Abstract
Wireless devices may threaten urban security if they are maliciously used. Some Internet-of-things (IoT) devices have already troubled the city management even hurt citizens. Jamming technique is one of the effective approaches to prevent these malicious activities. In addition, some IoT devices may locate far from base station and the power of received signals may be low. In this paper, we discuss a jamming power allocation problem in a multi-user multiple-input multiple-output (MU-MIMO) downlink relay system when the communication and jamming signals are relatively low due to the long distance between them, in which jammer tries to minimize the sum rate of IoT devices while these devices try to communicate at the fastest rate. Besides, jammer transmits jamming signals after detecting the communication request of devices so base station should decide how to transmit first, which is modeled by a two-person zero-sum Stackelberg game. However, the sum rate in such a scenario is non-convex. Finding the equilibrium strategy is general N-P hard. To address this complex problem, we decompose it into several easy-solved sub-problems and adopt an alternating optimization over them. Further, we simulate the proposed method numerically and results suggest the superiority.
Supported by National Natural Science Foundation of China: NSFC61871092.
Access provided by Autonomous University of Puebla. Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
The widely used wireless devices facilitate daily life but it threatens urban security. For example, terrorists may use wireless Internet of Things (IoT) devices to destroy public facilities even endanger life safety. The characteristic of exposure to the open-access environment of wireless communication systems makes it susceptible to deliberate jamming attacks. In this way, jammer limits the communication among opponents to protect itself. Traditional adversarial jamming methods against wireless communication systems include tone jamming, barrage jamming and narrow-band jamming. These methods are widely applied but they are inefficient. On the other hand, jamming techniques are facing the challenges of anti-jamming techniques. For example, cognitive radio (CR) [8] techniques have the inherent merit of evading the jamming signal intelligently. Jamming techniques need to be upgraded.
One of the effective theories referred to by much intelligent jamming research about countering the CR system is game theory. Most related research can be divided into two types: correlated and uncorrelated jamming. Correlated jamming [1, 2, 7, 13, 14] means jamming signal correlates to communication signal, while uncorrelated jamming [3,4,5,6, 9, 15,16,17, 19] means they are independent. Obviously, uncorrelated jamming is easier to be implemented. In [4], a Bayesian game between transceiver and jammer was formulated, where jammer did not know the user type (smart or regular one) clearly. In [17], the best strategy (Nash equilibrium) for both authorized users and jammer is to uniformly allocate all power to all the subchannels in AWGN channel in Orthogonal Frequency Division Multiplexing (OFDM) system. Some researchers concentrated on the multi-user system. In the uplink of multi-tone interference single-input-single-output (SISO) channel, the jamming-transmitting capacity game has a Nash equilibrium and it can be achieved by the generalized iterative water-filling algorithm [6]. In [18], a Stackelberg game of a base station and a jammer in nonorthogonal multiple access (NOMA) downlink system was investigated and a Q-learning-based power allocation algorithm was proposed. Furthermore, some researchers were interested in the relay system. In a single-transmitter, single-user and multi-relay communication system, in which some relays are non-cooperative to others and behave maliciously to transceiver like a jammer, it proved that the Nash equilibrium is transmitting Gaussian white noise [3], and [15] extended this research in a two-way relay channel.
Previous research gives much insight into the jamming strategy, however, little research investigates the optimal jamming strategy in the time-invariant multi-user multiple-input multiple-output (MU-MIMO) downlink relay scenario which is common in reality. Besides, the distances between base station and IoT devices may sometimes be long and jammer may be far away from them so signal-to-noise ratio (SNR) and jamming-to-noise ratio (JNR) are relatively low. To jam these devices in such a scenario, we formulate a new static zero-sum Stackelberg game of intelligently jamming MIMO downlink relay system, in which base station tries to maximize the sum rate of the whole communication system while jammer tries to minimize it. However, it is hard to find this equilibrium since the sum rate is non-convex [10]. We propose a feasible algorithm to address this complex problem. We first approximate the sum rate by an inequality. Subsequently, we decompose it into several easy-solved sub-problems and adopt an alternating optimization over them. Finally, we solve every sub-problem by the Lagrange method or majorization-minimization (MM) algorithm.
The rest of this paper is organized as follows. The system model and the jamming-transmitting zero-sum game model are formulated in Sect. 2. In Sect. 3, we show how to find an approximate equilibrium strategy of the transmitting-jamming zero-sum game in time-invariant channel. Then we simulate those algorithms by numerical method in Sect. 4 and conclude this paper in Sect. 5 (Table 1).
2 System Model
2.1 Wireless Communication and Jamming Model
As shown in Fig. 1, we consider the downlink model of a MIMO communication system with one amplify-and-forward (AF) relay and K devices. A jammer tries to disrupt this system by transmitting jamming signals to relay and devices. The power of jammer is limited. We assume that the wireless signals from base station attenuate seriously due to the long distance between base station and devices so we can neglect them. For simplicity, all the radios are equipped with M antennas. The maximum powers of jammer and base station are \(P_J\) and \(P_S\) separately and the amplification factor of AF relay is \(\mu \). In addition, for consistency with other related research, we call k-device k-user.
The received signal at relay is given by
and the received signal at k-th user is given by
where \(\mathbf{H}_{(\cdot ) (*)}\) denotes the \(M \times M\) channel matrix from (\(\cdot \)) to (\(*\)) and the subscript “S”, “R”, “J”, “k” means base station, relay, jammer and k-user respectively. Each element of \(\mathbf{H}_{(\cdot ) (*)}\) is supposed to be identically independently distributed (i.i.d.), i.e., \(\mathbf{H}_{(\cdot ) (*)} = [g_{ij(\cdot ) (*)}]_{1\le i,j \le M}\) and \(g_{ij(\cdot ) (*)} \sim \mathcal {CN}(0, \sigma _{(\cdot ) (*)}^2)\) where \(\mathcal {CN}\) is circular symmetric complex Gaussian distribution. \(\mathbf{y}_{(\cdot )}\) is the received signal at (\(\cdot \)). \(\mathbf{x}_{(\cdot )}\) and \(\mathbf{j}_{(\cdot )}\) are the transmitting and jamming symbol to \((\cdot )\) and the subscript “0” means “to relay”. Every symbol of \(\mathbf{x}_{(\cdot )}\) and \(\mathbf{j}_{(\cdot )}\) is normalized and i.i.d. so \(\mathbb {E}(x_{(\cdot )i})=0\), \(\mathbb {E}(j_{(\cdot )i})=0\) and \(\mathbb {E}(x_{(\cdot )i}x_{(\cdot )l}^H)=0\), \(\mathbb {E}(j_{(\cdot )i}j_{(\cdot )l}^H)=0\), \(l\ne i\). \(\alpha _{(\cdot )}\) and \(\beta _{(\cdot )}\) are the power proportion allocated to (\(\cdot \)) by base station and jammer. \(\mathbf{n}_o\) and \(\mathbf{n}_k\) are white Gaussian noise and \(\mathbf{n}_{(\cdot )} \sim \mathcal {CN}(0, N_{(\cdot )} \mathbf{I})\). SNR is defined by the power of base station \(P_S\) divided by the power of noise, \(P_S / N\), and JNR is \(P_J / N\). The covariance matrix of transmitting signal to user k denotes as \(\mathbf{K}_{Xk}\) and that of jamming signal is \(\mathbf{K}_{J}\).
2.2 Stackelberg Game Formulation
In this section, we introduce the jamming game model with respect to sum rate. A standard strategic game consists of a finite set of players \(\mathcal {N}\) for each play \(i \in \mathcal {N}\), a non-empty action set \(\mathcal {A}_i\) and for each player a preference relation on \(\mathcal {A}= \times _{i \in \mathcal {N}}\mathcal {A}_i\) [11]. We define \(\mathcal {N} = \{\text {base station, jammer}\}\). The action spaces of them are \(\mathcal {A}_1 = \{ \mathbf{K}_{Xk} \in \mathbb {C}^{M\times M} | \mathbf{K}_{Xk} \succeq 0, \sum _{k=1}^{K} \text {Tr}(\mathbf{K}_{Xk}) \le P_S, k=1,2,...,K \}\) and \(\mathcal {A}_2 = \{ \mathbf{K}_{Jk} \in \mathbb {C}^{M\times M} | \mathbf{K}_{Jk} \succeq 0, \sum _{k=0}^{K} \text {Tr}(\mathbf{K}_{Jk}) \le P_J, k=0,1,...,K \}\) respectively. The preference relations are defined by positive associated utility functions: \(u_1(\mathbf{K}_{Xk}; \mathbf{K}_{Jk}) = R(\mathbf{K}_{Xk}, \mathbf{K}_{Jk}) = \sum _{k=1}^{K} R_k(\mathbf{K}_{Xk}, \mathbf{K}_{Jk})\) for base station and \(u_2(\mathbf{K}_{Jk}; \mathbf{K}_{Xk}) = - R(\mathbf{K}_{Xk}, \mathbf{K}_{Jk}) = -\sum _{k=1}^{K} R_k(\mathbf{K}_{Jk}; \mathbf{K}_{Xk})\) for jammer, where \(R_k(*, \cdot )\) is the data rate of k-th user
and \(\tilde{\mathbf{N}}_{k}=\mu \mathbf{H}_{Rk} N_0 \mathbf{H}_{Rk}^H+N_k \mathbf{I}\). We define \(u(*) = u_1(*) = -u_2(*)\). In such case, the jamming game is denoted by \(G_1 = {<}\mathcal {N}, (\mathcal {A}_1, \mathcal {A}_2), (u_1, u_2){>}\) in brief.
Moreover, in a practical reactive jamming regime, jammer usually sends jamming signals after detecting communication signals, and base station is aware of this, which means that base station and jammer must decide in order. On the other hand, base station and jammer are both intelligent enough to choose an optimal transmitting strategy (covariance matrices). Thus, we model game \(G_1\) as a Stackelberg game, which is given by
3 Stackelberg Equilibrium of Jamming Game in Time-Invariant Channel
In this section, we will address the optimal jamming power allocation problem in the MU-MIMO downlink system in the time-invariant channel. However, problem (4) is quite complex. We first simplify the sum rate function in the regime of low SNR and JNR. Then, we decouple it into two simple sub-problems to find the jamming strategy.
Due to the low SNR and JNR, the covariance matrices of communication and jamming signals are smaller than those of noise. For relatively smaller matrix \(\mathbf{X,Y}\),
It is easy to prove it.
Substituting formula (5) into (3), \(R_k\) can be approximated by
Suppose that
and
Given \(\mathbf{K}_{Xk}\), \(k=1,2,...,K\), \(R(\mathbf{K}_J;\mathbf{K}_{X1},...,\mathbf{K}_{XK})=\text {Tr}(\mathbf{A} \mathbf{K}_{J})\), and given \(\mathbf{K}_J\) \(R(\mathbf{K}_{X1}, ..., \mathbf{K}_{XK};\mathbf{K}_J)=\sum _{k=0}^{K} \text {Tr}(\mathbf{B}_{1k}{} \mathbf{K}_{Xk}-\mathbf{K}_{Xk}{} \mathbf{B}_{2k}\sum _{l \ne k}{} \mathbf{K}_{Xl}{} \mathbf{B}_{2k})\). The original problem (4) is decoupled into two sub-problems:
and
3.1 Jamming Power Allocation Strategy Design
Jamming power allocation strategy is acquired by solving problem (10). It is a convex problem. The Lagrangian of it reads
and the Karush-Kuhn-Tucker (KKT) Conditions of it are given by
The solution is discussed as follows: (a) When \(\lambda =0\), \(\mathbf{Q}=\mathbf{A}\), leading to \(\mathbf{A} \succeq 0\). The optimal jamming covariance matrix \(\mathbf{K}_J^*\) satisfies \(\text {Tr}(\mathbf{K}_J)\le P_J, \mathbf{K}_J \succeq 0, \mathbf{A}{} \mathbf{K}_J=0\). Obviously, \(\mathbf{K}_J=\mathbf{0}\) is one of the solutions. (b) When \(\lambda >0\), \(\mathbf{Q}=\mathbf{A}+\lambda \mathbf{I}\). If \(\mathbf{Q}\succ 0\), \(\mathbf{K}_J=0\) since \(\mathbf{Q}{} \mathbf{K}_J=0\). It contradicts with \(\text {Tr}(\mathbf{K}_J)=P_J\). Moreover, \(\mathbf{A}\succeq 0\) is impossible since \(\mathbf{Q}\) can not be strictly positive definite. Let \(\mathbf{Q} = \mathbf{A}+\lambda _{Amin}{} \mathbf{I}\) where \(\lambda _{Amin}\) is the minimum eigenvalue of matrix \(\mathbf{A}\). \(\mathbf{K}_J^*\) should satisfy \(\mathbf{Q}{} \mathbf{K}_J^*=0\), \(\text {Tr}(\mathbf{K}_J^*)=P_J\) and \(\mathbf{K}_J^* \succeq 0\). If \(\mathbf{u}\) is one of the bases of the null space of \(\mathbf{Q}\), then \(\mathbf{Q}{} \mathbf{u}{} \mathbf{u}^H=\mathbf{0}\). Consequently, \(P_J\mathbf{u}{} \mathbf{u}^H\) is one of the solutions of \(\mathbf{K}_J\).
3.2 Optimizing Base Station Transmitting Strategy
The transmitting power allocation strategy of base station is acquired by solving problem (11). However, it is non-convex. It can be rewritten as
where \(\mathbf{B}_1\), \(\mathbf{B}_2\) are the block diagonal concatenation of \(\mathbf{B}_{1k}\) and \(\mathbf{B}_{2k}\) respectively. \(\mathbf{I}_v=(\mathbf{I}, \mathbf{I}, ..., \mathbf{I})^T\).
\(\mathbf{I}\) is the \(M\times M\) identity matrix. \(\mathbf{B}_2 \mathbf{I}_M\) may not be positive semidefinite.
To solve problem (14), we use the majorization-minimization (MM) method. MM method consists of two steps: (a) find a surrogate function which is the tight upper bound of original objective. (b) minimize surrogate function. The first critical thing is to find the tight upper bound \(\check{f}(\mathbf{K}_X)\) of the objective \(f(\mathbf{K}_X)\).
Definition 1
(Lipschitz Continuous [12]). Given two metric spaces \((X, d_X)\) and \((Y, d_Y)\) where \(d_*\) denotes the metric on set \((*)\). A function \(f:X \mapsto Y\) is called Lipschitz continuous if there exists a real constant \(L \ge 0\) such that for all \(x_1, x_2 \in X\), \(d_Y(f(x_1),f(x_2)) \le Ld_X(x_1, x_2)\).
The second-order Taylor expansion of the quadratic matrix function \(g(\mathbf{X})=\text {Tr}(\mathbf{X\check{A}X\check{B}})\) is convex. Thus, if the gradient of \(g(\mathbf{X})\) is Lipschitz continuous, it can be bounded by a convex quadratic function
where \(||\nabla g(\mathbf{X}) - \nabla g(\mathbf{X}_0)|| \le L ||\mathbf{X}-\mathbf{X}_0||\) and \(\nabla g(\mathbf{X})=(\check{\mathbf{A}} \mathbf{X} \check{\mathbf{B}} + \check{\mathbf{B}}{} \mathbf{X}\check{\mathbf{A}})^T\). Define
so
There is a natural bound of L: the spectral norm of \(\mathbf{V}\). Let \(\check{\mathbf{A}}=\mathbf{B}_2 \mathbf{I}_M\), \(\check{\mathbf{B}}=\mathbf{I}_v \mathbf{I}_v^H \mathbf{B}_2\), so the upper bound is expressed as
Thus, the problem (11) can be solved by successively solving convex problem (19).
In summary, the original optimal jamming power allocation Stackelberg game (4) of the MU-MIMO downlink system in the time-invariant channel can be solved by alternatively optimizing problem (10) and problem (11). Furthermore, problem (11) can be converted into sub-problem (19). The procedures to find the jamming strategy are in Algorithm 1.
4 Numerical Results
In this section, we will verify the performance of the proposed jamming power allocation algorithm. We compare the proposed method with several widely-used jamming methods numerically. Results indicate that the proposed jamming method is superior to other methods. We present the performance of four methods: Stackelberg jamming (SJ) strategy, the uniformly jamming (UJ) strategy, the strategy of matching the jamming channel to base station but uniformly allocating power (\(\mathbf{K}_J=\frac{P_J}{n}{} \mathbf{V}{} \mathbf{V}^H\), marked as ‘BUJ’), the strategy of inverting the channel between jammer and base station (marked as ‘BJI’). Without loss of generality, the channel matrices \(\mathbf{H}_{(\cdot ) (*)} = [g_{ij(\cdot ) (*)}]_{1\le i,j \le M}\) and \(g_{ij(\cdot ) (*)} \sim \mathcal {CN}(0, 1)\) and \(N_k=10\) for all \(k=0,1,...,K\).
We first focus on Fig. 2. Obviously, all the sum rates under different jamming and transmitting strategies decrease with SNR. The sum rate of the proposed method (marked as ‘SJ’) is the lowest compared to other methods. Then we turn to reveal the performances with different SNR in Fig. 3. With SNR increases, the sum rate of all users increases with no doubt for all methods. So proposed equilibrium jamming strategy is still the lowest one. These two results manifest that jammer can jam adversaries more effectively by using the proposed method.
5 Conclusion
In this paper, we formulate a two-person zero-sum Stackelberg game about jamming power allocation problem in MU-MIMO downlink system with smart jammers in low SNR and JNR regime. We derive the approximated form of the original problem and solve the approximated equilibrium strategy by an iterative method. Numerical results show that the proposed jamming power allocation method can successfully jam such a system. In the future, we plan to extend this work in a non-orthogonal multiple-access (NOMA) regime.
References
Akyol, E.: On optimal jamming in strategic communication. In: 2019 IEEE Information Theory Workshop (ITW), pp. 1–5 (2019). https://doi.org/10.1109/ITW44776.2019.8989298
Basar, T.: The Gaussian test channel with an intelligent jammer. IEEE Trans. Inf. Theory 29(1), 152–157 (1983). https://doi.org/10.1109/TIT.1983.1056602
Chen, M., Lin, S., Hong, Y.P., Zhou, X.: On cooperative and malicious behaviors in multirelay fading channels. IEEE Trans. Inf. Forensics Secur. 8(7), 1126–1139 (2013). https://doi.org/10.1109/TIFS.2013.2262941
Garnaev, A., Petropulu, A.P., Trappe, W., Vincent Poor, H.: A jamming game with rival-type uncertainty. IEEE Trans. Wirel. Commun. 19(8), 5359–5372 (2020). https://doi.org/10.1109/TWC.2020.2992665
Garnaev, A., Trappe, W.: A prospect theoretical extension of a communication game under jamming. In: 2019 53rd Annual Conference on Information Sciences and Systems (CISS), pp. 1–6 (2019). https://doi.org/10.1109/CISS.2019.8692847
Gohary, R.H., Huang, Y., Luo, Z., Pang, J.: A generalized iterative water-filling algorithm for distributed power control in the presence of a jammer. IEEE Trans. Signal Process. 57(7), 2660–2674 (2009). https://doi.org/10.1109/TSP.2009.2014275
Kashyap, A., Basar, T., Srikant, R.: Correlated jamming on MIMO Gaussian fading channels. IEEE Trans. Inf. Theory 50(9), 2119–2123 (2004). https://doi.org/10.1109/TIT.2004.833358
Liang, Y., Chen, K., Li, G.Y., Mahonen, P.: Cognitive radio networking and communications: an overview. IEEE Trans. Veh. Technol. 60(7), 3386–3407 (2011). https://doi.org/10.1109/TVT.2011.2158673
Liu, Q., Li, M., Kong, X., Zhao, N.: Disrupting MIMO communications with optimal jamming signal design. IEEE Trans. Wirel. Commun. 14(10), 5313–5325 (2015). https://doi.org/10.1109/TWC.2015.2436385
Luo, Z., Zhang, S.: Dynamic spectrum management: complexity and duality. IEEE J. Sel. Top. Signal Process. 2(1), 57–73 (2008). https://doi.org/10.1109/JSTSP.2007.914876
Osborne, M.J., Rubinstein, A.: A Course in Game Theory. The MIT Press, Cambridge (1994)
O’Searcoid, M.: Metric Spaces. Springer Undergraduate Mathematics Series. Springer, London (2006)
Shafiee, S., Ulukus, S.: Capacity of multiple access channels with correlated jamming. In: MILCOM 2005–2005 IEEE Military Communications Conference, vol. 1, pp. 218–224 (2005). https://doi.org/10.1109/MILCOM.2005.1605689
Shafiee, S., Ulukus, S.: Mutual information games in multiuser channels with correlated jamming. IEEE Trans. Inf. Theory 55(10), 4598–4607 (2009). https://doi.org/10.1109/TIT.2009.2027577
Shao, Y., Chen, M., Lin, S., Lin, W.S.: On two-way relay channel with an active malicious relay. In: 2015 International Conference on Wireless Communications Signal Processing (WCSP), pp. 1–6 (2015). https://doi.org/10.1109/WCSP.2015.7341118
Signori, A., Chiariotti, F., Campagnaro, F., Zorzi, M.: A game-theoretic and experimental analysis of energy-depleting underwater jamming attacks. IEEE Internet Things J. 7(10), 9793–9804 (2020). https://doi.org/10.1109/JIOT.2020.2982613
Song, T., Stark, W.E., Li, T., Tugnait, J.K.: Optimal multiband transmission under hostile jamming. IEEE Trans. Commun. 64(9), 4013–4027 (2016). https://doi.org/10.1109/TCOMM.2016.2597148
Xiao, L., Li, Y., Dai, C., Dai, H., Poor, H.V.: Reinforcement learning-based NOMA power allocation in the presence of smart jamming. IEEE Trans. Veh. Technol. 67(4), 3377–3389 (2018). https://doi.org/10.1109/TVT.2017.2782726
Zhou, X., Qiu, M., Lin, S.C., Hong, Y.W.P.: On the jamming power allocation and signal design in DF relay networks. In: 2013 Asilomar Conference on Signals, Systems and Computers, pp. 1268–1272 (2013). https://doi.org/10.1109/ACSSC.2013.6810497
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Shi, B., Cui, K., Jiang, J., Shao, H. (2022). On Jamming Game in Multi-user MIMO Downlink AF Relay System. In: Jiang, D., Song, H. (eds) Simulation Tools and Techniques. SIMUtools 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 424. Springer, Cham. https://doi.org/10.1007/978-3-030-97124-3_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-97124-3_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-97123-6
Online ISBN: 978-3-030-97124-3
eBook Packages: Computer ScienceComputer Science (R0)