User-Centric Analysis on Jamming Game with Action Detection Error Jiniiang Liu, Liang Xiao*, Yan Li, Lianfen Huang 361000, Dept. of Communication Engineering, Xiamen University, China *Email: [email protected] Abstract-We formulate the interactions between a legitimate transmitter and a smart jammer allocating power flexibly as a power control Stackelberg anti-jamming game with the action detection error from transmitter to jammer in a user-centric view. More specifically, decision-making of the players follows the subjective deviations specified by prospect theory instead and Tversky to explain users' subjectivity in decision-making under uncertainty environment [5], [6]. Prospect theory is a descriptive and behavioral model of decision making under risk for individuals. PT uses decision weight deviating from probability weighting function in the of the traditional objective assumption controlled by expected value function instead of the stated objective probability utility theory. The Stackelberg equilibrium of the game as well directly as the Nash equilibrium are analyzed and the impact of the players' subjectivity and action detection error on the signal to-interference and noise ratio at the receiver is measured. [5], [6]. The theory awarded the Nobel Prize for its contribution on monetary transaction explains that people would be risk seeking in losses and risk averse in gains. Simulation results show that a subjective jammer which is less Although the PT derived from monetary transaction, it is likely to attack the transmitter results in the increasing of the increasingly becoming a hotspot in a variety of areas the signal-to-interference plus noise ratio and the behaviors of the smart jammer in the Stackelberg game cause more damage to the legal communications. Index Terms-game theory, anti-jamming, Stackelberg, user centric, signal-to-interference plus noise ratio, power control. [7]-[14]. To address smart jamming in real-life, PT is applied to model the subjectivity of the players, i.e., januner and user in corresponding jamming game [7], [15], which both proved the existence of Nash Equilibria (NE) and computed it and eval uated the impact of the players' subjectivity on performance. I. INT RODUCTION However, assuming user and jammer behave simultaneously Wireless conununication is highly vulnerable to jammer attacks because of the broadcast nature and open access of radio propagation. More specifically, jammer can put great damage on the transmissions of users by sending malicious signals. In particular, smart januner which is capable of controlling over their strategies flexibly threatens the legal communications effectively. Game theory has been studied as an powerful tool to model and address such security issues [1]-[4]. Traditional decision-making models in game theory are based on expected utility theory from the perspective of the ra tional choice to quantify the players' perception of uncertainty or error. However, an individual's behavior in reality is always conducted by practical environment as well as its subjectivity such as personality, psychological factor. [5] showed that the assumption that an individual behaves rationally absolutely doesn't hold in practical situation and the actual decision making process involving one's subjectivity is depart from the prediction of expected utility theory. Motivated by such a scenario, prospect theory (PT) was developed by Kahneman The work of L. Xiao was partly supported by NSFC (61271242. 61001072. 61301097). NCETFJ. and Fundamental Research Funds for the Central Universities (2012121028.2013121023). The work of Huang was partially supported by 2011 National Natural Science Foundation of China (Grant number 61172097) .2014 National Natural Science Foundation of China (Grant number 61371081) 2013 Natural Science Technology of Fujian (Grant number 2013H0048 ) and by 2013 Science Technology Project of Xiamen (3502Z20131155). in NE does not conform to the reality and one player may not have complete information of the other's identities. In this paper, we apply prospect theory to investigate the anti-jamming communications in wireless network. More specifically, we model the interaction between a legitimate transmitter and a smart jammer as a power-controlled S tackelberg game (SG) based on PT, in which leader is the transmitter that commits a power strategy in advance and follower is the smart jammer that obtains the optimal strat egy by identifying the transmitter's strategy. However, given the underlying behavior detection error and gossip channel propagation error, we introduce the action detection error into the channel from the transmitter to the jammer [1], [16]. We assume the smart jammer cannot obtain the actual transmitter's strategy but knows the probability of action to be identified successfully. Therefore, the decision weighting function was developed in [17] to formulate subjectivity of the both players for the action's identification probability. To the best of our knowledge, this paper first applies the prospect theory to the Stackelberg game in anti-jamming wire less communications. We analyze the Stackelberg equilibria (SE) of the PT-based power-controlled anti-januning game, where the utility functions of both players are based on SINR at the receiver and costs from power allocation. The NE analysis of the PT-based anti-jamming game is provided as a comparison. The remainder of the paper is organized as follows. In Section II, we briefly review the related work. In Section III, ( t,j) ax pmax x ex hx Player (Transmitter or jammer) Action of Player x Maximum power of Player x Cost per unit Player x power Channel gain between Player x and receiver Background noise power Action detection error matrix from transmitter to jammer Prob. to successfully identify an action of transmitter Objective weight of Player x Subjective prob. weight func. of x Instant payoff of Player x EUT-based utility of Player x PT-based utility of Player x x = The system model and PT-based Stackelberg game model are presented. Next, the SE strategies in Section IV and the NE strategies in Section are analyzed in V. In Section VI, we (T present the simulation results. Finally, conclusion is provided 1> in Section VII. c: Qx wx(C:) ux(m,n) II. RELATED WORK U:Ul Ux'" Game theory-based approaches have been proposed by x TABLE I many researchers to improve the communication security re SUMM ARY cently. The game-theoretic randomized anti-jamming strategy OF S Y MBOLS AND NOTATION. for power allocation and channel hopping is analyzed based on learning algorithm in [18]. Competing for dominating an open spectrum access with jammer was investigated following a stochastic game approach and using Q-Iearning to solve for an optimal channel access strategy in [19]. A januning game for users without knowing the other users' identities was formulated to model such uncertainties in [20]. A dynamic zero-sum game with asymmetric information was analyzed against intelligent jammer that can detect transmission in [21]. A power control game for cognitive radio network was presented to formulated the SU with incomplete knowledge of the jammer's location in [22]. Due to the emerging smart jammers which are capable of analyzing the opponents' strategy, wireless networks are under serious threat. As a powerful method to describe the hierarchi cal behavior among players, Stackelberg game has recently at tracted a lot of attention. Power control against a smart jammer was firstly investigated based on a Stackelberg game approach and the corresponding Stackelberg equilibrium was presented in [23]. The defense strategy against an effective dynatnic jamming attack was modeled as a Stackelberg game in wireless personal area network in [24]. In [25], a Stackelberg security game with a cooperative jammer was analyzed to improve physical layer security over multiuser OFDMA networks. The decision making process of a correlated jammer for the cyber physical control system was modeled as a dynamic Stackelberg game in [26]. However, none of the above works takes the subjectivity of the players into consideration; this is what we focus on. Prospect theory (PT) has emerged its promising to formulate and illustrate the decision making process of humankind in a variety of area such as communication networks and smart energy management [13], [14]. [7]-[12] In addition, the works of applying prospect theory into the anti-jamming communication are still limited. Adjusting the selfish players itself transmission probabilities over a collision channel was considered as a random access game following the percepts [7]. III. PT- BASED STACKELBERG ANTI-JAMMING GAME A. Stackelberg Game In this paper, we formulate the power allocation strategies of nodes in anti-jamming wireless communication into Stackel berg game where the leader is a legitimate transmitter and the follower is a smart jammer. The players aim to maximize their individual utility ultimately via allocating translnission signal power. More specifically, the transmitter commits a power strategy for sending signal and then the jammer chooses a best response for jamming correspondingly. In the game, we consider finite discrete power action set for transmitter and continuous power action set for jammer at E {Pm}, m 1, . . . , K, where translnission power is given by Pm and 0 ::; at ::; Ptmax. Similarly, we denote the action of jammer by aj and 0 ::; aj ::; prax. For simplicity, we also mx assume 0 ::; PI < P2 < . . . ::; pt a where p;,ax is the to allocate. We denote the action of translnitter by = maximum power of the player x. We consider the interactions between two players as a non zero non-cooperative game. The translnitter with an action at = Pm aj q Cx be the transmission cost per unit power of behaves in advance and smart januner with reacts latter. Let the player x, x = t,j. = We take the signal-to-interference-plus noise ratio (SINR) as a reward for the transmitter. We denote Ux (m, n) as the instant utility of player with at Pm and aj q. Thus the instantaneous payoffs are given by htPm (1) - CtPm, Ut(at Pm, aj q) +hj q htPm (2) Uj(at Pm, aj q) - +h q - Cj q, j whereht andhj are the channel gains between the players and x = = = = = = = = receiver, respectively and B. CJ CJ CJ is the background noise power. Action Detection Process A prospect theory-based static januning game However, due to the gossip channel propagation error and was investigated to derivate the optimal strategy on channel the behavior detection error, it is uncertainty for the smart of PT in access rate in [15]. In this paper, we firstly apply PT into jammer that the transmission action he knows is the actual the Stackerberg game against a subjective smart jammer, in behavior of transmitter. Therefore, misunderstanding to strate which there exists action detection error from the legitimate gies of translnitter at jammer's view would influence the results transmitter to the jammer. of the SG. IV. STACKELBERG EQUILIBRIUM IN THE PT-BASED We can model the probability distribution matrix of the action detection process as <I> cm,n [cm,nlo:C;m n:C;K' , denotes the probability action and when n = m = n, cm,n in which indicates the probability for each transmitter action to be accurately identified. For simplicity, 1-€ ' we assume cm n = c I'f m = n and otherWlse cm n = K -l' , , We also assume the action identification matrix is known to players in the SG. In this section, we investigate the SE in the PT-based anti-jamming game, where subjective smart jammer adjusts strategy according to the behavior of the transmitter in the case of action detection error from translnitter to jannner to maximize its PT-based utility. To facilitate analysis, we assume that the players in the same real-life has the same objective weight, i.e., Prospect Theory C. ANTI-JAMMING GAME to be taken as action m Although smart jammer has knowledge of the action i dentification matrix, the decision-making is guided with the assumption that players are rational and uninfluenced by real at = aj. The players choose their own power strategy to maximize their individual PT-based utility to obtain the SE, thus the optimal strategies in the game are given by life perceptions. To close to the reality, prospect theory (PT) (8) has been proposed from a user-centric view to model the (9) subjective nature of human decision-making process. Given the action detection error, we now apply the prospect theory to model the Stackelberg anti-jatmning translnission with Perlecs probability weight function. Moreover, subjective Let Pm be a given strategy of the transmitter and thus the optimal subjective jamming strategy is given by Lemma IV.I. players tend to under-weigh moderate and high probability outcome and over-weigh low probability outcome. We denote wx(c) where the probability weight function of player ax w x (c ) = exp(-(-lnc)C>x),O x (3) is defined as objective weight of players and a; pJmax ' = = Let 1, w x (c ) ulUT = c denote the expected utility of translnitter aver at and thus the expected utilities of the transmitter and jatnmer are given by UE t UT(at UE j UT(at = Pm , aj = q htPi ) � � cm, i( - CtPi) , +hjq = Pm, aj = q htPi ) � - Cjq) . � cm, i(+hJ. q = i=1 = i=1 (Y (4) � v (5) Therefore, facing the action detection error from the leader to the follower, a subjective translnitter or jammer chooses its transmission signal power to maximize its prospect theory based utility given by U{'T(at = Pm, aj K = q) = h L Wt(Cm,i)( +t� q - CtPi), i=1 (Y hthj 2:: Wj(€m,;)Pi _--i --" -'-'--- c=; � Cj 2:: Wj(€m,i) �i=l �j ( shows that player is objective. aged over all the action realizations following j (6) 2 K Cj 2:: Wj(€=,i) ----ic:;:--' h"'� -;hj: a K decreases with the players subjectivity. In the special case of ax L Wj(c m,i)Pi < i=1 0, given by < ax:S; 1, K Proof 0, 8U!T(at, aj) 8aj We have82 U!T8 / aj 2 < 0 U!T is maximized by for 0 :s; aj :s; p rax. Remark. As shown in with respect to indicating a;vt (10), o.W.. ), (10) U!T We differentiate the resulting equal to - (Y aj and set UPT is concave. Thus K = �j ( hthj 2:: Wj(€=,i)Pi _----"i7"-'--- � cj 2:: Wj(€=,i) i=l - (Y ) • the smart jammer knows there is not sufficient transmission if the power of the c Olmnunication is lower than the cost for the jannner and thus the j atmner chooses a; = 0 to ignore the ongoing transmission. On the other hand, the jammer will apply the highest power to jatn the current translnission if the jamming cost is negligible compared with the the high transmission power. Otherwise, We first consider the translnitter commits an action which is identified as Pi, 1 :s; i :s; K, at = Pm with weight probability Wj(c m,i) by the subjective smart jatmner who weighs his own the jatmning power is adjusted following The probability c a;vt. should not be too small because there is no need to jamming or translnit when c is quite small, which indicates channel condition is fairly bad. In the meantime, we L�1 Wx(c 1,i)Pix inferring ax 0 and L�1 Wx(c K,i)Pi ax p :,;'a , which can be proved. We assume / hj overall utility. Since the subjective transmitter who aims to have minimize the reward for jammer knows the decision-making indicating process of the jammer, the reward part of transmitter utility in is smaller enough otherwise the channel is terrible so as to (6) damage connnunications. deviates from that of jannner's utility in (7). = = (Y Lemma IV.2. The optimal subjective transmission strategy of the SG K K K htCj L Wj(c m,i)/ hj L Wt(Cm,i)Pi - Ct L Wt(Cm,i)Pi i=1 i=1 i=1 and derivate it as: 0, f l' argmin atE{Pm}m�1, . . h,Cj argmin a'E{Pm}m�1, p max, . . dG dat f2 , ,K ,K K 2:: Wj(Em,;) �h:c,2 K - L Wt(Cm,i)Pi i=1 t f3, o. w . , htCj K 2:: W,(Em,') i� �j Wt(c m,m) --'----r===== ==- 2 JL�1 Wt(Cm,i)Pi K h Wj(Cm,i) tCj L 1 i=l d2 G dat2 - CtWt(c m,m), (13) (14) 4 (11) GO is concave. By (13), G is maximized K ( ) htCj 2::t':-1 Wj(Em.i) "" whI'ch can L..,i=l Wt Cm,i Pi 4hjC,2 be calculated to obtain a;. Following the constraint, m o :s; at :s; pt ax , we have: hi. < C:t In the case, UtPT decreases with at for 1) o :s; at :s; prax, thus a; = 0; 2<y2) ;� :s; Ct < �. : If L�1 Wt(CK,i)Pi < c, ""K . . h at, thus a*t UP WIt t T Increases h,h,. L..,i=1 Wj( Cm,i), 2Cj <Y K K Ptmax - PK ,.·If h,hj "" L..,i=l Wj( Cm,i) < "" L..,i=l Wt( CI,i)Pi, U[T decrease with at, thus a; = 0; Otherwise, a; is given by (11) at f 2 ; < Cj < 3) <Y+h�P!'wX < Ct < ;�: If L�l Wt(CK,i)Pi > htCj 2::'-1 Wj(Em.i) K ( ) p UPT is concave "" > L..,, =l Wt C1,' " t 4h.Ct2 4h,c, 2 2:::"-1 W,(E1,')P' K h,e, 2::t':-1 Wj(Em,'). "" ' < CJ < and maxmnze . . d wit . h L..,i=l Wt( Cm,i)Pi hI. 2::{�1 Wj(Em.i) , 4hjC, 2 . 4) 2(hj prax+ ) :s; Ct < <Y+h�prax: U[T(L�1 Wt(Cm,i)Pi) increases with L�1 Wt(Cm,i)Pi which increases with at, for > htCj 2:::"-1 Wj(Em,') K K "" L..,i=l Wt( Cm,i)Pi < L..,i=l Wt( Cl,i)Pi < "" (hjpmax+<y)2Cj K 4hjC,2 K or Li=1 Wt(Cm,i)Pi > Li=1 Wj(Cm,i) and h,h, We find WI'th <y _ K .1 . < hi. 2<Y' ' . _ <y _ 1 . decreases otherwise. The proofs about this case are similar and omitted here because of the limitation of length. 5 ) Ct < 2(hjP';,:ax+ ) : In the case, U[T increases 0 -< at_< p'nw t x, thus at* = ptmax =PK . <y for Proof Plugging aj* with at • Remark. In conclusion, we have the SE of the PT-based into (6), game given by we have (a;, aj) in lennna 1 and lemma 2. The smart j atmner allocates the optimal power according to the jamming cost, channel state and the subjectivity for the action detection U{'T(at =Pm, aj) = error of the transmission power. Based on the jammer's subK K 2 j K L Wt(Cm,i)Pi(� - Ct), L Wj(Cm,i)Pi < �t�J L Wj(c m,i);jective strategy, the subjective transmission adjusts its strategy i=l i=l i 1 in line with the transmission cost and the jannner's reward J( required to be minimized. L Wt(Cm,i)Pi( <Y+h�p:nax - Ct), i=l K (hjpmax+<y)2Cj K > Wj(Cm,i)Pi Wj(Cm,i);v. NASH EQUILIBRIUM IN THE PT-BASED ANTI-JAMMING h,hj � i;' i 1 COMMUNI C ATION GAME htCj 2:: Wj(Em,') K K i=1 L Wt(Cm,i)Pi - Ct L Wt(Cm,i)Pi, Let (at'E, afE ) denote the NE of the static game where i=l i=l .1 1 . ----'.=.c .: --,,---,---K o.w .. (12) According to (12), we define G(at jammer can't sense the ongoing transmission to adjust strategy and two players behave at the same time. At a NE, given the power levels of the other players, no player can improve its UJT utility by changing its power unilaterally. UtPT(atNE, aNE) > UtPT(at, aNE) UPT(aNE aNE) > UPT(aNE a. ) t J The Lemma V.l. ' NE (afE, ayE) (ptmax pmax ) ( ptmax, 0) , J - J - J t J ' J ' (15) ' (16) of the game is given by is concave and afE is obtained by setting (19) O. Similarly, the result from h can be obtained. 3) is h If (afE, afE) resulting / at oUrT(at, afE)o holds, the NE obtained by setting oUJT(afE, aj)o / at = equals from 0 = O. • = ' J (0 pmax ) (0,0) , ' ( J ptmax, VI. SIMULATION RESULTS ' In this section, we evaluate the performance of the proposed ' -.L hj ft W.j(€K,.;)P' hjht. 1 _----"'''''-.=... ( ____ K OJ 2:: Wj(€K,i) _ (J ) PT-based Stackelberg security game through simulations. We ) investigate the impact of the j armner's objective weight aj on the performance such as the average SINR and utilities showed (1),(2) by Is, (17) i=l (10),(11) at ht = = hj as 0 : 0.005 : = 0.8 = 1 aj. We set Ct = 0.4, Cj with the noise power = = 0.5 receiver is presented in Fig. 0.8 SE and argmin to 0.62 the probability c 0.33 and for the game. The SINR at the legitimate 1, showing that both that of the 0.65 from 0.5 For instance, the SINR decreases from about Cj > (J SE and the NE decrease with jammer's objectivity (i.e., where Ct < under In the simulation, for simplicity, we assume the users' o.W., a,E{p=}==l, .. ,K (17) to the NE given by different objective weights. and I2: of both players. We also compare the performance of the SE given by objective weight hI. O'+h.p!nax, J .1 h and at NE, as changes aj = 0.7. to to aj). 0.42 at 1, with The reason is that a j armner with subjectivity is less likely to jam the legal transmission as it hjht. 2:: 1"-1 Wj(€K,i)Pi . (0'+hjP;nax)22::1"= 1 Wj(€K,i)' K hjh, 2:: Wj(€K,i)P, overweighs its loss from wasteful jamming. Meanwhile, for a fixed aj , a higher probability of action identified successfully �i=l (i.e., K 0'22:: Wj(€K,i) c) results in a smaller SINR. This is because a subjective c has more clear understanding jammer with higher probability �i=l on action detection process. In addition, the smart jammer can learn the ongoing transmission flexibly before decision making. Fig. 2 indicates the impacts of aj both players with the probability the transmitter decease with aj, c = on the utilities of 0.9. The utilities of while those of the jammer increase with aj regardless of the scenarios. This is because both subjective players are less likely to transmit or jam to avoid highly unfavorable loss due to the action detection error. One the other hand, the jammer in the SE strategy is more intelligent than that in the NE strategy. Consequently, the Proof we differentiate with respect to aj. oUtPT ht ( +h a oat jj ___ = (J UrT with respect to at and UJT _ Ct)Wt(c m,m), (18) K K (J = J J " ' = proved similarly. 2) afE If = Is holds, by ptmax. transmitter's utility is just opposite. VII. CONCLUSION Wj(c m,i)Pi ouJPT hjht L i=1 - Cj L Wj(c m,i). (19) oaj ( +hjaj) 2 i=1 1) If h holds, by (18) we haveoUrTo l at > 0, yielding atNE ptmax · In this case by (19) we haveoUPTo l a >0 ax p indicating afE r . The cases (i.e., 12,h,I4) can be __ jammer's utility at SE is higher than that at NE while the (18) oUrTo l at we have However, differentiating (19) > 0, In this paper, prospect theory is applied to formulate the Stackelberg anti-jaming communication game and a static jamming game, in which both the transmitter and the smart jammer make decisions relying on their subjectivities and aim to maximize the SINR-based utilities under power constraints under the channel condition that there exists action detection error from transmitter to jammer. We have derived the SE strategies of both players and the NE of the jamming game provided as a comparison to evaluate the impact of the jammer's subjectivity about the probability of action identified yielding successfully on the jamming game, which is not considered indicates that in the traditional expected utility theory. Simulation results 0.9 1-----,--- --�-----,--- r=====il ....... NE,E=0.9 0.85 _SE,E=0.9 O. -+ - NE,E=0.7 -*-SE,E=0.7 ....----_. 0.5L_�_--c'=-----====:::!��� O.4 Objective weight of jammer,aj Fig. 1. Average SINR at the receiver: Performance comparison of a transmitter and smart jammer vs. objective weights (Xj in an PT-based Stackelberg game and a static game with action detection process, 0.2 o -0.2 @ -0.4 ::::l -0.6 -0.8 -1 .;, ;.�*- �'-,*--*- -*;",�-*.;..;.*.;. ... -+-+--+-+-�- -+- -+ - + - +-- - 1 . 2 L-___-'-___-'-___----'____-'---___--' 0.5 0.6 0.7 0.8 Objective weight of jammer,aj 0.9 Fig. 2, Average transmitter and jammer utilities: Performance comparison of a transmitter and smart jammer vs. objective weights (Xj in an PT-based Stackelberg game and a static game with the probability E: = 0.9, have shown that a subjective jammer with smaller probability c which is less likely to attack the transmitter leads to the increasing of the SINR and the behaviors of the smart jammer in SG does more harm to the legal communications. REFERENCES [1] L, Xiao, Y. Chen, w'S. Lin, and KJ.R. Liu, "Indirect reciprocity security game for large-scale mobile wireless networks," IEEE Trans. Iriform. Forensics and Security, vol. 7, pp, 1368 - 1380, Aug. 2012, [2] K. Khalil and E. Ekici, "Multiple access game with a cognitive jammer," in Proc, Asilomar Con! Signals, Systems and Computers, 2012, pp. 1383 - 1387. [3] K. C. Nguyen, T. Alpcan, and T. Basar, "Security games with decision and observation errors," in Proc. IEEE American Control Conference, 2010, pp. 510 - 515. [4] C. Zhao, L, Xiao, S. Kang, G. Chen, Y. Li, and L, Huang, "Secure relay selection based on learning with negative externality in wireless networks," EURASIP 1. Advances in Signal Processing, vol. 89, pp. 1 - 7, 2013. [5] D. Kahneman and A, Tversky, "Prospect theory: An analysis of decision under risk," Econometrica, vol. 47, pp. 263-291, 1979. [6] A. Tversky and D. Kahneman, "Advances in prospect theory: Cumula tive representation of uncertainty," 1. Risk and Uncertainty, vol. 5, pp, 297-323, 1992, [7] T. Li and N, B. Mandayam, "Prospects in a wireless random access game," in Proc. 46th Annual Conf. Iriformation Sciences and Systems, March 2012, pp. 1 - 6. [8] T. Li and N. B. Mandayam, "When users interfere with protocols: Prospect theory in wireless networks using random access and data pricing as an example," IEEE Trans, Wireless Commun., pp. 1888 1907, April 2014. [9] J. Yu, M. H. Cheung, and J. Huang, "Spectrum investment with uncertainty based on prospect theory," in Proc. IEEE Int'l Con! Commun., 2014, pp. 1620 - 1625. [10] D. D. Clark, J. Wroclawski, K. R. Sollins, and R. Braden, "Tussle in cy berspace: defining tomorrow's internet," IEEEIACM Trans, Networking, vol. 13, pp. 462 - 475, 2005. [II] Y. Wang, A, Y. Vasilakos, Q. Jin, and 1 Ma, "On studying relationship between altruism and the psychological phenomenon of self-deception in rational and autonomous networks," in Proc. Int'l Conf. Distributed Computing Sys, Workshops, 2012, pp. 336 - 341. [12] T. Okuda, T. Ichikawa, T. Ideguchi, and X, Tian, "A design method of local community network service systems with ad-hoc network technology," in Proc. IEEE Vehicular Tech. Con! Fall, 2009, pp. 1 - 3. [13] L, Xiao, N.B. Mandayam, and H.Y. Poor, "Prospect theoretic analysis of energy exchange among microgrids," IEEE Trans, Smart Grid, under review. [14] Y. Wang, W, Saad, N. B. Mandayam, and H. Y. Poor, "Integrating energy storage into the smart grid: A prospect theoretic approach," in Proc. IEEE Int'l Conf. Acoustics, Speech and Signal Processing, 2014. [IS] L, Xiao, J. Liu, Y. Li, and N. B. Mandayam andand H. Vincent Poor, "Prospect theoretic analysis of anti-jamming communications in cogni tive radio networks," in Proc. IEEE Global Commun. Coriference, 2014, pp. 1 - 6. [16] L, Xiao, w'S. Lin, Y. Chen, and KJ.R Liu, "Anti-cheating prosumer energy exchange based on indirect reciprocity," in Proc, IEEE Int'l conf. communications, 2014, pp. 599 - 604, [17] D. Prelec, "The probability weighting function," Econometrica, pp. 497-528, 1998. [18] Y. Wu, B. Wang, K. J. R. Liu, and T. Clancy, "Anti-jamming games in multi-channel cognitive radio networks," IEEE 1. Selected Areas in Commun., vol. 30, pp. 4 - 15, Dec. 2011. [19] Y. Gwon, S. Dastangoo, C. Fossa, and H. T. Kung, "Competing mobile network game: Embracing antijamming and jamming strategies with reinforcement learning," in Proc, IEEE Con! Communications and Network Security, Oct. 2013, pp. 28 - 36, [20] Y. E, Sagduyu, R. A. Berry, and A. Ephremides, "Jamming games in wireless networks with incomplete information," IEEE Trans, Commun. Mag., vol. 49, no. 8, pp. 112 - 118, Aug, 2011. [21] A. Gupta, A. Nayyar, C. Langbort, and T. Basar, "A dynamic transmitter jammer game with asymmetric information," in Proc, IEEE Annual Conf. Decision and Control, 2012, pp. 6477 - 6482. [22] R. EI-Bardan, S. Brahma, and P. K. Varshney, "Power control with jammer location uncertainty: A game theoretic perspective," in Proc. 48th IEEE Annual Conf. Iriformation Sciences and Systems, March 2014, pp. 1 - 6. [23] D. Yang, G. Xue, 1 Zhang, A. Richa, and X. Fang, "Coping with a smart jammer in wireless networks: A stackelberg game approach," IEEE Trans, Wireless Commun., vol. 12, no, 8, pp. 4038 - 4047, 2013. [24] G. Liu, J.Luo, Q. Xiao, and B. Xiao, "Edjam: Effective dynamic jam ming against ieee 802.15. 4-compliant wireless personal area networks," in Proc. IEEE Int'l Con! Communications, June 2011, pp. 1 - 5. [25] A. Wang, Y. Cai, W, Yang, and Z. Hou, "A stackelberg security game with cooperative jamming over a multiuser ofdma network," in Proc. IEEE Wireless Communications and Networking Conference, April 2013, pp. 4169 - 4174. [26] M. Zhu and S. Martinez, "Stackelberg-game analysis of correlated attacks in cyber-physical systems," in Proc. IEEE American Control Coriference, June 2011, pp. 4063 - 4068.
© Copyright 2026 Paperzz