Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016...

26
Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North Carolina A&T State University [email protected] December 7, 2016 Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 1 / 26

Transcript of Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016...

Page 1: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Jamming in the Internet of Things: A Game-TheoreticPerspective

Nima Namvar

North Carolina A&T State University

[email protected]

December 7, 2016

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 1 / 26

Page 2: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Overview

1 Introduction

2 IoT securityJamming attackProblem Formulation

3 Proposed Algorithm

4 Simulation Results

5 Conclusions

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 2 / 26

Page 3: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Introduction

The Internet of Things (IoT) is emerging as an attractive 5G networkarchitecture that promotes billions of devices and services tointerconnect and exchange useful information and data.

IoT refers to a network of uniquely identifiable interconnected virtualand physical objects, such as sensors, radio frequency identification(RFID) tags, actuators, and mobile phones which are able tocommunicate and exchange data with each other to perform differenttasks

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 3 / 26

Page 4: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Introduction

IoT enabling technologies:

Wireless Sensor Networks (WSN)

Cloud computing

Big data analytics

Embedded systems

Communication protocols

Web services

Mobile internet

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 4 / 26

Page 5: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

IntroductionIoT poses a bright foreground for the formation of smart environments andself-conscious and autonomous devices. Some applications of IoT are:

Home automation: smart lighting, smart appliancesMedical aids: health monitoring, wearable electronicsCities: smart parkingEnvironment: weather monitoringEnergy: smart gridsIndustry: machine diagnosis

Figure: A general IoT system

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 5 / 26

Page 6: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Security of IoT

Due to its large attack surface, the security of an IoT system is prone to avariety of attacks such as:

Malicious radio jamming

Denial of service (DoS)

Side channel attack (SCA)

Replay attack

Node capture

In the absence of solid security in place, attacks and malfunctions in theIoT may outweigh any of its benefits.

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 6 / 26

Page 7: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Jamming attack

Jamming attack makes the battery of target devices to drain quickly bydisrupting their data transmission and making them retransmit repeatedly.Moreover, jamming could also lead to Denial of Service.

Figure: A Multitone Jammer J

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 7 / 26

Page 8: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Modeling the jamming attack: Assumptions

Consider an OFDM-based IoT network consisting of an access point(AP)and M IoT devices. S = {s1, s2, ..., sN} denotes the set of Nsubcarriers which are allocated to the devices.

The IoT devices are operating on sub 1 GHz license-exempt bands and areconnected to the AP under IEEE 802.11ah (low-power WiFi).

We consider a multi-tone jammer J which aims at disturbing theperformance of IoT network by transmitting over some subcarriers (tones)to:

Decrease the link SINR

Increase the bit error rate (BER)

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 8 / 26

Page 9: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Modeling the jamming attack: Assumptions

The IoT controller, or AP, confronts the jamming attack by intelligentlydistributing its power over the subcarriers in such a way that protects asmany IoT devices as possible from the jamming attack.

How to model the problem?

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 9 / 26

Page 10: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Modeling the jamming attack: Assumptions

The IoT controller, or AP, confronts the jamming attack by intelligentlydistributing its power over the subcarriers in such a way that protects asmany IoT devices as possible from the jamming attack.

The question is, how the AP should distribute its power over the set ofchannels? How to model the problem?

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 10 / 26

Page 11: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Colonel Blotto games

The Colonel Blotto game is a fundamental model of strategic resourceallocation in multiple dimensions, in which two players compete over anumber of independent battlefields by distributing their forces over thesebattlefields and within each battlefield, the player that allocates the higherlevel of force wins.

Game components

Colonel 1: IoT access point (AP)

Colonel 2: The jammer JBattlefields: S = {s1, s2, ..., sN}

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 11 / 26

Page 12: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Colonel Blotto model

Formally, the definition of Blotto game in our problem is:

Definition

The Colonel Blotto game which is labeled as CB[AP,J ,S = {si}Ni=1] isthe one-shot game in which players, namely AP and jammer (J ), competeby simultaneously announcing distribution of their power over the set of Nsubcarriers subject to their power budget constraints. Each battlefield, i.e.each subcarrier s ∈ S, is won by AP if transmission over s, as a function ofpower allocation strategy by both players, is successful and is won by thejammer, otherwise. The payoff for the whole game is the proportion of thewins on the individual battlefields.

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 12 / 26

Page 13: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Payoff Functions

Subcarrier SINR

SINRsubs =

HAPs pAPs

N0 + HJs p

Js

,∀s ∈ S (1)

Successful Transmission Condition

pAPs

N0 + pJs≥ τ (2)

Payoff Functions

UAP(pAPs , pJs ) =1

N

N∑d=1

1

2(1 + sgn(

pAPs

N0 + pJs− τ)) (3)

UAP + Uj = 0 (4)

.

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 13 / 26

Page 14: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Possible Solutions of Blotto game

Example:For the case of 3 battlefields and total of 6 troops on each side:

I (0, 0, 6) vs. (1, 2, 3)?I (2, 2, 2) vs. (1, 1, 4)?I (3, 2, 1) vs. (1, 1, 4)?

General solution

I A best strategy is NOT a pure strategy. It must be a mixed strategy.

I Obtaining the Nash equilibrium in mixed strategies for Blotto games withN > 3 fields and asymmetric resources has been an open problem since 1930.

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 14 / 26

Page 15: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Proposed Algorithm

Base on the ratio of available resources for the players, there are differentsets of Nash equilibria. If PAP > NPJ , the game has a set of trivialoptimal strategies for AP, with xAPi = PAP

N , for all i = 1, 2, ...,N.

We are particularly interested in the scenario of PAP < NPJ andPJ < NPAP , for which there is no pure Nash equilibrium.

Proposed Algorithm

We propose an evolutionary learning based algorithm, which learn the beststrategies by playing the game repeatedly. The algorithm converges tooptimal solution, yet, there is no solid proof due to its nature of beingevolutionary-based (similar to GA).

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 15 / 26

Page 16: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Proposed Algorithm

We consider a population of size K = KAP + KJ of KAP players of thetype AP and KJ players of the type J . Players of the same kind haveidentical resources; however, each player may adopt a differentstrategy profile.

The Blotto game is played successively by randomly chosen pairs ofopponents and, the players’ strategies evolve in response to theresulting payoffs.

In each round, each player may face an opponent of its own type or ofthe opposite type with probabilities ε and 1− ε, respectively.

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 16 / 26

Page 17: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Proposed Algorithm

Adaptation is based on the average payoff:

Expected payoff in each round for AP players

πiAP =1

KJ

KJ∑z=1

∫ PAP

0

∫ PJ

0UAP(fi (x , t), hz(x ′, t))dxdx ′, (5)

∀i ∈ {1, 2, ...,KAP}

Expected payoff in each round for J players

πiJ =1

KAP

KAP∑z=1

∫ PJ

0

∫ PAP

0UJ(fz(x , t), hi (x

′, t))dxdx ′, (6)

∀i ∈ {1, 2, ...,KJ}

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 17 / 26

Page 18: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Dynamic Evolution Rules

Imitation

At each time step, for each player j , another player j ′ of the same kind israndomly selected from the entire population and their average payoffs arecompared. If πj < πj ′ , player j imitates player j ′ by adopting its strategyfj ′(x), otherwise, the strategy of player j does not change.

Mutation

To increase the diversity of the strategy sets, we assume that the strategyof each player j is subject to a process of mutation with small probability ξin which, an amount of 2u is subtracted from the strategy of j at arandomly selected point and the amount u is added to the two nearestpoints in the mixed strategy vector.

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 18 / 26

Page 19: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Result of the Proposed Algorithm

The proposed algorithm converges to mixed Nash Equilibrium, which is theoptimal solution, and its performance can be compared with the literature.

Nash Equilibrium in mixed strategies

Uj(fj(x)∗, f−j(x)∗) � Uj(fj(x), f−j(x)∗),

∀fAP(x)∗ ∈ΠAP , fJ(x)∗ ∈ ΠJ , (7)

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 19 / 26

Page 20: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Simulation Results

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 20 / 26

Page 21: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Simulation Results

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 21 / 26

Page 22: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Simulation Results

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 22 / 26

Page 23: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Simulation Results

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 23 / 26

Page 24: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Simulation Results

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 24 / 26

Page 25: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Conclusions

In this paper, we have studied the problem of jamming in an IoTsystem.

In particular, we have proposed a centralized mechanism to addressthe jamming problem in an IoT system composed of resourceconstrained devices.

We have modeled the problem as a Colonel Blotto game between theIoT access point and the jammer. In this game, each player seeks tomaximize its payoff by adopting a randomized strategy to allocate itspower to the subcarriers.

To solve this game, we have proposed a novel evolutionary-basedalgorithm to find the equilibrium strategies for both players.

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 25 / 26

Page 26: Jamming in the Internet of Things: A Game …techlav.ncat.edu/seminars/2016 Seminar Series/2016 Fall...Jamming in the Internet of Things: A Game-Theoretic Perspective Nima Namvar North

Nima Namvar (NCAT) GlobeCom 2016 December 7, 2016 26 / 26