Mobile, Embedded, & Wireless Security

Modeling Interactions between Attackers and Defenders


New software-defined radio and network capabilities allow attacking, greedy, or defending opponents to adapt their protocol operations or behaviors in reponse to detected threats or failures, or even proactively in a sort of moving target defense technique. The value of such adaptation is often clearly understood as long as the opponent is static, as convergence properties can be well-defined in such a case. However, if multiple opponents are simultaneously adapting in response to each other, the system dynamics can not be as easily described. We thus aim to model such multi-player adaptation using a combination of game theory, control theory, empirical data analytics, and stochastic modeling.

Jam/Anti-Jam Interaction

Related Publications

Acknowledgements

This research is partially supported by CyLab at Carnegie Mellon University under grant DAAD19-02-1-0389 from the Army Research Office, by the National Science Foundation under grant CNS-1149582, and by an NDSEG fellowship. The views and conclusions contained in print and online are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either express or implied, of ARO, CMU, NSF, or the U.S. Government or any of its agencies.