A Game-Theoretic Framework for Jamming Attacks and Mitigation in Commercial Aircraft Wireless Networks

نویسندگان

  • David Slater
  • Patrick Tague
  • Radha Poovendran
  • Mingyan Li
چکیده

As wireless personal electronic devices (PEDs) become increasingly ubiquitous, the demand for wireless network services on commercial aircraft is likely to increase. Introduction of services to an aircraft network creates a host of wireless security challenges, whereby a passenger can use a wireless PED to potentially interfere with or jam valid network traffic and future inter-aircraft communications. Aircraft networks will thus require the ability to detect and appropriately respond to jamming attacks. In this work, we investigate the interactions between the aircraft network and jamming PEDs and propose the use of game theory to model jamming attacks and mitigation techniques. We present a game-theoretic framework to model these interactions and delineate tailored response mechanisms to specific threats. We then demonstrate the ability of the network to enforce desired behavior by offering incentives for passenger cooperation and punishments for failing to cooperate.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MAC Layer Jamming Mitigation Using a Game Augmented by Intervention

MAC layer jamming is a common attack on wireless networks, which is easy to launch by the attacker and which is very effective in disrupting the service provided by the network. Most of the current MAC protocols for wireless networks, for example, IEEE 802.11, do not provide sufficient protection against MAC layer jamming attacks. In this paper, we first use a non-cooperative game model to char...

متن کامل

A Study Of Wireless Mesh Networks Insider Attacks Of Selective Jamming Or Dropping

Wireless mesh networks (WMNs) promise to increase high-speed wireless property on the far side what's attainable with the present WiFi-based infrastructure. However, their distinctive field options leave them notably prone to security threats. During this article, we tend to describe numerous varieties of refined attacks launched from adversaries with internal access to the WMN. We tend to any ...

متن کامل

Fight jamming with jamming - A game theoretic analysis of jamming attack in wireless networks and defense strategy

Article history: Received 22 June 2010 Received in revised form 7 March 2011 Accepted 13 March 2011 Available online 23 March 2011 Responsible Editor: P. Dowd

متن کامل

A New Vision-Based and GPS-Signal-Independent Approach in Jamming Detection and UAV Absolute Positioning Assessment

The Unmanned Aerial Vehicles (UAV) positioning in the outdoor environment is usually done by the Global Positioning System (GPS). Due to the low power of the GPS signal at the earth surface, its performance disrupted in the contaminated environments with the jamming attacks. The UAV positioning and its accuracy using GPS will be degraded in the jamming attacks. A positioning error about tens of...

متن کامل

Security Threats and Jamming Attacks of Multi Channel Wireless Sensor Networks

Built upon a shared wireless medium, wireless sensor network is particularly vulnerable to jamming attacks. These attacks can easily be accomplished by an adversary by either bypassing MAC-layer protocols or emitting a radio signal targeted at jamming a particular channel. This paper considers a scenario where a sophisticated jammer jams an area in a multichannel wireless sensor network. The ja...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009