 g=1 ∑ which are learned by the smart jammer is firstly made. As for
ln 2 N0 + βi (g) J˜ + Pm θm,i + αi Pi user i, the best response is shown in equation (17). However,
m̸=i
as for the smart jammer, the information of itself is completely
/ (18)
known, and the observation error can be eliminated as well.
It is obvious that ∂ 2 Ui ∂Pi 2 < 0 constantly established,
Thus, the estimation of the user i’s action from the smart
and the utility optimization problem of user i can be viewed
jammer’s perspective can be denoted as:
as a convex problem. Moreover, the user i’s utility function is
concave so that it can get the only one maximal value when αi
( ) − (Cu + λi ) = 0.
differentiating Ui in regard to Pi and setting the result equal ∑
to 0. Taking nonnegative dual variable λi into consideration, ln 2 N0 + βi J + Pm θm,i +αi Pi
m̸=i
the Lagrange function of user i is represented as: (25)
( )
Li Pi , P−i , J˜ = Then an analytic solution of the user i which is obtained in
the jammer-side can be expressed as:
∑
G
α i Pi ∑ +
σβi (g)log2 (1 + ∑ ) (19) N0 + βi J + Pm θm,i
g=1
N0 + βi (g) J˜ + Pm θm,i 1 m̸=i
m̸=i Pi (J) = − ,
ln 2 (Cu + λi ) αi
−Cu Pi + λi (Pmax − Pi ) .
The Lagrange dual function is shown as follows: (26)
( ) + ∆
where (·) = max (·, 0). According to (26), if the transmission
˜ λi .
Di (λi ) = max Li Pi , P−i , J, (20)
Pi ≥0 power of the jammer is too large, which is shown as follows:
Moreover, the dual problem is: ∑
1 αi
d∗ = min Di (λi ) . (21) J≥ − N0 + Pm θm,i , (27)
λi ≥0 βi ln 2 (Cu + λi )
m̸=i
On the basis of Karush-Kuhn-Tucker (KKT) conditions [8]
[42], by setting the resulting derivative equal to 0, which is then from the jammer’s perspective, user i will stop trans-
shown as: mitting which means Pi (J) = 0. Generally, let Λi , i ∈ N
˜ denote the ith threshold that influence the decision of the smart
∂Li (Pi , P−i , J) jammer, which can be expressed as:
=
∂Pi [ ( )]
∑G
σβi (g)αi ∑
( ) Λi = βi ln 2(Cu +λi ) − N0 +
1 αi
Pm θm,i ,i ∈ N,
(22)
g=1 ∑ m̸=i
ln 2 N0 + βi (g)J˜ + Pm θm,i + αi Pi Λmin = min (Λ1 , ..., ΛN ) ,
m̸=i
Λmax = max (Λ1 , ..., ΛN ) .
−Cu − λi = 0. (28)
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access
Position (km)
is analyzed, which is shown as follows: 2 Jammer
[ ]+
λi (t + 1) = λi (t) − ∆tλi (Pmax − Pi ∗ (t + 1)) , (36) 1.5 UAV group
[ ]+ 1
µ (t + 1) = µ (t) − ∆tµ (Jmax − J ∗ (t + 1)) . (37)
0.5 User 1 User 2
On the basis of the theoretical analysis in [8], the con- 0
vergence of the sub-gradient iterative can be guaranteed on -0.5
condition that the iteration step ∆tλi and ∆tµ are chosen -0.5 0 0.5 1 1.5 2 2.5 3 3.5 4
Position (km)
appropriately.
Combine the analysis on the existence and uniqueness of Fig. 3. Locations of the jammer and the UAV group.
SE, the operation process of iterative Algorithm 1, and the
convergence proof of the sub-gradient update method, we can
make the conclusion that the proposed algorithm converges As is shown in the Repeat iterations step (7), the com-
to the SE, and it has also been verified that the Algorithm 1 putation complexity of computing J ∗ (t + 1) is O (C4 )
converges quickly in the simulation parts. , where C4 is a constant determined by equation (33) in
our paper.
F. Complexity Analysis of the Proposed Algorithm 5) The part of sub-gradient update:
[ ]+
In this part, we analyze the computation complexity of the λi (t + 1) = λi (t) − ∆tλi (Pmax − Pi ∗ (t + 1)) ,
SBBSIA algorithm. Motivated by [44], denote the number of
convergence iterations as Nit , and the number of users as N , [ ]+ (40)
µ (t + 1) = µ (t) − ∆tµ (Jmax − J ∗ (t + 1)) . (41)
the computational complexity is shown in Table I. Moreover,
the details are shown as follows: As is shown in the Repeat iterations step (9) and
1) The computation complexity of obtaining the observa- step (11), the computation complexity for every user
tion value J˜ (t) for every user i is O (C1 ), where C1 is i to compute λi (t + 1), and for the smart jammer to
a constant determined by the observation process. Then compute µ (t + 1) is C5 , where C5 is a small constant.
the computation for all users to obtain J˜ (t) is O (N C1 ). Thus, the computational complexity for all players to
This part is shown in the Repeat iterations step (3). update sub-gradient is O (N C5 + C5 ).
2) The computation (
complexity of computing) In a word, the total computation complexity of the proposed
Pi ∗ (t + 1) = arg max Li Pi , P−i (t) , J˜ (t) , λi (t) algorithm can be expressed as:
for every user i is O (C2 ), where C2 is a constant Calg =
determined by the computing process shown in Nit (O (N C1 ) + O (N C2 ) + O (N C3 ) (42)
equation (22). Then the computation for all users to +O (C4 ) + O (N C5 + C5 ))
obtain Pi ∗ (t + 1) is O (N C2 ). This part is shown in
the Repeat iterations step (4). It is shown that the computation complexity is related to
3) The process of computing the optimal strategies of the iterations Nit and the user number N . In our paper, the
followers in leader’s sight: algorithm can converge quickly with a small Nit , and the user
number N is assumed to be 2. Thus, the proposed Algorithm
P (J, t + 1) =
i ∑ + 1 has relatively low complexity.
N0 +βi J+ Pm (t)θm,i
(38)
1
−
m̸=i
.
ln 2(Cu +λi (t)) αi V. S IMULATION R ESULTS
In this part, simulations results are presented. The location
As is shown in the Repeat iterations step (5), for setting is shown in Fig. 3. Assuming there are four nodes
every user i, the computation complexity of computing in the UAV group, two of them constitute user 1, whereas
Pi (J, t + 1) is O (C3 ), where C3 is a small constant. the rest constitute user 2. The coordinates of the transmitter
The demonstration is shown in equation (26). Thus, and receiver in user 1 are (0km, 1km) and (0km, 0km). The
the computation for all users to obtain Pi (J, t + 1) is coordinates of the transmitter and receiver in user 2 are (1km,
O (N C3 ). 1km) and (1km, 0km). The jammer is located in (2.5km,
4) The computation complexity of computing the jammers 2.5km).
best strategy: The parameters are given as follow: δi = δJ,i = δm,i =
J ∗ (t + 1) = 2, i = 1, ..., N ; m = 1, ..., i − 1, i + 1, ..., N. N0 = -174
arg max Lj (J, Pi (J, t + 1) , ..., PN (J, t + 1) , µ (t)) . dBm, Cu =0.12, Cj =0.05, di , dJ,i and dm,i can be calculated
(39) through the locations given in Fig. 3. Thus, the values of
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access
TABLE I
C OMPLEXITY ANALYSIS OF THE PROPOSED ALGORITHM .
Computation Complexity
J˜ (
(t) ) O (Nu C1 )
Pi ∗ (t + 1) = arg max Li Pi , P−i (t) , J˜ (t) , λi (t) O (Nu C2 )
∑ +
N0 +βi J+ Pm (t)θm,i
Pi (J, t + 1) = ln 2(C
m̸=i
1
− O (Nu C3 )
u +λi (t)) αi
˜ er=0.1
J − J 0.55 er=0.2
er=0.3
er = . (43)
J
Utility of user 1
0.5
A. Convergence of the Proposed Game
The convergence to the SE can be shown in this part for 0.45
B. Influence of Incomplete Information and Observation Error power control strategies of users will be. Thus, observation
The influence of incomplete information and observation error on the jammer will influence the utility of users as shown
error on users are shown in Fig. 5 and Fig. 6. The different in simulation results.
values of fluctuation coefficient fu and observation error
coefficient er are compared. With the increase of fu , the utility
of both user 1 and user 2 increased, while with the increase of C. The Influence of Locations
er , the utility of both user 1 and user 2 will decrease instead. Without loss of generality, the flying path should be con-
As a result, the fluctuation coefficient fu reflects the accura- sidered due to the fact that the distance variation between
cy degree of information obtained by the jammer. If fu is too the users and jammer may influence the utility of the user.
large, it means the decline of the jamming ability. Observation The mobility of users in the scenario shown in Fig. 3 is not
error coefficient er reflects the observation accuracy of user- considered, i.e., the UAV can hover motionless in the air.
side. The smaller the observation error is, the more accurate Thus, we evaluate the utility performance depicted in Fig. 7
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access
10
0.5 0.65
Utility of users
0.45
0.3
0.4
0.25
0.35
0.2
0.3
0.15
0.25
0.1 0.2
0.05 0.15
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
Fluctuation coefficient ( f u) Center location of UAV group(x range from 0 to 5,y=0)(km)
Fig. 6. Influence of incomplete information and observation error on user 2. Fig. 9. The utility of users in the second path.
4.5
There is a downward trend in the utilities of the users when
4
the abscissa of the center location ranges from 0km to 2km.
3.5 The reason is that the decrease of distance between users and
3
Jammer
the jammer leads to the enhancement of the jamming ability
which results in the reduction of utility and vice versa. ii)
Position (km)
2.5
VI. C ONCLUSION
0.6
User 1
In our paper, we mainly focused on anti-jamming transmis-
0.5
User 2
sion problem with incomplete information. A multi-user case
was investigated, and co-channel mutual interference was also
0.4 taken into consideration. A Bayesian-Stackelberg game was
Utility of users
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2828033, IEEE Access
11
[5] H. Zhu, C. Fang, Y. Liu, et al., “You can jam but you cannot hide: [29] X. Kang, R. Zhang, and M. Motani, “Price-based resource allocation
Defending against jamming attacks for geo-location database driven for spectrum-sharing femtocell networks: A stackelberg game approach,”
spectrum sharing,” IEEE J. Sel. Areas Commun., vol. 34, no. 10, pp. IEEE J. Sel. Areas Commun., vol. 30, no. 3, pp. 538–549, Apr. 2012.
2723–2737, Oct. 2016. [30] D. Yang, J. Zhang, X. Fang, et al., Optimal transmission power control
[6] S. D’Oro, E. Ekici, and S. Palazzo, “Optimal power allocation and in the presence of a smart jammer, in Proc. IEEE Globecom 2012, pp.
scheduling under jamming attacks,” IEEE/ACM Trans. Networking, 5506-5511.
vol. 25, no. 3, pp. 1310–1323, Jun. 2017. [31] D. Yang, G. Xue, J. Zhang, et al., Coping with a smart jammer in
[7] F. Yao, L. Jia, Y. Sun, et al., “A hierarchical learning approach wireless networks: A stackelberg game approach, IEEE Trans. Wireless
to anti-jamming channel selection strategies,” Wireless Netw., doi: Commun., vol. 12, no. 8, pp. 4038-4047, Aug. 2013.
10.1007/s11276-017-1551-9. [32] Y. Li, L. Xiao, J. Liu, et al., “Power control stackelberg game in
[8] G. Ding, Q. Wu, and J. Wang, Sensing confidence level-based joint cooperative anti-jamming communications,” in Proc. GAMENETS 2014,
spectrum and power allocation in cognitive radio networks, Wireless Pers. pp. 1–6.
Commun., vol. 72, no. 1, pp. 283-298, Jan. 2013. [33] L. Jia, F. Yao, Y. Sun, et al., “A hierarchical learning solution for anti-
[9] Y. Xu, G. Ren, J. Chen, L. Jia, and Y. Xu, “Anti-jamming transmission in jamming stackelberg game with discrete power strategies,” IEEE Wireless
UAV communication networks: a Stackelberg game approach,” in Proc. Commun. Lett., vol. 6, no. 6, pp. 818–821, Aug. 2017.
IEEE/CIC ICCC 2017, pp. 1-1 [34] Y. E. Sagduyu, R. A. Berry, and A. Ephremides, “Jamming games in
[10] Z. Han, et al., Game theory in wireless and communication networks. wireless networks with incomplete information,” IEEE Commun. Mag.,
Cambridge University Press, 2012. vol. 49, no. 8, pp. 112–118, Aug. 2011.
[35] E. Altman, K. Avrachenkov, and A. Garnaev, “Jamming in wireless
[11] Y. Xu, J. Wang, Q. Wu, et al., “A game-theoretic perspective on self-
networks under uncertainty,” in Proc. WiOpt 2009, pp. 1–7.
organizing optimization for cognitive small cells,” IEEE Commun. Mag.,
[36] L. Xiao, T. Chen, J. Liu, et al., “Anti-jamming transmission stackelberg
vol. 53, no. 7, pp. 100–108, Jul. 2015.
game with observation errors,” IEEE Commun. Lett., vol. 19, no. 6, pp.
[12] Y. Sun, Q. Wu, J. Wang, et al., “Veracity: Overlapping coalition 949–952, June. 2015.
formation-based double auction for heterogeneous demand and spectrum [37] L. Jia, F. Yao, Y. Sun, et al., “Bayesian stackelberg game for antijamming
reusability,” IEEE J. Sel. Areas Commun., vol. 34, no. 10, pp. 2690–2705, transmission with incomplete information,” IEEE Commun. Lett., vol. 20,
Oct. 2016. no. 10, pp. 1991–1994, Oct. 2016.
[13] H. Shao, Y. Sun, H. Zhao, et al., “Locally cooperative traffic-offloading [38] A. Goldsmith, Wireless communications. Cambridge University Press,
in multi-mode small cell networks: Potential games,” in Proc. WCSP 2005.
2015, pp. 1–5. [39] R. El-Bardan, S. Brahma and P. K. Varshney, “Strategic power allocation
[14] Y. Sun, J. Wang, F. Sun, et al., “Local altruistic coalition formation with incomplete information in the presence of a jammer,” IEEE Trans.
game for spectrum sharing and interference management in hyper-dense Commun., vol. 64, no. 8, pp. 3467-3479, Aug. 2016.
cloud-rans,” IET Commun., vol. 10, no. 15, pp. 1914–1921, 2016. [40] R. El-Bardan, S. Brahma and P. K. Varshney, “Power control with
[15] Q. Wu, Y. Xu, J. Wang, et al., “Distributed channel selection in time- jammer location uncertainty: A Game Theoretic perspective,” in Proc.
varying radio environment: Interference mitigation game with uncoupled CISS 2014, pp. 1-6.
stochastic learning,” IEEE Trans. Veh. Technol., vol. 62, no. 9, pp. 4524– [41] L. Yu, Q. Wu, Y. Xu, et al., “Power control games for multi-user anti-
4538, Nov. 2013. jamming communications,” Wireless Netw., doi: 10.1007/s11276-018-
[16] J. Zheng, Y. Cai, Y. Xu, et al., “Distributed channel selection for inter- 1664-9.
ference mitigation in dynamic environment: A game-theoretic stochastic [42] S. Boyd and L. Vandenberghe, Convex optimization. Cambridge Univer-
learning solution,” IEEE Trans. Veh. Technol., vol. 63, no. 9, pp. 4757– sity Press, 2004.
4762, Nov. 2014. [43] J. B. Rosen, Existence and uniqueness of equilibrium points for concave
[17] J. Zheng, Y. Cai, W. Yang, et al., “A fully distributed algorithm for N-person games, Ecnometrica, vol. 33, no. 3, pp. 520-534, Jul. 1965.
dynamic channel adaptation in canonical communication networks,” IEEE [44] Y. Xu, Q. Wu, L. Shen, et al.,“Opportunistic spectrum access with spatial
Wireless Commun. Lett., vol. 2, no. 5, pp. 491–494, Oct. 2013. reuse: graphical game and uncoupled learning solutions,”, IEEE Trans.
[18] L. Xiao, Anti-jamming Transmissions in Cognitive Radio Networks. Wireless Commun., vol. 12, no. 10, pp.4814-4826, Oct. 2013.
Springer, 2015, ISBN: 978-3-319-24290-3.
[19] L. Xiao, X. Lu, D. Xu, Y. Tang, L. Wang and W. Zhuang, “UAV Relay
in VANETs Against Smart Jamming with Reinforcement Learning,” IEEE
Trans. Veh. Technol., vol. PP, no. 99, pp. 1-1.
[20] E. Altman, K. Avrachenkov, and A. Garnaev, A jamming game in
wireless networks with transmission cost, in Proc. NET-COOP 2007, pp.
1-12.
[21] Y. Wu, B. Wang, K. Liu, et al., Anti-jamming games in multichannel
cognitive radio networks, IEEE J. Sel. Areas Commun., vol.30, no. 1, pp.
4-15, Jan. 2012.
[22] B. Wang, Y. Wu, K. Liu, et al., An anti-jamming stochastic game for
cognitive radio networks, IEEE J. Sel. Areas Commun., vol. 29, no. 4,
pp. 877-889, Apr. 2011.
[23] R. K. Sharma and D. B. Rawat, “Advances on security threats and
countermeasures for cognitive radio networks: A survey,” IEEE Commun.
Survey & Tutorials, vol. 17, no. 2, pp. 1023–1043, Second Quarter 2015.
[24] M. G. Oskoui, P. Khorramshahi, and J. A. Salehi, “Using game theory
to battle jammer in control channels of cognitive radio ad hoc networks,”
in Proc. IEEE ICC 2016 , pp. 1–5.
[25] M. K. Hanawal, M. J. Abdel-Rahman, and M. Krunz, “Joint adaptation
of frequency hopping and transmission rate for anti-jamming wireless
systems,” IEEE Trans. Mobile Comput., vol. 15, no. 9, pp. 2247–2259,
Sept. 2016.
[26] M. K. Hanawal, M. J. Abdel-Rahman, and M. Krunz, “Game theoretic
anti-jamming dynamic frequency hopping and rate adaptation in wireless
systems,” in Proc. WiOpt 2014, pp. 247–254.
[27] M. J. Abdel-Rahman and M. Krunz, “Game-theoretic quorum-based
frequency hopping for anti-jamming rendezvous in dsa networks,” in
Proc. IEEE DYSPAN 2014, pp. 248–258.
[28] Y. Sun, J. Wang, F. Sun, et al., “Energy-aware joint user scheduling
and power control for two-tier femtocell networks: A hierarchical game
approach,” IEEE Syst. J., vol. PP, no. 99, pp. 1–12, 2017.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.