Static and dynamic jamming games over wireless channels with mobile strategic players
Pith reviewed 2026-05-24 08:12 UTC · model grok-4.3
The pith
Jamming between a receiver and a jammer moving along a line is modeled as a zero-sum game solved in closed form for static cases and via reinforcement learning for dynamic cases with different information levels.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The competition between a legitimate receiver and a jammer is framed as a zero-sum game over channel capacity, which admits closed-form solutions in the static case with linear movement, and can be approximated efficiently in dynamic cases with incomplete information using reinforcement learning trained on theoretical insights.
What carries the argument
Zero-sum game formulation where players maximize or minimize channel capacity, extended from static to dynamic versions with different information completeness about adversary position, solved via closed form or reinforcement learning.
If this is right
- Theoretical conditions from the static game apply to identify good strategies in any setup including dynamic ones.
- Reinforcement learning obtains efficient strategies leading to equilibrium outcomes in the expanded strategy space of dynamic games.
- Theoretical findings can be used to train smart agents that play the game and achieve good performance in practical settings.
Where Pith is reading between the lines
- The three information versions could correspond to real concealment levels in wireless security scenarios.
- If the linear assumption holds, similar closed-form insights might extend to other symmetric movement geometries.
- The RL training method might transfer to other wireless security games beyond jamming.
Load-bearing premise
Both players move along a linear geometry.
What would settle it
An experiment where players move in a non-linear path and the predicted equilibria or strategies from the linear model fail to match observed outcomes.
Figures
read the original abstract
We study a wireless jamming problem consisting of the competition between a legitimate receiver and a jammer, as a zero-sum game where the value to maximize/minimize is the channel capacity at the receiver's side. Most of the approaches found in the literature consider the two players to be stationary nodes. Instead, we investigate what happens when they can change location, specifically moving along a linear geometry. We frame this at first as a static game, which can be solved in closed form, and subsequently we extend it to a dynamic game under three different versions for what concerns completeness/perfection of mutual information about the adversary's position, corresponding to different assumptions of concealment/sequentiality of the moves, respectively. We first provide some theoretical conditions that hold for the static game and also help identify good strategies valid under any setup, including dynamic games. Since dynamic games, although more realistic, are characterized by a significantly expanded strategy space, we exploit reinforcement learning to obtain efficient strategies that lead to equilibrium outcomes. We show how theoretical findings can be used to train smart agents to play the game and validate our approach in practical settings.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper models a zero-sum jamming game over wireless channels where the payoff is the receiver's channel capacity. Both the legitimate receiver and the jammer are mobile and restricted to linear geometry. The static game is solved in closed form; the dynamic extension considers three information structures (complete/perfect vs. incomplete/imperfect mutual information about the adversary's position). Theoretical conditions derived for the static case are used to guide strategy selection in the dynamic setting. Reinforcement learning is applied to compute equilibria in the expanded dynamic strategy spaces, with validation in practical settings.
Significance. If the closed-form static solutions and the RL-derived dynamic equilibria are correct, the work supplies a concrete bridge between analytic game-theoretic results and learning-based methods for mobile jamming, a setting that is more realistic than the stationary-node models common in the literature. The explicit use of static-game conditions to shape the RL training objective is a methodological strength.
major comments (2)
- [§3] §3 (static game): the claim of a closed-form solution is central to the paper's contribution, yet the derivation steps that reduce the capacity expression to an explicit equilibrium strategy pair are not shown; without them it is impossible to verify whether the solution is indeed parameter-free or merely an implicit fixed-point equation.
- [§4.2–4.3] §4.2–4.3 (dynamic information variants): the three information structures are defined only at the level of the abstract; the precise information partitions (who knows what at each stage) and the resulting extensive-form game trees are not exhibited, making it impossible to confirm that the RL formulation correctly captures the claimed completeness/perfection distinctions.
minor comments (2)
- Notation for the linear geometry (positions, distances, path-loss exponents) should be introduced once in a single table or figure rather than redefined in each section.
- The RL training curves (reward vs. episodes) are mentioned in the validation section but lack error bars or multiple random seeds; this weakens the claim of “equilibrium outcomes.”
Simulated Author's Rebuttal
We thank the referee for the careful reading and constructive comments. The two major points concern clarity of the static-game derivation and the formal specification of the dynamic information structures. We address each below and will revise the manuscript to incorporate additional detail.
read point-by-point responses
-
Referee: [§3] §3 (static game): the claim of a closed-form solution is central to the paper's contribution, yet the derivation steps that reduce the capacity expression to an explicit equilibrium strategy pair are not shown; without them it is impossible to verify whether the solution is indeed parameter-free or merely an implicit fixed-point equation.
Authors: We agree that the intermediate algebraic steps in Section 3 are compressed. The capacity expression is first written as a function of the two positions; the zero-sum payoff matrix is then formed and the saddle-point equations are solved by setting the partial derivatives to zero, yielding explicit strategy formulas (linear in the distance parameters) that do not require numerical fixed-point iteration. To make this transparent we will insert the full sequence of equations, including the explicit closed-form expressions for the equilibrium locations, in the revised manuscript. revision: yes
-
Referee: [§4.2–4.3] §4.2–4.3 (dynamic information variants): the three information structures are defined only at the level of the abstract; the precise information partitions (who knows what at each stage) and the resulting extensive-form game trees are not exhibited, making it impossible to confirm that the RL formulation correctly captures the claimed completeness/perfection distinctions.
Authors: We acknowledge that the information partitions are stated at a high level. Section 4 distinguishes the three cases by the sets of positions each player observes before choosing its move; we will add an explicit table of information sets for each variant together with a short description of the corresponding extensive-form tree (or its information-equivalent representation). This will directly link the partitions to the state and observation spaces used by the RL agents, confirming that the training procedures respect the claimed completeness/perfection distinctions. revision: yes
Circularity Check
No significant circularity detected
full rationale
The paper frames a zero-sum jamming game on linear geometry, solves the static case in closed form via standard game-theoretic methods, extends to three dynamic information variants, and uses RL for equilibria in the expanded space. Theoretical conditions from the static game are stated to inform dynamic strategies without reducing to self-definition or fitted inputs renamed as predictions. No load-bearing self-citations, uniqueness theorems imported from prior author work, or ansatzes smuggled via citation are indicated in the provided text. The derivation chain remains self-contained against external benchmarks of game theory and RL, with explicit modeling scope rather than hidden premises.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption The interaction is modeled as a zero-sum game whose value is channel capacity at the receiver
Reference graph
Works this paper leans on
-
[1]
Reinforcement learning for jammi ng games over AWGN channels with mobile players,
G. Perin and L. Badia, “Reinforcement learning for jammi ng games over AWGN channels with mobile players,” in Proc. IEEE CAMAD , 2021
work page 2021
-
[2]
A jamming gam e in wireless networks with transmission cost,
E. Altman, K. Avrachenkov, and A. Garnaev, “A jamming gam e in wireless networks with transmission cost,” in Proc. Int. Conf. Netw. Control Optimiz. Springer, 2007
work page 2007
-
[3]
The wireless network jamming problem,
C. W. Commander, P . M. Pardalos, V . Ryabchenko, S. Uryase v, and G. Zrazhevsky, “The wireless network jamming problem,” J. Comb. Optimiz., vol. 14, no. 4, pp. 481–498, Mar. 2007
work page 2007
-
[4]
An an ti-jamming multiple access channel game using latency as metric,
A. Garnaev, A. Petropulu, W. Trappe, and H. V . Poor, “An an ti-jamming multiple access channel game using latency as metric,” IEEE Wireless Commun. Lett. , vol. 11, no. 9, pp. 1800–1804, Sep. 2022
work page 2022
-
[5]
J amming in underwater sensor networks as a bayesian zero-sum game with position uncertainty,
V . V adori, M. Scalabrin, A. V . Guglielmi, and L. Badia, “J amming in underwater sensor networks as a bayesian zero-sum game with position uncertainty,” in Proc. IEEE Globecom , 2015
work page 2015
-
[6]
Game theo ry in wireless networks,
L. A. DaSilva, H. Bogucka, and A. B. MacKenzie, “Game theo ry in wireless networks,” IEEE Commun. Mag. , vol. 49, no. 8, pp. 110–111, Aug. 2011
work page 2011
-
[7]
Game theory meets network security and privacy,
M. H. Manshaei, Q. Zhu, T. Alpcan, T. Bacs ¸ar, and J.-P . Hubaux, “Game theory meets network security and privacy,” ACM Comput. Surv., vol. 45, no. 3, pp. 1–39, Jul. 2013
work page 2013
-
[8]
Game theory-b ased anti- jamming strategies for frequency hopping wireless communi cations,
Y . Gao, Y . Xiao, M. Wu, M. Xiao, and J. Shao, “Game theory-b ased anti- jamming strategies for frequency hopping wireless communi cations,” IEEE Trans. Wireless Commun. , vol. 17, no. 8, pp. 5314–5326, Aug. 2018
work page 2018
-
[9]
Accelerated IoT anti-jamming: A game theoretic power allo cation strategy,
A. Gouissem, K. Abualsaud, E. Y aacoub, T. Khattab, and M. Guizani, “Accelerated IoT anti-jamming: A game theoretic power allo cation strategy,” IEEE Trans. Wireless Commun. , vol. 21, no. 12, pp. 10 607– 10 620, Dec. 2022
work page 2022
-
[10]
Joint beamform- ing and jamming design for mmwave information surveillance systems,
Y . Cai, C. Zhao, Q. Shi, G. Y . Li, and B. Champagne, “Joint beamform- ing and jamming design for mmwave information surveillance systems,” IEEE J. Sel. Areas Commun. , vol. 36, no. 7, pp. 1410–1425, Jul. 2018
work page 2018
-
[11]
A game of one/two strategic fr iendly jammers versus a malicious strategic node,
L. Badia and F. Gringoli, “A game of one/two strategic fr iendly jammers versus a malicious strategic node,” IEEE Netw. Lett. , vol. 1, no. 1, pp. 6–9, Mar. 2019
work page 2019
-
[12]
Underwater jamming attacks as incomplete information games,
F. Chiariotti, A. Signori, F. Campagnaro, and M. Zorzi, “Underwater jamming attacks as incomplete information games,” in Proc. IEEE Infocom W orkshops, 2020, pp. 1033–1038
work page 2020
-
[13]
A rchitectures, protocols and algorithms for 5G wireless networks,
R. Ag¨ uero, B.-L. Wenning, Y . Zaki, and A. Timm-Giel, “A rchitectures, protocols and algorithms for 5G wireless networks,” Mobile Netw. Appl., vol. 23, no. 3, pp. 518–520, Jun. 2018
work page 2018
-
[14]
Rapid sen sing-based emergency detection: A sequential approach,
R. F. El Khatib, N. Zorba, and H. S. Hassanein, “Rapid sen sing-based emergency detection: A sequential approach,” Comp. Commun. , vol. 159, pp. 222–230, Jun. 2020
work page 2020
-
[15]
M obility and blockage-aware communications in millimeter-wave veh icular net- works,
M. Hussain, M. Scalabrin, M. Rossi, and N. Michelusi, “M obility and blockage-aware communications in millimeter-wave veh icular net- works,” IEEE Trans. V eh. Technol., vol. 69, no. 11, pp. 13 072–13 086, Nov. 2020
work page 2020
-
[16]
Channel surfing: defendi ng wireless sensor networks from interference,
W. Xu, W. Trappe, and Y . Zhang, “Channel surfing: defendi ng wireless sensor networks from interference,” in Proc. IPSN , 2007, pp. 499–508
work page 2007
-
[17]
M-JAW: Mobility-based jamming avoidance in wireless sensor netwo rks,
S. Misra, A. Mondal, P . Bhavathankar, and M.-S. Alouini , “M-JAW: Mobility-based jamming avoidance in wireless sensor netwo rks,” IEEE Trans. V eh. Technol., vol. 69, no. 5, pp. 5381–5390, May 2020
work page 2020
-
[18]
A novel jamming attacks detection approach based on machine l earning for wireless communication,
Y . Arjoune, F. Salahdine, M. S. Islam, E. Ghribi, and N. K aabouch, “A novel jamming attacks detection approach based on machine l earning for wireless communication,” in Proc. IEEE ICOIN , 2020, pp. 459–464
work page 2020
-
[19]
M. A. Lmater, M. Haddad, A. Karouit, and A. Haqiq, “Smart jamming attacks in wireless networks during a transmission cycle: S tackelberg game with hierarchical learning solution,” Int. J. Adv. Comp. Sc. Applic. , vol. 9, no. 4, pp. 358–365, Apr. 2018
work page 2018
-
[20]
R. S. Sutton and A. G. Barto, Reinforcement learning: An introduction . MIT press, 2018
work page 2018
-
[21]
A jamming game with rival-type uncertainty,
A. Garnaev, A. P . Petropulu, W. Trappe, and H. V . Poor, “A jamming game with rival-type uncertainty,” IEEE Trans. Wireless Commun. , vol. 19, no. 8, pp. 5359–5372, Aug. 2020
work page 2020
-
[22]
Jamming g ames in wireless networks with incomplete information,
Y . E. Sagduyu, R. A. Berry, and A. Ephremides, “Jamming g ames in wireless networks with incomplete information,” IEEE Commun. Mag. , vol. 49, no. 8, pp. 112–118, Aug. 2011
work page 2011
-
[23]
A zero- sum jamming game with incomplete position information in wi reless scenarios,
M. Scalabrin, V . V adori, A. V . Guglielmi, and L. Badia, “ A zero- sum jamming game with incomplete position information in wi reless scenarios,” in Proc. European Wireless, 2015
work page 2015
-
[24]
Energy and distance evaluation for jamming attacks in wireless networks,
E. Bout, V . Loscri, and A. Gallais, “Energy and distance evaluation for jamming attacks in wireless networks,” in Proc. IEEE/ACM DS-RT , 2020
work page 2020
-
[25]
W. Uther and M. V eloso. (2003) Ad- versarial reinforcement learning. [Online]. Available: http://www.cs.cmu.edu/∼mmv/papers/03TR-advRL.pdf
work page 2003
-
[26]
Tadelis, Game Theory: An Introduction
S. Tadelis, Game Theory: An Introduction . Princeton University Press, October 2012
work page 2012
-
[27]
Blockage-peeking game of mobile strategic nodes in millimeter wave communications,
L. Badia and A. Bedin, “Blockage-peeking game of mobile strategic nodes in millimeter wave communications,” in Proc. IEEE MedComNet, 2022
work page 2022
-
[28]
A. M. Abdelgader and W. Lenan, “The physical layer of the ieee 802.11 p wave communication standard: The specifications and chall enges,” in Proc. W orld Congr . Eng. Comput. Sci., vol. 2, 2014, pp. 22–24
work page 2014
-
[29]
T. Mangel, M. Michl, O. Klemp, and H. Hartenstein, “Real -world measurements of non-line-of-sight reception quality for 5 .9 GHz IEEE 802.11p at intersections,” in Proc. of Int. Wkshp Commun. Techn. V eh. Springer, 2011, pp. 189–202
work page 2011
-
[30]
H. Peng, D. Li, K. Abboud, H. Zhou, H. Zhao, W. Zhuang, and X. Shen, “Performance analysis of IEEE 802.11p DCF for multiplatoon ing com- munications with autonomous vehicles,” IEEE Trans. V eh. Technol. , vol. 66, no. 3, pp. 2485–2498, Mar. 2016
work page 2016
-
[31]
Can IEEE 802.11p and Wi-Fi coexis t in the 5.9 GHz ITS band?
I. Khan and J. H¨ arri, “Can IEEE 802.11p and Wi-Fi coexis t in the 5.9 GHz ITS band?” in Proc. IEEE W oWMoM, 2017
work page 2017
-
[32]
Perfor mance evaluation of 802.11p W A VE system on embedded board,
Z. Qin, Z. Meng, X. Zhang, B. Xiang, and L. Zhang, “Perfor mance evaluation of 802.11p W A VE system on embedded board,” inProc. IEEE ICOIN, 2014, pp. 356–360
work page 2014
-
[33]
Secure mil limeter-wave ad hoc communications using physical layer security,
Y . Zhang, Y . Shen, X. Jiang, and S. Kasahara, “Secure mil limeter-wave ad hoc communications using physical layer security,” IEEE Trans. Inf. F orensics Security, vol. 17, pp. 99–114, Jan. 2021
work page 2021
-
[34]
On GNSS jamming threat from the maritime navigation perspe ctive,
D. Medina, C. Lass, E. P . Marcos, R. Ziebold, P . Closas, a nd J. Garc´ ıa, “On GNSS jamming threat from the maritime navigation perspe ctive,” in Proc. IEEE FUSION , 2019
work page 2019
-
[35]
Mitigatin g intended jamming in mmwave MIMO by hybrid beamforming,
J. Zhu, Z. Wang, Q. Li, H. Chen, and N. Ansari, “Mitigatin g intended jamming in mmwave MIMO by hybrid beamforming,” IEEE Wireless Commun. Lett. , vol. 8, no. 6, pp. 1617–1620, Jun. 2019
work page 2019
-
[36]
Adversarial jamming and catching games over AWGN channels with mobile pl ay- ers,
G. Perin, A. Buratto, N. Anselmi, S. Wagle, and L. Badia, “Adversarial jamming and catching games over AWGN channels with mobile pl ay- ers,” in Proc. WiMob, 2021
work page 2021
-
[37]
Notes on games over the squa re,
I. Glicksberg and O. Gross, “Notes on games over the squa re,” in Contributions to the Theory of Games (AM-28), V olume II . Princeton University Press, 2016, ch. 9, pp. 173–182
work page 2016
-
[38]
Promoting cooperat ion in wireless relay networks through Stackelberg dynamic scheduling,
L. Canzian, L. Badia, and M. Zorzi, “Promoting cooperat ion in wireless relay networks through Stackelberg dynamic scheduling,” IEEE Trans. Commun., vol. 61, no. 2, pp. 700–711, Feb. 2012
work page 2012
-
[39]
Rob ust adversarial reinforcement learning,
L. Pinto, J. Davidson, R. Sukthankar, and A. Gupta, “Rob ust adversarial reinforcement learning,” in Proc. Int. Conf. Mach. Learn. , 2017, pp. 2817–2826
work page 2017
-
[40]
Dueling network architectures for deep reinforcement lea rning,
Z. Wang, T. Schaul, M. Hessel, H. Hasselt, M. Lanctot, an d N. Freitas, “Dueling network architectures for deep reinforcement lea rning,” in International conference on machine learning . PMLR, 2016, pp. 1995– 2003
work page 2016
-
[41]
103 257-1 v1. 1.1 (2019-05) intelligent trans port systems (its),
T. ETSI, “103 257-1 v1. 1.1 (2019-05) intelligent trans port systems (its),” Access Layer , vol. 44
work page 2019
-
[42]
AFRL: Adapti ve federated reinforcement learning for intelligent jamming defense in FANET,
N. I. Mowla, N. H. Tran, I. Doh, and K. Chae, “AFRL: Adapti ve federated reinforcement learning for intelligent jamming defense in FANET,” J. Commun. Netw. , vol. 22, no. 3, pp. 244–258, Jun. 2020
work page 2020
-
[43]
On games over the unit square,
T. Parthasarathy, “On games over the unit square,” SIAM Journal on Applied Mathematics , vol. 19, no. 2, pp. 473–476, 1970
work page 1970
-
[44]
Static and dynamic jamming games over wireless channels with mobile strategic players
D.-Z. Du and P . M. Pardalos, Minimax and applications . Springer Science & Business Media, 1995, vol. 4. 12 APPENDIX A PROOF OF THEOREM 1 The theorem directly follows from Parthasarathy’s theo- rem [43]. If J believes that R is choosing a pure strategy, i.e., a location x with probability equal to 1, its best response would be to choose y = x, since, in ...
work page internal anchor Pith review Pith/arXiv arXiv 1995
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.