Majed Haddad's research while affiliated with Université d´Avignon et des Pays du Vaucluse and other places

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (10)


Fig. 6 describes the impact of the transmitter' transmission cost on the transmitter' SINR and transmission power in NE and SE, with β 1 = 0.3, β 2 = 0.6 and α = 0.5. Hence, as C increases, the SIN R SE , SIN R N E , P SE and P N E decrease in order to economize the available transmitter power. Thereafter, from a certain value of C ( α N = 0.25), the transmitter becomes inactive (P SE = P N E = 0). In addition, NE scheme leads to higher SINR and transmission power than SE scheme does. This is due to the fact that, in the SE strategy, the transmitter adjusts its transmission power according to the reaction prediction of the jammers which can quickly learn the legitimate signal power before making a decision. Moreover, the communication is seriously more destroyed in SE strategy than in NE strategy; Thus, the transmitter gains in terms of power in SE scheme, whereas, it gains in terms of SINR in the NE scheme.
Fig. 7. Jammers utility where the transmitter chooses its transmission power based on Q-learning.
Several Jamming Attacks in Wireless Networks: A Game Theory Approach
  • Article
  • Full-text available

February 2019

·

214 Reads

·

2 Citations

International Journal of Advanced Computer Science and Applications

·

Majed Haddad

·

·

Wireless jamming attacks have recently been a subject of several researches, due to the exposed nature of the wireless medium. This paper studies the anti-jamming resistance in the presence of several attackers. Two kind of jammers are considered, smart jammers which have the ability to sense the legitimate signal power and regular jammers which don't have this ability. An Anti Multi-Jamming based Power Control problem modeled as a non-zero-sum Game is suggested to study how the transmitter can adjust its signal power against several jamming attacks. A closed-form expression of Nash Equilibrium is derived when players actions are taken simultaneously. In addition, a Stackelberg Equilibrium closed-form expression is derived when the hierarchical behavior between the transmitter and jammers is assumed. Simulation results show that the proposed scheme can enhance the anti-jamming-resistance against several attackers. Furthermore, this study proves that on the transmitter side, the most dangerous jammer is considered to have the highest ratio between channel gain and jamming cost. Finally, based on the Q-Learning technique, the transmitter can learn autonomously without knowing the patterns of attackers.

Download
Share

A Large Anti-Jamming Cooperation Scheme in the Presence of Jammers Sensitive to Sensing Errors

December 2018

·

57 Reads

·

1 Citation

Due to the broadcast nature of the wireless medium, mechanisms are needed to deal with the problem of jamming attacks. This paper proposes a Large Anti-Jamming Cooperation scheme, in which, several anti-jammers are considered to help a secondary user sending signal to the receiver side in the presence of smart jamming attacks. A hierarchical behavior among players is considered to derive the Stackelberg Equilibrium (SE) closed form. At SE, we proved that on the transmitter side, the cumulative attacks are perceived as a single attack from the jammer that has the highest Jamming Efficiency Ratio, likewise, the cumulative anti-attacks are observed as a single reaction from the anti-jammer having the highest Cooperation Efficiency Ratio. On the other hand, anti-jammers that share the highest ratio are active and cooperate with each other while the remaining anti-jammers are inactive. Finally, by means of simulation results we have clearly showed that the transmitter can efficiently enhance its communication performance in the presence of several jamming attacks, especially when the inability of jammers to sense signal powers perfectly is considered.


Performance Evaluation of a Jamming-Resistant of MAC Protocol with Self-Interested Users

December 2018

·

55 Reads

Jamming mitigation as a means to countermeasure jamming attacks has recently been a subject to several research. Since the battery life is indeed important in any wireless system, and as it's directly related with the transmission activity, this paper proposes a Pricing Wireless Random Channel Access (P-WRCA) mechanism and compares it with the Wireless Random Channel Access (WRCA) mechanism during Random Reactive (RR) jamming attacks. The aim is to make it difficult for a jammer to exploit the aggressive behavior of mobile users. We model, analyze the selfish behavior of mobile users in the presence of a RR jammer so as to find the trade-off between selfish behavior and jamming-resistant. The results obtained from the proposed mechanism are presented to show the network resistance to RR attacks. Finally, we believe that P-WRCA may have wider usage in wireless networking than what has been explored in this paper.





Fig. 1. Layered architecture for wireless networks. 
Fig. 2. The assumption of V i (T N E , J i ) with respect to J i . 
Fig. 5. Utility function of the transmitter, where the transmitter action is chosen based on Q-learning. 
Smart Jamming Attacks in Wireless Networks During a Transmission Cycle: Stackelberg Game with Hierarchical Learning Solution

April 2018

·

338 Reads

·

5 Citations

International Journal of Advanced Computer Science and Applications

Due to the broadcast nature of the shared medium, wireless communications become more vulnerable to malicious attacks. In this paper, we tackle the problem of jamming in wireless network when the transmission of the jammer and the transmitter occur with a non-zero cost. We focus on a jammer who keeps track of the re-transmission attempts of the packet until it is dropped. Firstly, we consider a power control problem following a Nash Game model, where all players take action simultaneously. Secondly, we consider a Stackelberg Game model, in which the transmitter is the leader and the jammer is the follower. As the jammer has the ability to sense the transmission power, the transmitter adjusts its transmission power accordingly, knowing that the jammer will do so. We provide the closed-form expressions of the equilibrium strategies where both the transmitter and the jammer have a complete information. Thereafter, we consider a worst case scenario where the transmitter has an incomplete information while the jammer has a complete information. We introduce a Reinforcement Learning method, thus, the transmitter can act autonomously in a dynamic environment without knowing the above Game model. It turns out that despite the jammer ability of sensing the active channel, the transmitter can enhance its efficiency by predicting the jammer reaction according to its own strategy


Routing Game on the Line: The Case of Multi-players

November 2017

·

28 Reads

In this paper, we tackle the problem of a sequential routing game where multiple users coexist and competitively send their traffic to a destination over a line. The users arrive at time epoch with a given capacity. Then, they ship their demands over time on a shared resource. The state of players evolve according to whether they decide to transmit or not. The decision of each user is thus spatio-temporal control. We provide an explicit expression of the equilibrium of such systems and compare it to the global optimum case. In particular, we determine the expression of price of anarchy of such scheme and identify a Braess-type paradox in the context of sequential routing game.


Paradoxes in a Multi-criteria Routing Game

September 2017

·

176 Reads

·

1 Citation

Lecture Notes of the Institute for Computer Sciences

In this paper, we consider a routing game in a network that contains lossy links. We consider a multi-objective problem where the players have each a weighted sum of a delay cost and a cost for losses. We compute the equilibrium and optimal solution (which are unique). We discover here in addition to the classical Kameda type paradox another paradoxical behavior in which higher loss rates have a positive impact on delay and therefore higher quality links may cause a worse performance even in the case of a single player.


Citations (4)


... In [10], Al-Hashmy et al. introduced a cooperative anti-jamming method, which allocates secondary users (SU) on the selected channel through an auxiliary coordinator, and pair these SUs to form a cooperative coalition, using cooperative transmission to establish a more robust transmission link, so as to overcome the influence of jamming power on cognitive radio network to the greatest extent. In [11], by deriving Stackelberg equilibrium, Lmater et al. proved that at the transmitting end, the cumulative attack is regarded as the interference with the highest interference efficiency ratio. Similarly, the cumulative anti-attack is regarded as the antijammer with the highest cooperation efficiency ratio of a single response. ...

Reference:

Joint channel and power optimisation for multi‐user anti‐jamming communications: A dual mode Q‐learning approach
A Large Anti-Jamming Cooperation Scheme in the Presence of Jammers Sensitive to Sensing Errors
  • Citing Conference Paper
  • December 2018

... From a game theoretical perspective, Moulay A. L., Majed H., Abdelillah K., and Abdelkrim H. presented a power control system based on anti-multi-jamming strategy to deal with numerous smart and common jammers [20]. The method offers analytic formulas for the stationary strategies and confirms the existence and originality of Nash and Stackelberg equilibrium. ...

Several Jamming Attacks in Wireless Networks: A Game Theory Approach

International Journal of Advanced Computer Science and Applications

... We remark that in this case the size of the problem rapidly explodes, since the number of involved strategies becomes prohibitive to be analyzed in closed form. However, one possible approach adopted in the recent literature is to use reinforcement learning (RL) as a tool to find game theoretic equilibria [18], [19]. After solving a strategic static interaction and proving analytical results about the gameplay even in more elaborate contexts, we will introduce different dynamic games This work has been submitted to the IEEE for possible publication. ...

Smart Jamming Attacks in Wireless Networks During a Transmission Cycle: Stackelberg Game with Hierarchical Learning Solution

International Journal of Advanced Computer Science and Applications

... On the other hand, Device-to-Device (D2D) communication is an emerging alternative enabling direct communication between devices without relying on network infrastructure such as BS (Ali et al. 2017). D2D communications offer potential advantages compared to other technologies like Long Term Evolution (LTE), Software Defined Radio, Cognitive Radio, and indoor positioning systems (Rawat, Haddad, and Altman 2015). D2D communication in disaster is underlined by its ability to maintain connectivity when cellular networks are unavailable. ...

Towards efficient disaster management: 5G and Device to Device communication
  • Citing Conference Paper
  • November 2015