Discipline: Technology and Engineering
Subcategory: Electrical Engineering
Session: 2
Room: Marriott Balcony B
Salomon Satche - Howard University
Today, terrestrial mobile communications is mostly regarded as a mature technology mostly in terms of connectivity and communications, whether it is for voice, data, web surfing, or other applications. Still, our daily routine and activities through RF spectrum for communications show that mobile communication technologies as we know it is not as mature as we would like it to be in the area of security. Although numerous work have been done on mobile network security, there is plenty to be done, especially in the area of physical layer security whose research work is relatively new relative to other network layers. Several researches have been published on the physical radio security and yield useful results to help minimize vulnerability and secure the mobile network systems. But so far limited work has actually been focused on the mobility paradigm of the physical payer security. We recognize that due to its dynamic configuration of the network, the characteristics of physical layer is constantly changing along with the network topology, especially when mobile terminals are moving at fast speed. In this paper, we study the case of mobile cyber physical systems in the highway under a vehicular mobile jammer attack. Specifically, we analyze physical layer security (secrecy rates) of network subscribers or legitimate users in the presence of a jammer where legitimate users compete against the jammer and among themselves for a reliable channel. A legitimate user competes with other legitimates users with a sharing attitude for dynamic spectrum access to gain a high secrecy rate. However, the jamming attacker attempts to disrupt the communications egotistically. The contribution of this paper is on the design of game theory to maximize utilities/secrecy rates of the legitimate vehicular users in the presence of vehicular jamming. The study can be customized for particularities such as both the legitimate users and jammer at zero speeds, or the jammer only mobile or vice versa. We evaluate the performance of the proposed approach using results obtained from simulations.
Funder Acknowledgement(s): I want to thank the NSF formaking this research possible.
Faculty Advisor: Dr. Danda B. Rawat, Danda.Rawat@howard.edu