Systems Engineering and Electronics ›› 2024, Vol. 46 ›› Issue (4): 1448-1455.doi: 10.12305/j.issn.1001-506X.2024.04.34
• Communications and Networks • Previous Articles Next Articles
Ziwen SUN1,2,*, Chenxi YANG1
Received:
2022-11-29
Online:
2024-03-25
Published:
2024-03-25
Contact:
Ziwen SUN
CLC Number:
Ziwen SUN, Chenxi YANG. Two-layer collaborative Stackelberg game of IWSNs anti-mobile jamming node[J]. Systems Engineering and Electronics, 2024, 46(4): 1448-1455.
Table 2
Cooperative interference power of cooperative nodes of coordinate pairs of different positions W"
(攻击节点, sink节点)/m | 迭代次数 | |||||||||
1 | 2 | 3 | 5 | 7 | 9 | 11 | 13 | 15 | 17 | |
(0, 0), (40, 0) | 0.025 2 | 0.046 3 | 0.049 5 | 0.051 3 | 0.052 3 | 0.053 0 | 0.053 3 | 0.053 5 | 0.053 7 | 0.053 9 |
(80, 40), (40, 0) | 0.024 4 | 0.045 3 | 0.047 9 | 0.052 3 | 0.054 8 | 0.055 3 | 0.055 7 | 0.056 1 | 0.056 2 | 0.056 3 |
(20, 20), (120, 70) | 0.023 9 | 0.044 6 | 0.049 8 | 0.054 6 | 0.056 5 | 0.057 2 | 0.057 6 | 0.057 7 | 0.057 7 | 0.057 8 |
(0, 0), (120, 0) | 0.022 5 | 0.042 7 | 0.049 3 | 0.055 9 | 0.058 7 | 0.059 9 | 0.060 5 | 0.060 8 | 0.060 9 | 0.061 0 |
(160, 120), (40, 60) | 0.021 0 | 0.040 7 | 0.048 3 | 0.056 2 | 0.059 8 | 0.061 7 | 0.062 7 | 0.063 2 | 0.063 4 | 0.063 6 |
(200, 200), (80, 80) | 0.019 5 | 0.038 4 | 0.046 6 | 0.055 5 | 0.060 0 | 0.062 4 | 0.063 9 | 0.064 7 | 0.065 2 | 0.065 5 |
Table 3
Sending power of sink node of different coordinate pairs of different positions with or without collaboration W"
(攻击节点, sink节点)/m | 无协作 | 有协作 |
(0, 0), (40, 0) | 0.031 8 | 0.083 2 |
(80, 40), (40, 0) | 0.034 0 | 0.080 2 |
(20, 20), (120, 70) | 0.034 2 | 0.078 2 |
(0, 0), (120, 0) | 0.036 8 | 0.073 6 |
(160, 120), (40, 60) | 0.039 6 | 0.069 3 |
(200, 200), (80, 80) | 0.042 3 | 0.065 3 |
1 |
FAUZIA I , MUDASSAR A , MUHAMMAD N , et al. Physical layer security for beyond 5G/6G networks: emerging technologies and future directions[J]. Journal of Network and Computer Applications, 2022, 206, 103431.
doi: 10.1016/j.jnca.2022.103431 |
2 |
孙子文, 徐宜敏. 无线传感器网络的混合抗干扰攻击方法[J]. 系统工程与电子技术, 2019, 41 (9): 2132- 2140.
doi: 10.3969/j.issn.1001-506X.2019.09.29 |
SUN Z W , XU Y M . Hybrid anti-jamming attack method for wireless sensor networks[J]. Systems Engineering and Electronics, 2019, 41 (9): 2132- 2140.
doi: 10.3969/j.issn.1001-506X.2019.09.29 |
|
3 |
SALAM H A , KHAN B M . IWSN-standards, challenges and future[J]. IEEE Potentials, 2016, 35 (2): 9- 16.
doi: 10.1109/MPOT.2015.2422931 |
4 |
SU Y S , LIU Y , FAN R , et al. A secure relay selection scheme based on cooperative jamming for underwater acoustic sensor networks[J]. Computer Networks, 2022, 217, 109307.
doi: 10.1016/j.comnet.2022.109307 |
5 |
DARSENA D , GELLI G , IUDICE I , et al. Detection and blind channel estimation for UAV-aided wireless sensor networks in smart cities under mobile jamming attack[J]. IEEE Internet of Things Journal, 2022, 9 (14): 11932- 11950.
doi: 10.1109/JIOT.2021.3132381 |
6 | HAN H Z , HUANG Y C , HU H , et al. Mobile jammer enabled secure UAV communication with short packet transmission[J]. AEU-International Journal of Electronics and Communications, 2022, 157, 154434. |
7 |
SHEN D Q , HUO Y , GAO Q H . A friendly jamming handover scheme for a conscious mobile eavesdropper in IoT systems[J]. Procedia Computer Science, 2022, 202, 15- 20.
doi: 10.1016/j.procs.2022.04.003 |
8 | ZHANG T Y , WEN H , TANG J , et al. Cooperative jamming secure scheme for IWNs random mobile users aided by edge computing intelligent node selection[J]. IEEE Trans.on Industrial Informatics, 2021, 7 (17): 4999- 5009. |
9 |
DHRMARAJ B S , JAICHANDRAN R , BHARATHI P S , et al. The defense against jamming attack in cognitive radio networks: energy efficiency management perspective[J]. Microprocessors and Microsystems, 2021, 82, 103816.
doi: 10.1016/j.micpro.2020.103816 |
10 |
ALSULAMI B S , BAJRACHARYA C , RAWAT D B . Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers[J]. Digital Communications and Networks, 2021, 7 (3): 327- 334.
doi: 10.1016/j.dcan.2021.04.002 |
11 | LI X R , DAI H N , SHUKLA M K , et al. Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications[J]. Computer Stan-dards & Interfaces, 2021, 78, 103540. |
12 | HAMAMREH J M , FURQAN H M , ARSLAN H . Classifications and applications of physical layer security techniques for confidentiality: a comprehensive survey[J]. IEEE Communications Surveys & Tutorials, 2019, 2 (21): 1773- 1828. |
13 | 雷菁, 李为, 鲁信金. 5G通信背景下物理层安全技术研究[J]. 无线电通信技术, 2020, 46 (2): 150- 158. |
LEI J , LI W , LU X J . Research on physical layer security technology in 5G communication[J]. Radio Communications Technology, 2020, 46 (2): 150- 158. | |
14 |
WANG K , YUAN L , MIYAZAKI T , et al. Jamming and eavesdropping defense in green cyber-physical transportation systems using a Stackelberg game[J]. IEEE Trans.on Industrial Informatics, 2018, 14 (9): 4232- 4242.
doi: 10.1109/TII.2018.2841033 |
15 |
JIA L L , YAO F Q , SUN Y M , et al. Bayesian Stackelberg game for antijamming transmission with incomplete information[J]. IEEE Communications Letters, 2016, 20 (10): 1991- 1994.
doi: 10.1109/LCOMM.2016.2598808 |
16 |
HU L , WEN H , WU B , et al. Cooperative jamming for physical layer security enhancement in internet of things[J]. IEEE Internet of Things Journal, 2018, 5 (1): 219- 228.
doi: 10.1109/JIOT.2017.2778185 |
17 |
ROMERO E , BLESA J , ARAUJO A . An adaptive energy aware strategy based on game theory to add privacy in the physical layer for cognitive WSNs[J]. Ad Hoc Networks, 2019, 92, 101800.
doi: 10.1016/j.adhoc.2018.10.026 |
18 |
HUANG S C , HUANG X J , CHEN W W , et al. Physical layer security of vehicular networks with cooperative jamming helpers[J]. Physical Communication, 2022, 53, 101762.
doi: 10.1016/j.phycom.2022.101762 |
19 |
TANG J C , CHEN G J , COON J P . Secrecy performance analysis of wireless communications in the presence of UAV jammer and randomly located UAV eavesdroppers[J]. IEEE Trans.on Information Forensics and Security, 2019, 14 (11): 3026- 3041.
doi: 10.1109/TIFS.2019.2912074 |
20 | 裔传俊, 刘亮. 链路质量感知的无线传感器网络生命最大化算法[J]. 计算机应用研究, 2016, 33 (11): 3411- 3416. |
YI C J , LIU L . Link quality-aware algorithms for maximizing lifetime in wireless sensor networks[J]. Application Research of Computers, 2016, 33 (11): 3411- 3416. | |
21 |
JIA L L , YAO F Q , SUN Y M , et al. Bayesian Stackelberg game for antijamming transmission with incomplete information[J]. IEEE Communications Letters, 2016, 20 (10): 1991- 1994.
doi: 10.1109/LCOMM.2016.2598808 |
22 |
WANG Q , CHEN Z , MEI W D , et al. Improving physical layer security using UAV-enabled mobile relaying[J]. IEEE Wireless Communications Letters, 2017, 6 (3): 310- 313.
doi: 10.1109/LWC.2017.2680449 |
23 |
LEUNG-YAN-CHEONG S , HELLMAN M . The Gaussian wire-tap channel[J]. IEEE Trans.on Information Theory, 1978, 24 (4): 451- 456.
doi: 10.1109/TIT.1978.1055917 |
24 |
WU R J , VANGORDER R A . Nonlinear dynamics of discrete time multi level leader-follower games[J]. Applied Mathematics and Computation, 2018, 320, 240- 250.
doi: 10.1016/j.amc.2017.09.034 |
25 |
GUPTA R , GUPTA J . Future generation communications with game strategies: a comprehensive survey[J]. Computer Communications, 2022, 192, 1- 32.
doi: 10.1016/j.comcom.2022.05.024 |
26 | SUMA S , BHARATI H . An optimized routing scheme for congestion avoidance using mobile nodes in wireless sensor network[J]. Sensors, 2022, 24, 100457. |
27 |
CHETTRI L , BERA R . A comprehensive survey on internet of things (IoT) toward 5G wireless systems[J]. IEEE Internet of Things Journal, 2020, 7 (1): 16- 32.
doi: 10.1109/JIOT.2019.2948888 |
28 |
ZHANG X B , WANG H , XU Y F , et al. Put others before itself: a multi-leader one-follower anti-jamming Stackelberg game against tracking jammer[J]. China Communications, 2021, 18 (11): 168- 181.
doi: 10.23919/JCC.2021.11.012 |
29 |
BHUVANA S D , JAICHANDRAN R , BHARATHI P S , et al. The defense against jamming attack in cognitive radio networks: energy efficiency management perspective[J]. Microprocessors and Microsystems, 2021, 82, 103816.
doi: 10.1016/j.micpro.2020.103816 |
30 | DUAN B W, CAI Y M, ZHENG J C, et al. Cooperative jammer power allocation—a nash bargaining solution method[C]//Proc. of the International Conference on Wireless Communications & Signal Processing, 2015. |
[1] | Zekun YAO, Chao WANG, Qingzhan SHI, Shaoqing ZHANG, Naichang YUAN. Cooperative jamming resource allocation model for radar network based on improved discrete simulated annealing genetic algorithm [J]. Systems Engineering and Electronics, 2024, 46(3): 824-830. |
[2] | Huiying JI, Minghai PAN, Yuanshi ZHANG, Qinghao YU. Method of jamming resource distribution based on genetic-ant colony fusion algorithm [J]. Systems Engineering and Electronics, 2023, 45(7): 2098-2107. |
[3] | Guangda ZHANG, Qinghua REN, Zhikai FAN. Security transmission scheme for multi-relay system with a friendly jammer-assisted based on energy harvesting [J]. Systems Engineering and Electronics, 2023, 45(3): 876-885. |
[4] | Chonglin HE, Ziwen SUN. Multi-level Stackelberg game model against full-duplex attacking node in IWSN physical layer [J]. Systems Engineering and Electronics, 2021, 43(10): 2931-2939. |
[5] | YUAN Tian, TAO Jianfeng, LI Xingcheng. Main lobe track deception jamming method based on association rule [J]. Systems Engineering and Electronics, 2018, 40(2): 273-279. |
[6] | LEI Weijia, YANG Xiaoyan, LIN Xiuzhen. Secure transmission scheme based on SWIPT relay with antenna grouping [J]. Systems Engineering and Electronics, 2017, 39(8): 1849-1856. |
[7] | ZHANG Yang-rui, GAO Mei-guo, LUO Hao-yue, LI Yun-jie. Evaluation method of cooperative jamming effect on radar net based on detection probability [J]. Systems Engineering and Electronics, 2015, 37(8): 1778-1786. |
[8] | LEI Wei-jia, JIANG Xue, ZUO Li-jie, XIE Xian-zhong. Secrecy rate optimization for two-hop relay system with energy#br# harvesting based on cooperative jamming [J]. Systems Engineering and Electronics, 2015, 37(12): 2835-2841. |
[9] | ZHANG Yang-rui, GAO Mei-guo, LI Yun-jie. Performance of cooperative suppress jamming on LFM pulsed radar’s ML-CFAR detection [J]. Systems Engineering and Electronics, 2014, 36(11): 2156-2163. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||