Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
144 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

A Game-Theoretic and Experimental Analysis of Energy-Depleting Underwater Jamming Attacks (1912.03200v2)

Published 6 Dec 2019 in cs.NI

Abstract: Security aspects in underwater wireless networks have not been widely investigated so far, despite the critical importance of the scenarios in which these networks can be employed. For example, an attack to a military underwater network for enemy targeting or identification can lead to serious consequences. Similarly, environmental monitoring applications such as tsunami prevention are also critical from a public safety point of view. In this work, we assess a scenario in which a malicious node tries to perform a jamming attack, degrading the communication quality of battery-powered underwater nodes. The legitimate transmitter may use packet level coding to increase the chances of correctly delivering packets. Because of the energy limitation of the nodes, the jammer's objective is twofold: disrupting the communication and reducing the lifetime of the victim by making it send more redundancy. We model the jammer and the transmitter as players in a multistage game, deriving the optimal strategies. We evaluate the performance in a model-based scenario and using real experimental data, performing a sensitivity analysis to evaluate the performance of the strategies if the real channel model is different from the one they use.

Citations (22)

Summary

We haven't generated a summary for this paper yet.