-
Smart Jammer and LTE Network Strategies in An Infinite-Horizon Zero-Sum Repeated Game with Asymmetric and Incomplete Information
Authors:
Farhan M. Aziz,
Lichun Li,
Jeff S. Shamma,
Gordon L. Stuber
Abstract:
LTE/LTE-Advanced networks are known to be vulnerable to denial-of-service and loss-of-service attacks from smart jammers. In this article, the interaction between a smart jammer and LTE network is modeled as an infinite-horizon, zero-sum, asymmetric repeated game. The smart jammer and eNode B are modeled as the informed and the uninformed player, respectively. The main purpose of this article is t…
▽ More
LTE/LTE-Advanced networks are known to be vulnerable to denial-of-service and loss-of-service attacks from smart jammers. In this article, the interaction between a smart jammer and LTE network is modeled as an infinite-horizon, zero-sum, asymmetric repeated game. The smart jammer and eNode B are modeled as the informed and the uninformed player, respectively. The main purpose of this article is to construct efficient suboptimal strategies for both players that can be used to solve the above-mentioned infinite-horizon repeated game with asymmetric and incomplete information. It has been shown in game-theoretic literature that security strategies provide optimal solution in zero-sum games. It is also shown that both players' security strategies in an infinite-horizon asymmetric game depend only on the history of the informed player's actions. However, fixed-sized sufficient statistics are needed for both players to solve the above-mentioned game efficiently. The smart jammer uses its evolving belief state as the fixed-sized sufficient statistics for the repeated game. Whereas, the LTE network (uninformed player) uses worst-case regret of its security strategy and its anti-discounted update as the fixed-sized sufficient statistics. Although fixed-sized sufficient statistics are employed by both players, optimal security strategy computation in λ-discounted asymmetric games is still hard to perform because of non-convexity. Hence, the problem is convexified in this article by devising `approximated' security strategies for both players that are based on approximated optimal game value. However, `approximated' strategies require full monitoring. Therefore, a simplistic yet effective `expected' strategy is also constructed for the LTE network that does not require full monitoring. The simulation results show that the smart jammer plays non-revealing and misleading strategies.
△ Less
Submitted 25 April, 2019;
originally announced April 2019.
-
Robust Beamforming with Pilot Reuse Scheduling in a Heterogeneous Cloud Radio Access Network
Authors:
Hao Xu,
Cunhua Pan,
Wei Xu,
Gordon L. Stüber,
Jianfeng Shi,
Ming Chen
Abstract:
This paper considers a downlink ultra-dense heterogeneous cloud radio access network (H-CRAN) which guarantees seamless coverage and can provide high date rates. In order to reduce channel state information (CSI) feedback overhead, incomplete inter-cluster CSI is considered, i.e., each remote radio head (RRH) or macro base station (MBS) only measures the CSI from user equipments (UEs) in its servi…
▽ More
This paper considers a downlink ultra-dense heterogeneous cloud radio access network (H-CRAN) which guarantees seamless coverage and can provide high date rates. In order to reduce channel state information (CSI) feedback overhead, incomplete inter-cluster CSI is considered, i.e., each remote radio head (RRH) or macro base station (MBS) only measures the CSI from user equipments (UEs) in its serving cluster. To reduce pilot consumption, pilot reuse among UEs is assumed, resulting in imperfect intra-cluster CSI. A two-stage optimization problem is then formulated. In the first stage, a pilot scheduling algorithm is proposed to minimize the sum mean square error (MSE) of all channel estimates. Specifically, the minimum number of required pilots along with a feasible pilot allocation solution are first determined by applying the Dsatur algorithm, and adjustments based on the defined level of pilot contamination are then carried out for further improvement. Based on the pilot allocation result obtained in the first stage, the second stage aims to maximize the sum spectral efficiency (SE) of the network by optimizing the beam-vectors. Due to incomplete inter-cluster CSI and imperfect intra-cluster CSI, an explicit expression of each UE's achievable rate is unavailable. Hence, a lower bound on the achievable rate is derived based on Jensen's inequality, and an alternative robust transmission design (RTD) algorithm along with its distributed realization are then proposed to maximize the derived tight lower bound. Simulation results show that compared with existing algorithms, the system performance can be greatly improved by the proposed algorithms in terms of both sum MSE and sum SE.
△ Less
Submitted 23 April, 2018;
originally announced April 2018.
-
Robust Transmission Design for Multi-Cell D2D Underlaid Cellular Networks
Authors:
Hao Xu,
Gordon L. Stüber,
Wei Xu,
Cunhua Pan,
Jianfeng Shi,
Zhaohui Yang,
Ming Chen
Abstract:
This paper investigates the robust transmission design (RTD) of a multi-cell device-to-device (D2D) underlaid cellular network with imperfect channel state information (CSI). The bounded model is adopted to characterize the CSI impairment and the aim is to maximize the worst-case sum rate of the system. To protect cellular communications, it is assumed that the interference from all D2D transmitte…
▽ More
This paper investigates the robust transmission design (RTD) of a multi-cell device-to-device (D2D) underlaid cellular network with imperfect channel state information (CSI). The bounded model is adopted to characterize the CSI impairment and the aim is to maximize the worst-case sum rate of the system. To protect cellular communications, it is assumed that the interference from all D2D transmitters to each base station (BS) is power-limited. It is first shown that the worst-case signal-to-interference-plus-noise ratio (SINR) of each D2D link can be obtained directly, while that of cellular links cannot be similarly found since the channel estimation error vectors of cellular links are coupled in the SINR expressions. To solve the nonconvex problem, the objective function of the original problem is replaced with its lower bound, and the resulted problem is decomposed into multiple semidefinite programming (SDP) subproblems which are convex and have computationally efficient solutions. An iterative RTD algorithm is then proposed to obtain a suboptimal solution. Simulation results show that D2D communication can significantly increase the performance of the conventional cellular systems while causing tolerable interference to cellular users. In addition, the proposed RTD algorithm outperforms the conventional non-robust transmission design greatly in terms of network spectral efficiency.
△ Less
Submitted 14 April, 2018;
originally announced April 2018.