Defense against unknown broadband jammer for time-critical operation in smart grid

Defense against unknown broadband jammer for time-critical operation in smart grid

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IET Communications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In this work, the authors consider the communication network of a power substation, where multiple intelligent electronic devices (IEDs) transmit their delay sensitive control and monitoring messages to a common receiver over a wireless network; in the presence of a broadband jammer, which is capable of jamming multiple channels simultaneously. The objective of the IEDs is to successfully transmit their messages within a specified time, whereas the jammer wants to obstruct IED's transmission. A novel utility function is designed for the players, that addresses the time-critical nature of communication. Due to the conflicting interest of the IEDs and the jammer, they model the interaction between them as a repeated Bayesian zero-sum game, which also addresses the repeated interaction among the IEDs and the jammer, and the unavailability of exact information about the jammer. The equilibrium strategies for both the scenarios of perfect and imperfect monitoring are derived and verified through simulation results. Further, the performance of the proposed game model in various scenarios is thoroughly compared in the result section. Finally, the efficacy of the proposed defence strategies is tested in a practical communication network of a power substation under jamming, which is simulated in Optimised Network Engineering Tool (OPNET).


    1. 1)
      • 1. IEC 61850: ‘IEC Standard for Communication Network and Systems in Substations’, 2003–04, 1st edn..
    2. 2)
      • 2. Bianchi, G.: ‘Performance analysis of the IEEE 802.11 distributed coordination function’, IEEE J. Sel. Areas Commun., 2000, 18, (3), pp. 535547.
    3. 3)
      • 3. Cumanan, K., Xing, H., Xu, P., et al: ‘Physical layer security jamming: theoretical limits and practical designs in wireless networks’, IEEE Access, 2017, 5, pp. 36033611.
    4. 4)
      • 4. Guan, Y., Ge, X.: ‘Distributed secure estimation over wireless sensor networks against random multichannel jamming attacks’, IEEE Access, 2017, 5, pp. 1085810870.
    5. 5)
      • 5. Huo, Y., Tian, Y., Ma, L., et al: ‘Jamming strategies for physical layer security’, IEEE Wirel. Commun., 2018, 25, (1), pp. 148153.
    6. 6)
      • 6. Gao, Y., Xiao, Y., Wu, M., et al: ‘Game theory-based anti-jamming strategies for frequency hopping wireless communications’, IEEE Trans. Wirel. Commun., 2018, 17, (8), pp. 53145326.
    7. 7)
      • 7. Garnaev, A., Liu, Y., Trappe, W.: ‘Anti-jamming strategy versus a low-power jamming attack when intelligence of adversary's attack type is unknown’, IEEE Trans. Signal Inf. Process. Netw., 2016, 2, (1), pp. 4956.
    8. 8)
      • 8. Chang, G.-Y., Wang, S.-Y., Liu, Y.-X.: ‘A jamming-resistant channel hopping scheme for cognitive radio networks’, IEEE Trans. Wirel. Commun., 2017, 16, (10), pp. 67126725.
    9. 9)
      • 9. Hanawal, M.K., Abdel-Rahman, M.J., Krunz, M.: ‘Joint adaptation of frequency hopping and transmission rate for anti-jamming wireless systems’, IEEE Trans. Mob. Comput., 2016, 15, (9), pp. 22472259.
    10. 10)
      • 10. Fang, S., Liu, Y., Ning, P.: ‘Wireless communications under broadband reactive jamming attacks’, IEEE Trans. Depend. Sec. Comput., 2016, 13, (3), pp. 394408.
    11. 11)
      • 11. Liu, Y., Ning, P.: ‘BitTrickle: defending against broadband and high-power reactive jamming attacks’. Proc. IEEE INFOCOM, Orlando, FL, USA, March 2012, pp. 909917.
    12. 12)
      • 12. Wei, S., Kannan, R., Chakravarthy, V., et al: ‘CSI usage over parallel fading channels under jamming attacks: a game theory study’, IEEE Trans. Commun., 2012, 60, (4), pp. 11671175.
    13. 13)
      • 13. Banawan, K., Ulukus, S., Wang, P., et al: ‘Multiband jamming strategies with minimum rate constraints’. Proc. IEEE Wireless Communications and Networking Conf. (WCNC), Doha, 2016, pp. 16.
    14. 14)
      • 14. Lu, Z., Wang, W., Wang, C.: ‘Modeling, evaluation and detection of jamming attacks in time-critical wireless applications’, IEEE Trans. Mob. Comput., 2014, 13, (8), pp. 17461759.
    15. 15)
      • 15. Aziz, F.M., Shamma, J.S., Stüber, G.L.: ‘Jammer-type estimation in LTE with a smart jammer repeated game’, IEEE Trans. Veh. Technol., 2017, 66, (8), pp. 74227431.
    16. 16)
      • 16. Li, L., Langbort, C., Shamma, J.S.: ‘An LP approach for solving two-player zero-sum repeated bayesian games’, 2007, arXiv:1703.01957v2.
    17. 17)
      • 17. Han, Z., Zheng, R., Poor, H.V.: ‘Repeated auctions with Bayesian nonparametric learning for spectrum access in cognitive radio networks’, IEEE Trans. Wirel. Commun., 2011, 10, (3), pp. 890900.
    18. 18)
      • 18. Danak, A., Mannor, S.: ‘A robust learning approach to repeated auctions with monitoring and entry fees’, IEEE Trans. Comput. Intell. AI in Games, 2011, 3, (4), pp. 302315.
    19. 19)
      • 19. Parikh, P.P., Sidhu, T.S., Shami, A.: ‘A comprehensive investigation of wireless LAN for IEC 61850-based smart distribution substation applications’, IEEE Trans. Ind. Inf., 2013, 9, (3), pp. 14661476.
    20. 20)
      • 20. Ghosh, S., Bhatnagar, M.R., Panigrahi, B.K.: ‘Non-cooperative game based defense against broadband jammer in time-critical wireless applications’. Proc. IEEE SmartGridComm, Sydney, NSW, November 2016, pp. 154159.
    21. 21)
      • 21. El-Bardan, R., Brahma, S., Varshney, P.K.: ‘Strategic power allocation with incomplete information in the presence of a jammer’, IEEE Trans. Commun., 2016, 64, (8), pp. 34673479.
    22. 22)
      • 22. Karupongsiri, C., Munasinghe, K.S., Jamalipour, A.: ‘A novel communication mechanism for smart meter packet transmission on LTE networks’. Proc. IEEE SmartGridComm, Sydney, NSW, 2016, pp. 122127.
    23. 23)
      • 23. Cena, G., Bertolotti, I.C., Valenzano, A., et al: ‘Evaluation of response times in industrial WLANs’, IEEE Trans. Ind. Inf., 2007, 3, (3), pp. 191201.
    24. 24)
      • 24. Sydney, K.M., Du, C., Ngwira, S.M.: ‘The feasibility of a WLAN based power substation monitoring platform’. Proc. Int. Conf. on Advances in Computing and Communication Engineering (ICACCE), Durban, 2016, pp. 8590.
    25. 25)
      • 25. Choi, M., Choi, J., Park, J., et al: ‘State estimation with delayed measurements considering uncertainty of time delay’. Proc. IEEE Int. Conf. Robotics and Automation, Kobe, 2009, pp. 39873992.
    26. 26)
      • 26. Fudenberg, D., Tirole, J.: ‘Game theory’ (MIT Press, Massachusetts, MA, USA, 1991).
    27. 27)
      • 27. Duff, M.: ‘Optimal learning: Computational procedures for Bayes-adaptive Markov decision processes’. PhD dissertation, University of Massachusetts, 2002.
    28. 28)
      • 28. Dearden, R., Friedman, N., Andre, D.: ‘Model based Bayesian exploration’. Proc. Uncertainty in Artificial Intelligence (UAI), Stockholm, Sweden, August 1999, pp. 150159.
    29. 29)
      • 29. Szepesvari, C., Littman, M.L.: ‘A unified analysis of value-function-based reinforcement-learning algorithms’, Neural Comput., 1999, 11, pp. 20172060.
    30. 30)
      • 30. Koenig, S., Simmons, R.G.: ‘Complexity analysis of real-time reinforcement learning’. Proc. Eleventh National Conf. on AI, Washington, DC, USA, 1993, pp. 99105.
    31. 31)
      • 31. Boyd, S., Vandenberghe, L.: ‘Convex optimization’ (Cambridge University Press, New York, NY, USA, 2004).

Related content

This is a required field
Please enter a valid email address