pith. sign in

arxiv: 2306.10956 · v3 · pith:JIJI6WFXnew · submitted 2023-06-19 · 💻 cs.GT · cs.NI

Static and dynamic jamming games over wireless channels with mobile strategic players

Pith reviewed 2026-05-24 08:12 UTC · model grok-4.3

classification 💻 cs.GT cs.NI
keywords jamming gameswireless channelszero-sum gamesreinforcement learningmobile playerschannel capacitydynamic gamesgame theory
0
0 comments X

The pith

Jamming between a receiver and a jammer moving along a line is modeled as a zero-sum game solved in closed form for static cases and via reinforcement learning for dynamic cases with different information levels.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper examines a wireless jamming scenario as a zero-sum game where the objective is channel capacity at the receiver. It first solves the static version where players choose positions along a line in closed form. Then it extends to dynamic games with varying assumptions about knowledge of the opponent's position, using reinforcement learning to find equilibrium strategies. This approach allows training agents that perform well in practical settings. The theoretical conditions from the static game help identify good strategies applicable to dynamic setups as well.

Core claim

The competition between a legitimate receiver and a jammer is framed as a zero-sum game over channel capacity, which admits closed-form solutions in the static case with linear movement, and can be approximated efficiently in dynamic cases with incomplete information using reinforcement learning trained on theoretical insights.

What carries the argument

Zero-sum game formulation where players maximize or minimize channel capacity, extended from static to dynamic versions with different information completeness about adversary position, solved via closed form or reinforcement learning.

If this is right

  • Theoretical conditions from the static game apply to identify good strategies in any setup including dynamic ones.
  • Reinforcement learning obtains efficient strategies leading to equilibrium outcomes in the expanded strategy space of dynamic games.
  • Theoretical findings can be used to train smart agents that play the game and achieve good performance in practical settings.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The three information versions could correspond to real concealment levels in wireless security scenarios.
  • If the linear assumption holds, similar closed-form insights might extend to other symmetric movement geometries.
  • The RL training method might transfer to other wireless security games beyond jamming.

Load-bearing premise

Both players move along a linear geometry.

What would settle it

An experiment where players move in a non-linear path and the predicted equilibria or strategies from the linear model fail to match observed outcomes.

Figures

Figures reproduced from arXiv: 2306.10956 by Giovanni Perin, Leonardo Badia.

Figure 1
Figure 1. Figure 1: Graphical representation of the considered game, wi [PITH_FULL_IMAGE:figures/full_fig_p003_1.png] view at source ↗
Figure 2
Figure 2. Figure 2: Model used and its relation with a realistic scenario [PITH_FULL_IMAGE:figures/full_fig_p004_2.png] view at source ↗
Figure 3
Figure 3. Figure 3: Value of the game uR versus the position x chosen by the receiver R, for various positions y of the jammer J. either of them with certainty is clearly disadvantageous, R must better randomize between them, and as a result, J chooses an intermediate position to cover both situations. A graphical visualization of Theorem 3 is shown in [PITH_FULL_IMAGE:figures/full_fig_p005_3.png] view at source ↗
Figure 6
Figure 6. Figure 6: Game G2, simultaneous game with complete but imperfect information. Joint probability for R and J to find themselves in position (x, y) (left). State value function of R, i.e., expected long-term reward starting from state (x, y) (right). 10 15 20 25 30 35 40 45 50 Receiver 50 45 40 35 30 25 20 15 10 Jammer 10 15 20 25 30 35 40 45 50 Receiver 0 0.0625 0.125 0.25 0.5 1 [PITH_FULL_IMAGE:figures/full_fig_p00… view at source ↗
Figure 7
Figure 7. Figure 7: Game G3, simultaneous game with imperfect and incomplete information. Joint probability for R and J to find themselves in position (x, y) (left). Expected instantaneous reward, weighted by the joint position probability (right). L and R is close to M or vice versa. However, since J knows R’s position, it forces R to visit the complementary states to its favorites (figure on the left). This confirms the ver… view at source ↗
Figure 8
Figure 8. Figure 8: Deep RL-based policies for game G2 under different jammer behaviors. D. Deep RL-based policies for game G2 In this section, the use of the DRL approach is applied to game G2 in various contexts. Specifically, we i) explore what happens when S = 2 and ii) verify the learning behavior of player R when J follows greedy policies driven by Theorem 5. Fig. 8a shows the joint policy of R and J when J is a learnin… view at source ↗
Figure 9
Figure 9. Figure 9: Receiver’s average reward of the DRL approach for [PITH_FULL_IMAGE:figures/full_fig_p010_9.png] view at source ↗
read the original abstract

We study a wireless jamming problem consisting of the competition between a legitimate receiver and a jammer, as a zero-sum game where the value to maximize/minimize is the channel capacity at the receiver's side. Most of the approaches found in the literature consider the two players to be stationary nodes. Instead, we investigate what happens when they can change location, specifically moving along a linear geometry. We frame this at first as a static game, which can be solved in closed form, and subsequently we extend it to a dynamic game under three different versions for what concerns completeness/perfection of mutual information about the adversary's position, corresponding to different assumptions of concealment/sequentiality of the moves, respectively. We first provide some theoretical conditions that hold for the static game and also help identify good strategies valid under any setup, including dynamic games. Since dynamic games, although more realistic, are characterized by a significantly expanded strategy space, we exploit reinforcement learning to obtain efficient strategies that lead to equilibrium outcomes. We show how theoretical findings can be used to train smart agents to play the game and validate our approach in practical settings.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 2 minor

Summary. The paper models a zero-sum jamming game over wireless channels where the payoff is the receiver's channel capacity. Both the legitimate receiver and the jammer are mobile and restricted to linear geometry. The static game is solved in closed form; the dynamic extension considers three information structures (complete/perfect vs. incomplete/imperfect mutual information about the adversary's position). Theoretical conditions derived for the static case are used to guide strategy selection in the dynamic setting. Reinforcement learning is applied to compute equilibria in the expanded dynamic strategy spaces, with validation in practical settings.

Significance. If the closed-form static solutions and the RL-derived dynamic equilibria are correct, the work supplies a concrete bridge between analytic game-theoretic results and learning-based methods for mobile jamming, a setting that is more realistic than the stationary-node models common in the literature. The explicit use of static-game conditions to shape the RL training objective is a methodological strength.

major comments (2)
  1. [§3] §3 (static game): the claim of a closed-form solution is central to the paper's contribution, yet the derivation steps that reduce the capacity expression to an explicit equilibrium strategy pair are not shown; without them it is impossible to verify whether the solution is indeed parameter-free or merely an implicit fixed-point equation.
  2. [§4.2–4.3] §4.2–4.3 (dynamic information variants): the three information structures are defined only at the level of the abstract; the precise information partitions (who knows what at each stage) and the resulting extensive-form game trees are not exhibited, making it impossible to confirm that the RL formulation correctly captures the claimed completeness/perfection distinctions.
minor comments (2)
  1. Notation for the linear geometry (positions, distances, path-loss exponents) should be introduced once in a single table or figure rather than redefined in each section.
  2. The RL training curves (reward vs. episodes) are mentioned in the validation section but lack error bars or multiple random seeds; this weakens the claim of “equilibrium outcomes.”

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for the careful reading and constructive comments. The two major points concern clarity of the static-game derivation and the formal specification of the dynamic information structures. We address each below and will revise the manuscript to incorporate additional detail.

read point-by-point responses
  1. Referee: [§3] §3 (static game): the claim of a closed-form solution is central to the paper's contribution, yet the derivation steps that reduce the capacity expression to an explicit equilibrium strategy pair are not shown; without them it is impossible to verify whether the solution is indeed parameter-free or merely an implicit fixed-point equation.

    Authors: We agree that the intermediate algebraic steps in Section 3 are compressed. The capacity expression is first written as a function of the two positions; the zero-sum payoff matrix is then formed and the saddle-point equations are solved by setting the partial derivatives to zero, yielding explicit strategy formulas (linear in the distance parameters) that do not require numerical fixed-point iteration. To make this transparent we will insert the full sequence of equations, including the explicit closed-form expressions for the equilibrium locations, in the revised manuscript. revision: yes

  2. Referee: [§4.2–4.3] §4.2–4.3 (dynamic information variants): the three information structures are defined only at the level of the abstract; the precise information partitions (who knows what at each stage) and the resulting extensive-form game trees are not exhibited, making it impossible to confirm that the RL formulation correctly captures the claimed completeness/perfection distinctions.

    Authors: We acknowledge that the information partitions are stated at a high level. Section 4 distinguishes the three cases by the sets of positions each player observes before choosing its move; we will add an explicit table of information sets for each variant together with a short description of the corresponding extensive-form tree (or its information-equivalent representation). This will directly link the partitions to the state and observation spaces used by the RL agents, confirming that the training procedures respect the claimed completeness/perfection distinctions. revision: yes

Circularity Check

0 steps flagged

No significant circularity detected

full rationale

The paper frames a zero-sum jamming game on linear geometry, solves the static case in closed form via standard game-theoretic methods, extends to three dynamic information variants, and uses RL for equilibria in the expanded space. Theoretical conditions from the static game are stated to inform dynamic strategies without reducing to self-definition or fitted inputs renamed as predictions. No load-bearing self-citations, uniqueness theorems imported from prior author work, or ansatzes smuggled via citation are indicated in the provided text. The derivation chain remains self-contained against external benchmarks of game theory and RL, with explicit modeling scope rather than hidden premises.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

Only the abstract is available; no explicit free parameters or invented entities are described beyond standard game-theoretic framing.

axioms (1)
  • domain assumption The interaction is modeled as a zero-sum game whose value is channel capacity at the receiver
    Stated directly in the first sentence of the abstract as the problem framing.

pith-pipeline@v0.9.0 · 5719 in / 1083 out tokens · 80993 ms · 2026-05-24T08:12:27.688747+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

44 extracted references · 44 canonical work pages · 1 internal anchor

  1. [1]

    Reinforcement learning for jammi ng games over AWGN channels with mobile players,

    G. Perin and L. Badia, “Reinforcement learning for jammi ng games over AWGN channels with mobile players,” in Proc. IEEE CAMAD , 2021

  2. [2]

    A jamming gam e in wireless networks with transmission cost,

    E. Altman, K. Avrachenkov, and A. Garnaev, “A jamming gam e in wireless networks with transmission cost,” in Proc. Int. Conf. Netw. Control Optimiz. Springer, 2007

  3. [3]

    The wireless network jamming problem,

    C. W. Commander, P . M. Pardalos, V . Ryabchenko, S. Uryase v, and G. Zrazhevsky, “The wireless network jamming problem,” J. Comb. Optimiz., vol. 14, no. 4, pp. 481–498, Mar. 2007

  4. [4]

    An an ti-jamming multiple access channel game using latency as metric,

    A. Garnaev, A. Petropulu, W. Trappe, and H. V . Poor, “An an ti-jamming multiple access channel game using latency as metric,” IEEE Wireless Commun. Lett. , vol. 11, no. 9, pp. 1800–1804, Sep. 2022

  5. [5]

    J amming in underwater sensor networks as a bayesian zero-sum game with position uncertainty,

    V . V adori, M. Scalabrin, A. V . Guglielmi, and L. Badia, “J amming in underwater sensor networks as a bayesian zero-sum game with position uncertainty,” in Proc. IEEE Globecom , 2015

  6. [6]

    Game theo ry in wireless networks,

    L. A. DaSilva, H. Bogucka, and A. B. MacKenzie, “Game theo ry in wireless networks,” IEEE Commun. Mag. , vol. 49, no. 8, pp. 110–111, Aug. 2011

  7. [7]

    Game theory meets network security and privacy,

    M. H. Manshaei, Q. Zhu, T. Alpcan, T. Bacs ¸ar, and J.-P . Hubaux, “Game theory meets network security and privacy,” ACM Comput. Surv., vol. 45, no. 3, pp. 1–39, Jul. 2013

  8. [8]

    Game theory-b ased anti- jamming strategies for frequency hopping wireless communi cations,

    Y . Gao, Y . Xiao, M. Wu, M. Xiao, and J. Shao, “Game theory-b ased anti- jamming strategies for frequency hopping wireless communi cations,” IEEE Trans. Wireless Commun. , vol. 17, no. 8, pp. 5314–5326, Aug. 2018

  9. [9]

    Accelerated IoT anti-jamming: A game theoretic power allo cation strategy,

    A. Gouissem, K. Abualsaud, E. Y aacoub, T. Khattab, and M. Guizani, “Accelerated IoT anti-jamming: A game theoretic power allo cation strategy,” IEEE Trans. Wireless Commun. , vol. 21, no. 12, pp. 10 607– 10 620, Dec. 2022

  10. [10]

    Joint beamform- ing and jamming design for mmwave information surveillance systems,

    Y . Cai, C. Zhao, Q. Shi, G. Y . Li, and B. Champagne, “Joint beamform- ing and jamming design for mmwave information surveillance systems,” IEEE J. Sel. Areas Commun. , vol. 36, no. 7, pp. 1410–1425, Jul. 2018

  11. [11]

    A game of one/two strategic fr iendly jammers versus a malicious strategic node,

    L. Badia and F. Gringoli, “A game of one/two strategic fr iendly jammers versus a malicious strategic node,” IEEE Netw. Lett. , vol. 1, no. 1, pp. 6–9, Mar. 2019

  12. [12]

    Underwater jamming attacks as incomplete information games,

    F. Chiariotti, A. Signori, F. Campagnaro, and M. Zorzi, “Underwater jamming attacks as incomplete information games,” in Proc. IEEE Infocom W orkshops, 2020, pp. 1033–1038

  13. [13]

    A rchitectures, protocols and algorithms for 5G wireless networks,

    R. Ag¨ uero, B.-L. Wenning, Y . Zaki, and A. Timm-Giel, “A rchitectures, protocols and algorithms for 5G wireless networks,” Mobile Netw. Appl., vol. 23, no. 3, pp. 518–520, Jun. 2018

  14. [14]

    Rapid sen sing-based emergency detection: A sequential approach,

    R. F. El Khatib, N. Zorba, and H. S. Hassanein, “Rapid sen sing-based emergency detection: A sequential approach,” Comp. Commun. , vol. 159, pp. 222–230, Jun. 2020

  15. [15]

    M obility and blockage-aware communications in millimeter-wave veh icular net- works,

    M. Hussain, M. Scalabrin, M. Rossi, and N. Michelusi, “M obility and blockage-aware communications in millimeter-wave veh icular net- works,” IEEE Trans. V eh. Technol., vol. 69, no. 11, pp. 13 072–13 086, Nov. 2020

  16. [16]

    Channel surfing: defendi ng wireless sensor networks from interference,

    W. Xu, W. Trappe, and Y . Zhang, “Channel surfing: defendi ng wireless sensor networks from interference,” in Proc. IPSN , 2007, pp. 499–508

  17. [17]

    M-JAW: Mobility-based jamming avoidance in wireless sensor netwo rks,

    S. Misra, A. Mondal, P . Bhavathankar, and M.-S. Alouini , “M-JAW: Mobility-based jamming avoidance in wireless sensor netwo rks,” IEEE Trans. V eh. Technol., vol. 69, no. 5, pp. 5381–5390, May 2020

  18. [18]

    A novel jamming attacks detection approach based on machine l earning for wireless communication,

    Y . Arjoune, F. Salahdine, M. S. Islam, E. Ghribi, and N. K aabouch, “A novel jamming attacks detection approach based on machine l earning for wireless communication,” in Proc. IEEE ICOIN , 2020, pp. 459–464

  19. [19]

    Smart jamming attacks in wireless networks during a transmission cycle: S tackelberg game with hierarchical learning solution,

    M. A. Lmater, M. Haddad, A. Karouit, and A. Haqiq, “Smart jamming attacks in wireless networks during a transmission cycle: S tackelberg game with hierarchical learning solution,” Int. J. Adv. Comp. Sc. Applic. , vol. 9, no. 4, pp. 358–365, Apr. 2018

  20. [20]

    R. S. Sutton and A. G. Barto, Reinforcement learning: An introduction . MIT press, 2018

  21. [21]

    A jamming game with rival-type uncertainty,

    A. Garnaev, A. P . Petropulu, W. Trappe, and H. V . Poor, “A jamming game with rival-type uncertainty,” IEEE Trans. Wireless Commun. , vol. 19, no. 8, pp. 5359–5372, Aug. 2020

  22. [22]

    Jamming g ames in wireless networks with incomplete information,

    Y . E. Sagduyu, R. A. Berry, and A. Ephremides, “Jamming g ames in wireless networks with incomplete information,” IEEE Commun. Mag. , vol. 49, no. 8, pp. 112–118, Aug. 2011

  23. [23]

    A zero- sum jamming game with incomplete position information in wi reless scenarios,

    M. Scalabrin, V . V adori, A. V . Guglielmi, and L. Badia, “ A zero- sum jamming game with incomplete position information in wi reless scenarios,” in Proc. European Wireless, 2015

  24. [24]

    Energy and distance evaluation for jamming attacks in wireless networks,

    E. Bout, V . Loscri, and A. Gallais, “Energy and distance evaluation for jamming attacks in wireless networks,” in Proc. IEEE/ACM DS-RT , 2020

  25. [25]

    Uther and M

    W. Uther and M. V eloso. (2003) Ad- versarial reinforcement learning. [Online]. Available: http://www.cs.cmu.edu/∼mmv/papers/03TR-advRL.pdf

  26. [26]

    Tadelis, Game Theory: An Introduction

    S. Tadelis, Game Theory: An Introduction . Princeton University Press, October 2012

  27. [27]

    Blockage-peeking game of mobile strategic nodes in millimeter wave communications,

    L. Badia and A. Bedin, “Blockage-peeking game of mobile strategic nodes in millimeter wave communications,” in Proc. IEEE MedComNet, 2022

  28. [28]

    The physical layer of the ieee 802.11 p wave communication standard: The specifications and chall enges,

    A. M. Abdelgader and W. Lenan, “The physical layer of the ieee 802.11 p wave communication standard: The specifications and chall enges,” in Proc. W orld Congr . Eng. Comput. Sci., vol. 2, 2014, pp. 22–24

  29. [29]

    Real -world measurements of non-line-of-sight reception quality for 5 .9 GHz IEEE 802.11p at intersections,

    T. Mangel, M. Michl, O. Klemp, and H. Hartenstein, “Real -world measurements of non-line-of-sight reception quality for 5 .9 GHz IEEE 802.11p at intersections,” in Proc. of Int. Wkshp Commun. Techn. V eh. Springer, 2011, pp. 189–202

  30. [30]

    Performance analysis of IEEE 802.11p DCF for multiplatoon ing com- munications with autonomous vehicles,

    H. Peng, D. Li, K. Abboud, H. Zhou, H. Zhao, W. Zhuang, and X. Shen, “Performance analysis of IEEE 802.11p DCF for multiplatoon ing com- munications with autonomous vehicles,” IEEE Trans. V eh. Technol. , vol. 66, no. 3, pp. 2485–2498, Mar. 2016

  31. [31]

    Can IEEE 802.11p and Wi-Fi coexis t in the 5.9 GHz ITS band?

    I. Khan and J. H¨ arri, “Can IEEE 802.11p and Wi-Fi coexis t in the 5.9 GHz ITS band?” in Proc. IEEE W oWMoM, 2017

  32. [32]

    Perfor mance evaluation of 802.11p W A VE system on embedded board,

    Z. Qin, Z. Meng, X. Zhang, B. Xiang, and L. Zhang, “Perfor mance evaluation of 802.11p W A VE system on embedded board,” inProc. IEEE ICOIN, 2014, pp. 356–360

  33. [33]

    Secure mil limeter-wave ad hoc communications using physical layer security,

    Y . Zhang, Y . Shen, X. Jiang, and S. Kasahara, “Secure mil limeter-wave ad hoc communications using physical layer security,” IEEE Trans. Inf. F orensics Security, vol. 17, pp. 99–114, Jan. 2021

  34. [34]

    On GNSS jamming threat from the maritime navigation perspe ctive,

    D. Medina, C. Lass, E. P . Marcos, R. Ziebold, P . Closas, a nd J. Garc´ ıa, “On GNSS jamming threat from the maritime navigation perspe ctive,” in Proc. IEEE FUSION , 2019

  35. [35]

    Mitigatin g intended jamming in mmwave MIMO by hybrid beamforming,

    J. Zhu, Z. Wang, Q. Li, H. Chen, and N. Ansari, “Mitigatin g intended jamming in mmwave MIMO by hybrid beamforming,” IEEE Wireless Commun. Lett. , vol. 8, no. 6, pp. 1617–1620, Jun. 2019

  36. [36]

    Adversarial jamming and catching games over AWGN channels with mobile pl ay- ers,

    G. Perin, A. Buratto, N. Anselmi, S. Wagle, and L. Badia, “Adversarial jamming and catching games over AWGN channels with mobile pl ay- ers,” in Proc. WiMob, 2021

  37. [37]

    Notes on games over the squa re,

    I. Glicksberg and O. Gross, “Notes on games over the squa re,” in Contributions to the Theory of Games (AM-28), V olume II . Princeton University Press, 2016, ch. 9, pp. 173–182

  38. [38]

    Promoting cooperat ion in wireless relay networks through Stackelberg dynamic scheduling,

    L. Canzian, L. Badia, and M. Zorzi, “Promoting cooperat ion in wireless relay networks through Stackelberg dynamic scheduling,” IEEE Trans. Commun., vol. 61, no. 2, pp. 700–711, Feb. 2012

  39. [39]

    Rob ust adversarial reinforcement learning,

    L. Pinto, J. Davidson, R. Sukthankar, and A. Gupta, “Rob ust adversarial reinforcement learning,” in Proc. Int. Conf. Mach. Learn. , 2017, pp. 2817–2826

  40. [40]

    Dueling network architectures for deep reinforcement lea rning,

    Z. Wang, T. Schaul, M. Hessel, H. Hasselt, M. Lanctot, an d N. Freitas, “Dueling network architectures for deep reinforcement lea rning,” in International conference on machine learning . PMLR, 2016, pp. 1995– 2003

  41. [41]

    103 257-1 v1. 1.1 (2019-05) intelligent trans port systems (its),

    T. ETSI, “103 257-1 v1. 1.1 (2019-05) intelligent trans port systems (its),” Access Layer , vol. 44

  42. [42]

    AFRL: Adapti ve federated reinforcement learning for intelligent jamming defense in FANET,

    N. I. Mowla, N. H. Tran, I. Doh, and K. Chae, “AFRL: Adapti ve federated reinforcement learning for intelligent jamming defense in FANET,” J. Commun. Netw. , vol. 22, no. 3, pp. 244–258, Jun. 2020

  43. [43]

    On games over the unit square,

    T. Parthasarathy, “On games over the unit square,” SIAM Journal on Applied Mathematics , vol. 19, no. 2, pp. 473–476, 1970

  44. [44]

    Static and dynamic jamming games over wireless channels with mobile strategic players

    D.-Z. Du and P . M. Pardalos, Minimax and applications . Springer Science & Business Media, 1995, vol. 4. 12 APPENDIX A PROOF OF THEOREM 1 The theorem directly follows from Parthasarathy’s theo- rem [43]. If J believes that R is choosing a pure strategy, i.e., a location x with probability equal to 1, its best response would be to choose y = x, since, in ...