{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:34:28Z","timestamp":1759991668048,"version":"3.41.0"},"reference-count":54,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T00:00:00Z","timestamp":1574380800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2020,2,29]]},"abstract":"<jats:p>Jamming may become a serious threat in Internet of Things networks of battery-powered nodes, as attackers can disrupt packet delivery and significantly reduce the lifetime of the nodes. In this work, we model an active defense scenario in which an energy-limited node uses power control to defend itself from a malicious attacker, whose energy constraints may not be known to the defender. The interaction between the two nodes is modeled as an asymmetric Bayesian game where the victim has incomplete information about the attacker. We show how to derive the optimal Bayesian strategies for both the defender and the attacker, which may then serve as guidelines to develop and gauge efficient heuristics that are less computationally expensive than the optimal strategies. For example, we propose a neural-network-based learning method that allows the node to effectively defend itself from the jamming with a significantly reduced computational load. The outcomes of the ideal strategies highlight the tradeoff between node lifetime and communication reliability and the importance of an intelligent defense from jamming attacks.<\/jats:p>","DOI":"10.1145\/3365838","type":"journal-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:47Z","timestamp":1574448107000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["A Game-Theoretic Analysis of Energy-Depleting Jamming Attacks with a Learning Counterstrategy"],"prefix":"10.1145","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7915-7275","authenticated-orcid":false,"given":"Federico","family":"Chiariotti","sequence":"first","affiliation":[{"name":"University of Padova, Italy"}]},{"given":"Chiara","family":"Pielli","sequence":"additional","affiliation":[{"name":"University of Padova, Italy"}]},{"given":"Nicola","family":"Laurenti","sequence":"additional","affiliation":[{"name":"University of Padova, Italy"}]},{"given":"Andrea","family":"Zanella","sequence":"additional","affiliation":[{"name":"University of Padova, Italy"}]},{"given":"Michele","family":"Zorzi","sequence":"additional","affiliation":[{"name":"University of Padova, Italy"}]}],"member":"320","published-online":{"date-parts":[[2019,11,22]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2018.8449737"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.2307\/1911077"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298239.1298257"},{"volume-title":"Proceedings of the 4th International ICST Conference on Performance Evaluation Methodologies and Tools. Article 65","author":"Altman E.","key":"e_1_2_1_4_1","unstructured":"E. Altman , K. Avrachenkov , and A. Garnaev . 2009. Jamming game with incomplete information about the jammer . In Proceedings of the 4th International ICST Conference on Performance Evaluation Methodologies and Tools. Article 65 , 9 pages. E. Altman, K. Avrachenkov, and A. Garnaev. 2009. Jamming game with incomplete information about the jammer. In Proceedings of the 4th International ICST Conference on Performance Evaluation Methodologies and Tools. Article 65, 9 pages."},{"key":"e_1_2_1_5_1","volume-title":"Dynamic Noncooperative Game Theory. SIAM. Revised from the","author":"Basar Tamer","year":"1995","unstructured":"Tamer Basar and Geert Jan Olsder . 1999. Dynamic Noncooperative Game Theory. SIAM. Revised from the 2 nd ed. published in 1995 by Academic Press , New York . Tamer Basar and Geert Jan Olsder. 1999. Dynamic Noncooperative Game Theory. SIAM. Revised from the 2nd ed. published in 1995 by Academic Press, New York.","edition":"2"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2012.2218067"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18072104"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495974"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182838"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2516102"},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Ricardo C. Carrano Diego Passos Luiz C. S. Magalhaes and Celio V. N. Albuquerque. 2014. Survey and taxonomy of duty cycling mechanisms in wireless sensor networks. IEEE Communications Surveys 8 Tutorials 16 1 (2014) 181--194.  Ricardo C. Carrano Diego Passos Luiz C. S. Magalhaes and Celio V. N. Albuquerque. 2014. Survey and taxonomy of duty cycling mechanisms in wireless sensor networks. IEEE Communications Surveys 8 Tutorials 16 1 (2014) 181--194.","DOI":"10.1109\/SURV.2013.052213.00116"},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/MNET.2013.6523804","article-title":"A game-theoretical anti-jamming scheme for cognitive radio networks","volume":"27","author":"Chen Changlong","year":"2013","unstructured":"Changlong Chen , Min Song , ChunSheng Xin , and Jonathan Backens . 2013 . A game-theoretical anti-jamming scheme for cognitive radio networks . IEEE Network 27 , 3 (June 2013), 22--27. Changlong Chen, Min Song, ChunSheng Xin, and Jonathan Backens. 2013. A game-theoretical anti-jamming scheme for cognitive radio networks. IEEE Network 27, 3 (June 2013), 22--27.","journal-title":"IEEE Network"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.03.006"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2003.814350"},{"key":"e_1_2_1_15_1","volume-title":"Cisco visual networking index: Forecast and methodology","author":"Cisco VNI","year":"2015","unstructured":"VNI Cisco . 2016. Cisco visual networking index: Forecast and methodology , 2015 -2020. CISCO White Paper ( 2016). VNI Cisco. 2016. Cisco visual networking index: Forecast and methodology, 2015-2020. CISCO White Paper (2016)."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2017.2698019"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627406"},{"volume-title":"Neural Network Fundamentals with Graphs, Algorithms and Applications","author":"Liang Ding Bose Nirmal K.","key":"e_1_2_1_18_1","unstructured":"Bose Nirmal K. Liang Ding . 1996. Neural Network Fundamentals with Graphs, Algorithms and Applications . McGraw-Hill . Bose Nirmal K. Liang Ding. 1996. Neural Network Fundamentals with Graphs, Algorithms and Applications. McGraw-Hill."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2622002"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2018.2884910"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2015.2506038"},{"volume-title":"Proceedings of the 51st Annual Conference on Information Sciences and Systems (CISS\u201917)","author":"Garnaev A.","key":"e_1_2_1_23_1","unstructured":"A. Garnaev , W. Trappe , and A. Petropulu . 2017. Equilibrium strategies for an OFDM network that might be under a jamming attack . In Proceedings of the 51st Annual Conference on Information Sciences and Systems (CISS\u201917) . 1--6. A. Garnaev, W. Trappe, and A. Petropulu. 2017. Equilibrium strategies for an OFDM network that might be under a jamming attack. In Proceedings of the 51st Annual Conference on Information Sciences and Systems (CISS\u201917). 1--6."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"volume-title":"Proceedings of the 51st IEEE Conference on Decision and Control (CDC\u201912)","author":"Gupta A.","key":"e_1_2_1_25_1","unstructured":"A. Gupta , A. Nayyar , C. Langbort , and T. Ba\u015far . 2012. A dynamic transmitter-jammer game with asymmetric information . In Proceedings of the 51st IEEE Conference on Decision and Control (CDC\u201912) . 6477--6482. A. Gupta, A. Nayyar, C. Langbort, and T. Ba\u015far. 2012. A dynamic transmitter-jammer game with asymmetric information. In Proceedings of the 51st IEEE Conference on Decision and Control (CDC\u201912). 6477--6482."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.14.5.320"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2015.2488620"},{"volume-title":"Proceedings of the 3rd International Conference on Learning Representations (ICLR\u201914)","author":"Diederik","key":"e_1_2_1_28_1","unstructured":"Diederik P. Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization . In Proceedings of the 3rd International Conference on Learning Representations (ICLR\u201914) . Diederik P. Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. In Proceedings of the 3rd International Conference on Learning Representations (ICLR\u201914)."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2016.2605660"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1464420.1464426"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1137\/0112033"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.062612.00056"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.864173"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.12.005"},{"key":"e_1_2_1_35_1","first-page":"304","article-title":"Analysis of the WSN MAC protocols under jamming DoS attack","volume":"16","author":"Mihajlov Boris","year":"2014","unstructured":"Boris Mihajlov and Mitko Bogdanoski . 2014 . Analysis of the WSN MAC protocols under jamming DoS attack . IJ Network Security 16 , 4 (2014), 304 -- 312 . Boris Mihajlov and Mitko Bogdanoski. 2014. Analysis of the WSN MAC protocols under jamming DoS attack. IJ Network Security 16, 4 (2014), 304--312.","journal-title":"IJ Network Security"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090404"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.2307\/1969529"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1002\/nav.3800010207"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2632128"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2017.7876109"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.921621"},{"volume-title":"Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools","author":"Renna Francesco","key":"e_1_2_1_42_1","unstructured":"Francesco Renna , Nicola Laurenti , and Yih-Chun Hu. 2011. The jamming game in an OFDM setting . In Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools . ICST (Institute for Computer Sciences , Social- Informatics and Telecommunications Engineering), 496--505. Francesco Renna, Nicola Laurenti, and Yih-Chun Hu. 2011. The jamming game in an OFDM setting. In Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 496--505."},{"volume-title":"Proceedings of the International Conference on Game Theory for Networks. 130--139","author":"Sagduyu Y. E.","key":"e_1_2_1_43_1","unstructured":"Y. E. Sagduyu , R. Berry , and A. Ephremides . 2009. MAC games for distributed wireless network security with incomplete information of selfish and malicious user types . In Proceedings of the International Conference on Game Theory for Networks. 130--139 . Y. E. Sagduyu, R. Berry, and A. Ephremides. 2009. MAC games for distributed wireless network security with incomplete information of selfish and malicious user types. In Proceedings of the International Conference on Game Theory for Networks. 130--139."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5978424"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023654"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/63522.214389"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2009.5235211"},{"volume-title":"Theory of Games and Economic Behavior","author":"Neumann John Von","key":"e_1_2_1_48_1","unstructured":"John Von Neumann and Oskar Morgenstern . 2007. Theory of Games and Economic Behavior . Princeton University Press . John Von Neumann and Oskar Morgenstern. 2007. Theory of Games and Economic Behavior. Princeton University Press."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSSC.2010.936667"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110418"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753295"},{"volume-title":"Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. 60--69","author":"Wood A. D.","key":"e_1_2_1_52_1","unstructured":"A. D. Wood , J. A. Stankovic , and G. Zhou . 2007. DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks . In Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. 60--69 . A. D. Wood, J. A. Stankovic, and G. Zhou. 2007. DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. 60--69."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2418776"},{"key":"e_1_2_1_54_1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/MNET.2006.1637931","article-title":"Jamming sensor networks: Attack and defense strategies","volume":"20","author":"Xu Wenyuan","year":"2006","unstructured":"Wenyuan Xu , Ke Ma , Wade Trappe , and Yanyong Zhang . 2006 . Jamming sensor networks: Attack and defense strategies . IEEE Network 20 , 3 (May 2006), 41--47. Wenyuan Xu, Ke Ma, Wade Trappe, and Yanyong Zhang. 2006. Jamming sensor networks: Attack and defense strategies. IEEE Network 20, 3 (May 2006), 41--47.","journal-title":"IEEE Network"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.071913121570"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365838","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3365838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:36Z","timestamp":1750202616000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365838"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,22]]},"references-count":54,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2,29]]}},"alternative-id":["10.1145\/3365838"],"URL":"https:\/\/doi.org\/10.1145\/3365838","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2019,11,22]]},"assertion":[{"value":"2018-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}