Vis enkel innførsel

dc.contributor.authorAi, Yun
dc.contributor.authorBhatnagar, Manav R.
dc.contributor.authorCheffena, Michael
dc.contributor.authorMathur, Aashish
dc.contributor.authorSedakov, Artem
dc.date.accessioned2018-02-13T08:45:44Z
dc.date.available2018-02-13T08:45:44Z
dc.date.created2017-09-15T18:13:33Z
dc.date.issued2017
dc.identifier.isbn978-3-319-68710-0
dc.identifier.urihttp://hdl.handle.net/11250/2484275
dc.description.abstractIn this paper, we investigate the performance of power line communication (PLC) network in the presence of jamming attacks. The legitimate nodes of the PLC network try to communicate with the anchor node of the network while the jamming node attempts to degrade the system performance. The fading, attenuation and colored noise of the PLC channel with dependence on the frequency and transmission distance are taken into account. To investigate the jamming problem, we frame the adversarial interaction into a Bayesian game, where the PLC network tries to maximize the overall expected network capacity and the jammer node has the opposite goal. In the Bayesian game, both players have imperfect knowledge of their opponents. We study effects of total power available to the players on the equilibrium of the game by formulating it into zero-sum and non-zero-sum games, respectively. It is found that under some network setup, there exists a threshold power for which the actual gameplay of the legitimate nodes does not depend upon the actions of the jamming node, and vice versa. This allows us to choose the appropriate power allocation schemes given the total power and the action of the jamming node in some cases.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringernb_NO
dc.relation.ispartofDecision and Game Theory for Security
dc.relation.urihttps://link.springer.com/book/10.1007/978-3-319-68711-7
dc.titleGame-Theoretical Analysis of PLC System Performance in the Presence of Jamming Attacksnb_NO
dc.typeChapternb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber1-17nb_NO
dc.identifier.doi10.1007/978-3-319-68711-7_5
dc.identifier.cristin1494232
dc.description.localcodeThis is a post-peer-review, pre-copyedit version of an article published in [International Conference on Decision and Game Theory for Security]. Locked until 4.10.2018 due to copyright restrictions. The final authenticated version is available online at: https://link.springer.com/chapter/10.1007%2F978-3-319-68711-7_5nb_NO
cristin.unitcode194,64,94,0
cristin.unitnameInstitutt for vareproduksjon og byggteknikk
cristin.ispublishedfalse
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel