scispace - formally typeset
Search or ask a question
Author

Andrey Garnaev

Bio: Andrey Garnaev is an academic researcher from Rutgers University. The author has contributed to research in topics: Jamming & Nash equilibrium. The author has an hindex of 24, co-authored 114 publications receiving 1538 citations. Previous affiliations of Andrey Garnaev include Saint-Petersburg State University of Architecture and Civil Engineering & Saint Petersburg State University.


Papers
More filters
Book ChapterDOI
05 Jun 2007
TL;DR: It turns out that it is possible to provide analytical expressions for the equilibrium strategies of Nash equilibrium and even a generalization of the standard water-filling in the case of one player game.
Abstract: We consider jamming in wireless networks with transmission cost for both transmitter and jammer. We use the framework of non-zerosum games. In particular, we prove the existence and uniqueness of Nash equilibrium. It turns out that it is possible to provide analytical expressions for the equilibrium strategies. These expressions is a generalization of the standard water-filling. In fact, since we take into account the cost of transmission, we obtain even a generalization of the water-filling in the case of one player game. The present framework allows us to study both water-filling in time and water-filling in frequency. By means of numerical examples we study an important particular case of jamming of the OFDM system when the jammer is situated close to the base station.

135 citations

Book
15 Jun 2000
TL;DR: In this article, preliminary results from game theory were presented for Ambush Games, Allocation Games, Dynamic Infiltration and Inspection Games, Games of Timing, and Parlour Games.
Abstract: Preliminary Results from Game Theory.- Ambush Games.- Allocation Games.- Dynamic Infiltration and Inspection Games.- Games of Timing.- Parlour Games.

85 citations

Journal ArticleDOI
TL;DR: Game theoretic models of the interaction between an adversary and a first responder in order to study the problem of security within a transportation infrastructure, both static and dynamic, are presented.

73 citations

Proceedings ArticleDOI
01 Dec 2008
TL;DR: This work suggests the generalized α-fairness concept, which is interested in assigning the transmission power so as to obtain fairness between either one of three resulting performance measures: the signal to noise ratio, a shifted version of it, or the Shannon capacity.
Abstract: The classical water filling problem is concerned with optimally assigning powers over n independent channels so as to maximize the total transmitted throughput. If each channel is associated with another mobile then it is natural to consider also the problem of fair assignment and to study tradeoffs between fairness and optimality. The object which is allocated is the transmission power, and we are interested in assigning it so as to obtain fairness between either one of three resulting performance measures: the signal to noise ratio, a shifted version of it, or the Shannon capacity. We suggest the generalized α-fairness concept. We obtain explicit solutions for and insight on the fair assignment corresponding to the various performance measures. For the case of a large number of users we consider a variational formulation of the problem. The variational formulation allows us to design distributed resource allocation algorithms.

72 citations

Proceedings ArticleDOI
13 May 2009
TL;DR: This paper considers plots with one and two jammers and as an objective function to the user the authors consider SINR, and shows that in all the scenarii the jammers equalize the quality of the best sub-carriers for transmitter on as low level as their power constraint allows.
Abstract: The problem of jamming plays a very important role in ensuring the quality and security of wireless communications, especially now when wireless networks are quickly becoming ubiquitous. Since jamming phenomenon can be considered as a game where a player (jammer) is playing against a user (transmitter), game theory is an appropriate tool for dealing with the jamming problem. In this paper we study how increasing number of jammers impacts the game. Namely, we consider plots with one and two jammers and as an objective function to the user we consider SINR. We show that in all the scenarii the jammers equalize the quality of the best sub-carriers for transmitter on as low level as their power constraint allows, meanwhile the user distributes his power among these jamming sub-carriers and in two jammer case the jammers employ time sharing strategies to bring the maximal harm.

68 citations


Cited by
More filters
Proceedings Article
01 Jan 1991
TL;DR: It is concluded that properly augmented and power-controlled multiple-cell CDMA (code division multiple access) promises a quantum increase in current cellular capacity.
Abstract: It is shown that, particularly for terrestrial cellular telephony, the interference-suppression feature of CDMA (code division multiple access) can result in a many-fold increase in capacity over analog and even over competing digital techniques. A single-cell system, such as a hubbed satellite network, is addressed, and the basic expression for capacity is developed. The corresponding expressions for a multiple-cell system are derived. and the distribution on the number of users supportable per cell is determined. It is concluded that properly augmented and power-controlled multiple-cell CDMA promises a quantum increase in current cellular capacity. >

2,951 citations

Journal ArticleDOI
TL;DR: A comprehensive review of the domain of physical layer security in multiuser wireless networks, with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security and observations on potential research directions in this area.
Abstract: This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical layer message authentication is also briefly introduced. The survey concludes with observations on potential research directions in this area.

1,294 citations

Journal ArticleDOI
TL;DR: This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches and provides a discussion on the advantages, drawbacks, and future direction of using game theory in this field.
Abstract: This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying game-theoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.

791 citations

Book ChapterDOI
06 Jan 2000
TL;DR: Methods of numerical integration will lead you to always think more and more, and this book will be always right for you.
Abstract: Want to get experience? Want to get any ideas to create new things in your life? Read methods of numerical integration now! By reading this book as soon as possible, you can renew the situation to get the inspirations. Yeah, this way will lead you to always think more and more. In this case, this book will be always right for you. When you can observe more about the book, you will know why you need this.

784 citations

Journal ArticleDOI
TL;DR: A comprehensive review of the physical layer security in multiuser wireless networks can be found in this article, where the authors provide an overview of the foundations dating back to Shannon and Wyner on information-theoretic security.
Abstract: This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.

463 citations