Skip to main content

Hierarchical coordinated anti-jamming channel access in clustering networks: a multi-leader multi-follower Stackelberg game approach

Abstract

This paper mainly investigates the multi-user coordinated anti-jamming problem in clustering communication networks. In such kinds of networks, there exist multiple clusters and multiple users who communicate with their receivers simultaneously. Besides, a malicious jammer persistently attacks channels with wide-band and dynamic changing jamming signals. To cope with these challenges brought by the large-scale clustering network and the dynamic wide-band jamming, a hierarchical coordinated anti-jamming approach is proposed, and a multi-leader multi-follower Stackelberg game is introduced to model the anti-jamming problem. In detail, cluster heads act as leaders, and select available frequency bands to avoid jamming attacks, while users in each cluster act as followers and select corresponding channels distributedly and independently. Moreover, it is proved that there exist multiple Stackelberg equilibriums (SEs) in the proposed game. To obtain SEs, a hierarchical coordinated anti-jamming channel access (HCACA) algorithm is designed. Simulation results illustrate that the proposed approach is effective to cope with the dynamic wide-band jamming attacks. Furthermore, it is also depicted that the proposed approach outperforms the distributed anti-jamming comparative approach in terms of convergence speed.

1 Introduction

With the development of wireless communication technologies, the number of wireless communication devices increases explosively, causing severe shortage of spectrum resources. Thus, how to coordinate the internal interference is a vital problem that remains to be solved. In addition, due to the advance of the software-defined radio, it is convenient for malicious users (e.g., malicious jammer) to carry out jamming attacks with low-cost and wide-band noise signals; hence, there exists more serious security threaten for communication devices. In a word, it is an important issue to “coordinate the internal interference” and “resist external malicious attacks” simultaneously in wireless communication networks [14].

Focusing on the internal coordination and external confrontation problem for effective spectrum resource utilization, game theory [514] is a feasible tool to model and analysis the internal and external competitive or cooperative relationships among different decision-makers (i.e., users or malicious jammer). For example, as for internal coordination, authors in [6] reviewed the decision-theoretic solutions for channel access strategies in the opportunistic spectrum access system and presented some effective game models with respect to internal interference avoidance. Besides, authors in [7] reviewed the applications of repeated games in wireless networks, while authors in [8] formulated users’ competition for channel access using a non-cooperative game and proved that the proposed game model is an ordinal potential game where there exists at least one pure strategy Nash equilibrium (NE).

While considering the existence of malicious jamming attacks, the Stackelberg game [1527] is a suitable game model to formulate the competitive interactions between the user-side and the jammer-side as it can well depict the sequential decision-making relationship between two countermeasure sides. For example, Yang et al. formulated the anti-jamming power control problem using the Stackelberg game [15, 16]. In detail, the user was the leader, and the smart jammer acted as the follower of the game. Besides, the utility functions of the user and the jammer were designed respectively. Authors in [17] considered the anti-jamming power control problem with observation error and derived the Stackelberg equilibrium (SE) of the proposed Stackelberg game. In addition, the authors in [18] formulated the competition between one user and one jamming as a Bayesian Stackelberg game and took the incomplete information into consideration. In [19], the authors investigated the discrete anti-jamming power control problem, and solved the problem using the Stackelberg game and Q-learning algorithm. Considering the multi-user anti-jamming scenario, in [20], a one-leader multi-follower Bayesian Stackelberg game was formulated, and the influence of observation error as well as mobility of unmanned aerial vehicles (UAVs) were investigated. Moreover, authors in [21] investigated the communication confrontation scenario, and modeled the interactions in the confrontation scenario as a Stackelberg game, with each player seeking for maximizing their utility respectively.

However, there exist some main challenges to extend the above game approaches to the multi-user coordinated channel access scenario in the clustering networks with dynamic wide-band jamming attacks. (i) The increase of network scale causes more severe internal conflicts, thus it is important to coordinate the co-channel interference as well as to reduce the convergence time and complexity of the channel access algorithm. (ii) Considering the existence of the dynamic wide-band attacker, it is harder for users to adapt to the dynamic change of the jamming attack and to avoid the wide-band jamming signals which take up more spectrum resources than the single tone jamming signals.

To solve these challenges, and to fully take advantage of the clustering network, a multi-leader multi-follower Stackelberg game is formulated to model the competitive interactions between cluster heads and cluster users. Moreover, to accommodate the dynamic changing of the jamming attacks, the idea of jamming utilization is also introduced. To sum up, the main contributions of this paper are as follows:

  • The malicious wide-band jamming signals are “utilized” by cluster heads as coordination signals [28] to guide channel access of users, which means for different sensed jamming signals, different anti-jamming channel access strategies are adopted by users. The application of coordination signals helps users to adapt to the dynamic changing of jamming attacks.

  • A multi-leader multi-follower Stackelberg game is formulated, where cluster heads act as leaders, and select available frequency bands to avoid jamming attacks. While users in each cluster act as followers, and select corresponding channels distributedly and independently.

  • The proposed Stackelberg game is decomposed into multi-leader sub-game from the coarse granularity and the multi-follower sub-game from the fine granularity. It is proved that the proposed game has at least one SE for each jamming attack.

  • To obtain SEs, a hierarchical coordinated anti-jamming channel access (HCACA) algorithm is designed. In addition, simulation results illustrate that the proposed approach is effective to cope with the dynamic wide-band jamming attacks, and it accelerates the convergence of the clustering network compared with the distributed learning scheme.

Note that some existing works investigated the anti-jamming problem using game-theoretic framework [20, 29]. The main differences are summarized as follows: as mentioned in Section 1, the authors in [20]proposed a one-leader multi-follower Bayesian Stackelberg game, and the closed-form of the SE was derived. However, work [20] is not suitable for multi-user scenarios with a large scale, and the proposed approach can not adapt to the dynamic changing characteristic of jamming attacks. Besides, in [29], the authors investigated the distributed coordinated anti-jamming scenario. However, the proposed approach may not be well-adapted to the wide-band jamming in the clustering network. Thus, different from these two works, we fully take advantage of the clustering network in this work, and then propose a hierarchical coordinated anti-jamming channel access approach that is effective with the property of fast convergence.

The rest of this paper is organized as follows. In Section 2, methods are introduced briefly. In Section 3, the system model and problem formulation are presented. In Section 4, the multi-leader multi-follower Stackelberg game for hierarchical coordinated anti-jamming channel access is formulated. While in Section 5, the hierarchical coordinated anti-jamming channel access algorithm is proposed. In Section 6, simulation results and discussions are illustrated. Finally, the conclusion is made in Section 7.

2 Methods

The aim of this study is to solve the multi-user coordinated anti-jamming channel access problem in clustering communication networks. In detail, we propose a hierarchical coordinated anti-jamming approach, and formulate the anti-jamming problem as a multi-leader multi-follower Stackelberg game. Besides, we prove that there exist multiple Stackelberg Equilibriums (SEs) in the proposed game, and we then design a hierarchical coordinated anti-jamming channel access (HCACA) algorithm to obtain NEs of the game.

The paper presents a “game & learning” structure, where the proposed game is used to model the interactions among different decision-makers, and the proposed learning algorithm is to find the optimal or nearly optimal solutions of the game model. The theoretical analysis is supported by the experimental evaluation with the randomly generated clustering network under different dynamic wide-band jamming patterns, while the simulations have been carried out with Matlab R2019a.

3 System model and problem formulation

3.1 System model

In this paper, we consider a multi-user clustering network that is under the attack of a malicious jammer. As shown in Fig. 1, the network is divided into H clusters according to the geographical location of communication devices [30], and the cluster set is \({\mathcal {H}}{\mathrm { = }}\left \{ {1,...,h,...,H} \right \}\). Besides, the neighbor set of cluster h is denoted as \({{\mathcal {J}}_{h}}\). In each cluster, there exist multiple transmitter-receiver pairs, and each transmitter-receiver pair is assumed to be one user. Denote Mh as the number of users in cluster h, and the user set is \({{\mathcal {M}}_{h}}\). In cluster h, the kth user is denoted as mh,k, thus we have \({m_{h,k}} \in {{\mathcal {M}}_{h}}\). There exist A orthogonal channels for users to access, and the channel set is \({\mathcal {A}}\). To disturb the legitimate transmissions of users, a malicious jammer incessantly sends high-power noise signals to multiple channels.

Fig. 1
figure 1

The multi-user clustering network under malicious jamming attacks

In each cluster, there exists a cluster head who can exchange information with cluster users. For example, each cluster head can send available frequency band information to its governed users. After obtaining such frequency information, cluster users are able to select their transmission channels distributedly. Denote the transmission channel of user k in cluster h as ah,k, and the transmission throughput of this user is expressed as follows:

$$ {R_{h,k}} = \Delta \left({{a_{h,k}},{a_{- \left({h,k} \right)}},{A_{j}}} \right){B_{{a_{h,k}}}}{\log_{2}}\left({1 + \frac{{{P_{h,k}}{G_{h,k}}}}{{{N_{{a_{h,k}}}}}}} \right), $$
(1)

where \({B_{{a_{h,k}}}}\) is the channel bandwidth, Ph,k is the transmission power of the kth user in cluster h, and Gh,k is the channel gain of the transmission link. Assume that wireless communication channels undergo block fading, and the Rayleigh fading channel model is considered [31]. Thus, \({G_{h,k}} = d_{h,k}^{- \alpha }{\varepsilon _{h,k}}\), where dh,k denotes the transmission distance, α is the path-loss factor, and εh,k is the instantaneous random component. Besides, \(N_{a_{h,k}}\) is the noise power of the channel. In this paper, users adopt multiple access technique that is based on multi-channel slotted ALOHA, and only one transmission is allowed in a slot. To show the influence of the intra-cluster interference, inter-cluster interference and external malicious jamming, a cumulative jamming-interference indicator function Δ(ah,k,a−(h,k),Aj) is designed [32], where a−(h,k) denotes the channel access strategy combination of all users except the kth user in cluster h, and Aj is the jamming channel combination of the malicious jammer. In detail, Δ(ah,k,a−(h,k),Aj) is expressed as follows:

$$ {\displaystyle \begin{array}{c}\varDelta \left({a}_{h,k},{a}_{-\left(h,k\right)},{A}_j\right)=\\ {}\underset{\mathrm{External}\kern1em malicious\kern1em jamming}{\underbrace{\left[1-\delta \left({a}_{h,k},{A}_j\right)\right]}}\underset{\mathrm{Intra}- interference}{\underbrace{\prod \limits_{i\in {\mathcal{M}}_h\setminus k}\left[1-\delta \left({a}_{h,k},{a}_{h,i}\right)\right]}}\underset{\mathrm{Inter}- interference}{\underbrace{\prod \limits_{g\in {\mathcal{J}}_h}\prod \limits_{i\in {\mathcal{M}}_g}\left[1-\delta \left({a}_{h,k},{a}_{g,i}\right)\right]}},\end{array}} $$
(2)

where \({{\mathcal {M}}_{h}}\backslash k\) denotes all users in cluster h except user k, ah,i is the channel access strategy of user i in the cluster, while ag,i is the channel access strategy of user i in the neighboring cluster g. Note that there exist three indicator functions δ(ah,k,ah,i),δ(ah,k,ag,i) and δ(ah,k,Aj), which show the intra-cluster interference, the inter-cluster interference and the external malicious jamming respectively. Besides, these indicator functions can be denoted as follows:

$$ \delta \left({{a_{h,k}},{a_{y}}} \right) = \left\{ \begin{array}{l} 1,{a_{h,k}} = {a_{y}}{\mathrm{\& }}{P_{y}}d_{y \to h,k}^{- \alpha} > {\tau_{\mathrm{{thres}}}},\\ 0,\text{otherwise}. \end{array} \right. $$
(3)

where \({P_{y}}d_{y \to h,k}^{- \alpha } > {\tau _{\mathrm {{threshold}}}}\) represents that the received interference/jamming signal power from user/jammer y is higher than the threshold τthreshold. The above indicator function illustrates that if the channel access strategies of users are conflicting, they will suffer from co-channel interference when the interference threshold is reached. While if the channel access strategy of one user is overlapped with the attack strategy of the malicious jammer, this user will suffer from malicious jamming as the jammer will send high-power noise signals to those attacking channels. Note that the jammer is able to carry out wide-band jamming attacks, the above relationship turns to ah,kAj for the wide-band jamming case.

3.2 Problem formulation

Denote the channel set obtained by the cluster h as \({\mathcal {A}}_{h}\), thus we have \({a_{h,k}} \in {{\mathcal {A}}_{h}}\). Besides, the optimization objective of the clustering network is:

$$ {\displaystyle \begin{array}{c}{\mathbf{P}}_1:\left({\mathbf{a}}_1^{\ast },\cdots {\mathbf{a}}_H^{\ast}\right)=\arg \max \sum \limits_{h\in \mathcal{\mathscr{H}}}\sum \limits_{k\in {\mathcal{M}}_h}{R}_{h,k}\\ {}\kern8.00em \mathrm{s}.\mathrm{t}.\left|{A}_j\right|\le \left|\mathcal{A}\right|,\\ {}\kern12.00em \left|{a}_{h,k}\right|\le 1,\forall h\in \mathcal{\mathscr{H}},\forall {m}_{h,k}\in {\mathcal{M}}_h.\end{array}} $$
(4)

where \(\mathbf {a}_{h}^ * {\mathrm { = }}\left ({a_{h,1}^ *,...,a_{h,{\mathcal {M}}_{h}}^ *} \right),\forall h \in {\mathcal {H}}\) is all users’ channel access strategies in the cluster h. The above optimization objective indicates that each user is willing to find a optimal channel access strategy to maximize the sum of the throughput of the clustering network. The first constraint condition limits the range of jamming channels, while the second constraint means that each user either selects one channel or keeps silent at each time slot.

However, there exist some challenges to solve the above optimization objective. (i) The optimization objective is a non-convex problem, which is difficult to be solved directly in distributed clustering networks. (ii) Due to the dynamic and wide-band characteristics of malicious jamming, cluster users should coordinate internal interference and avoid external jamming attacks. (iii) With the increase of the network scale, the computation complexity increases correspondingly, and thus, a low-complexity channel access approach is preferred to enhance the convergence speed of the network. To cope with these three challenges, the idea of “game and learning” is introduced, in which a multi-leader multi-follower Stackelberg game is formulated to analyze the relationship among users, and a hierarchical coordinated anti-jamming channel access algorithm is designed to obtain the game equilibriums.

4 Multi-leader multi-follower Stackelberg game for hierarchical coordinated anti-jamming channel access

4.1 Stackelberg game formulation

To solve the hierarchical coordinated anti-jamming channel access problem in the clustering network, a multi-leader multi-follower Stackelberg game is formulated firstly, where cluster heads act as multiple leaders of the game, while cluster members are followers. Besides, the proposed game model can be decomposed into multi-leader sub-game and multi-follower sub-game, as shown in Fig. 2.

Fig. 2
figure 2

The structure of multi-leader multi-follower Stackelberg game

Considering the influence of the malicious, wide-band and dynamic jamming attacks, each cluster competes with the jammer to obtain available spectrum bands for its cluster members. Due to the dynamic characteristic of the jammer, the band selection strategies of each cluster need to be adjusted to adapt to the changing of the attacking strategies. After avoiding the malicious jamming bands, each cluster sends available band information to its cluster members. Then, users in the cluster access these available channels distributedly to coordinate the intra-cluster and inter-cluster conflicts. Mathematically, the game model is expressed as follows:

$$ {\mathcal{G}} = \left\{ {{\mathcal{H}},{{\left\{ {{{\mathcal{M}}_{h}}} \right\}}_{h \in {\mathcal{H}}}},{\mathcal{A}},{\mathcal{J}},{{\left\{ {{{\mathcal{A}}_{h}}} \right\}}_{h \in {\mathcal{H}}}},{{\left\{ {{U_{h}}} \right\}}_{h \in {\mathcal{H}}}},{{\left\{ {{u_{h,}}_{k}} \right\}}_{h \in {\mathcal{H}},k \in {{\mathcal{M}}_{h}}}},{{\mathcal{A}}_{j}}} \right\}, $$
(5)

where \({\mathcal {H}}\) is the cluster set, \({\left \{ {{{\mathcal {M}}_{h}}} \right \}_{h \in {\mathcal {H}}}}\) is the user set of each cluster, and \({\mathcal {J}}\) represents the jammer. \({\mathcal {A}}\) is the channel set of the clustering network, \({\left \{ {{{\mathcal {A}}_{h}}} \right \}_{h \in {\mathcal {H}}}}\) is the channel set of each cluster \(h \in {\mathcal {H}}\), and Uh is the utility function of cluster head h. uh,k is the utility function of the user k in the cluster h, which is the same as the throughput Rh,k shown in Eq. 1. In addition, \({{\mathcal {A}}_{j}}\) is the attack strategy set of the wide-band jammer.

After the Stackelberg game formulation, the definition of Stackelberg equilibrium (SE) is given, which is shown as follows:

Definition 1

In the proposed multi-leader multi-follower Stackelberg game, SE delivers the optimal strategy combination of cluster heads and users for each jamming strategy \(A_{j} \in {{\mathcal {A}}_{j}}\). For multiple leaders, there exists strategy combination \(\left ({{{A}}_{1}^ *, \cdots {{A}}_{H}^ *} \right)\), which maximizes the cumulative utility of the cluster heads. While for multiple followers, strategy combination \({\mathrm { }}\left \{ {\left ({a_{1,1}^ *, \cdots a_{1,{{\mathcal {M}}_{1}}}^ *} \right)...\left ({a_{H,1}^ *, \cdots a_{H,{{\mathcal {M}}_{H}}}^ *} \right)} \right \}\) is the best-response strategy combination with respect to leaders’ strategies [33]. Here, strategy combination \(\left \{ {\left ({A_{1}^{*}, \cdots A_{H}^{*}} \right),\left ({a_{1,1}^{*}, \cdots a_{1,{M_{1}}}^{*}} \right)...\left ({a_{H,1}^{*}, \cdots a_{H,{M_{H}}}^{*}} \right)} \right \}\) is the SE of the game, which satisfies the following conditions:

$$ \left\{ \begin{array}{l} {U_{h}}\left({A_{h}^ *,A_{- h}^ *,a_{1,1}^{*},...,a_{H,{{\mathcal{M}}_{H}}}^{*}} \right) \ge {U_{h}}\left({{A_{h}},A_{- h}^ *,a_{1,1}^{*},...,a_{H,{{\mathcal{M}}_{H}}}^{*}} \right),\forall h \in {\mathcal{H}},\\ {u_{h,k}}\left({a_{h,k}^ *,a_{- \left({h,k} \right)}^ *,A_{h}^ *,A_{- h}^ *} \right) \ge {u_{h,k}}\left({{a_{h,k}},a_{- \left({h,k} \right)}^ *,A_{h}^ *,A_{- h}^ *} \right),\forall h \in {\mathcal{H}},k \in {{\mathcal{M}}_{h}}. \end{array} \right. $$
(6)

In Eq. 6, Ah denotes all the cluster heads’ optimal strategy combination except cluster head h, and \(a_{- \left ({h,k} \right)}^ *\) is all users’ best-response strategy combination except user k in cluster h.

According to the hierarchical characteristic of the multi-leader multi-follower Stackelberg game, the optimization objective P1 is rewritten as:

$$ \left\{ \begin{array}{l} For{\mathrm{~}}h = 1,...,H\\ \mathop {\max }\limits_{{A_{h}}} {U_{h}}\left({{A_{h}},{A_{- h}},{A_{j}}} \right),h \in {\mathcal{H}},{A_{h}} \in {{\mathcal{A}}_{h}}\\ {\mathrm{ }}\mathrm{The~best~ response ~solution}:{\mathrm{ }}a_{1,1}^{*},...,a_{H,{{\mathcal{M}}_{H}}}^{*}\\ {\mathrm{ }}\left\{ \begin{array}{l} \mathop {\max }\limits_{{a_{h,k}}} {u_{h,k}}\left({{a_{h,k}},{a_{- \left({h,k} \right)}}} \right),\\ {a_{h,k}} \in {A_{h}} \end{array} \right. \end{array} \right. $$
(7)

Note that there are multiple coupling relationships in the clustering network, and there also exist competitive relationships between different clusters and the malicious jammer, thus the above game formulation is hard to be solved directly using traditional optimization approaches. In this paper, the game is decomposed into two sub-games from two different granularities, that is, the multi-leader(cluster head) sub-game anti-jamming spectrum sharing from the coarse granularity, and the multi-follower (cluster member) distributed channel access from the fine granularity.

4.2 Multi-leader sub-game from the coarse granularity

The objective of the multi-leader sub-game is to analyze and model the competitive interactions between different cluster heads and the jammer. Generally, this sub-game is formulated as:

$$ {{\mathcal{G}}_{\mathrm{{ML}}}} = \left\{ {{\mathcal{H}},{{\left\{ {{\mathrm{{CH}}_{h}}} \right\}}_{h \in {\mathcal{H}}}},{\mathcal{A}},{\mathcal{J}},{{\left\{ {{{\mathcal{A}}_{h}}} \right\}}_{h \in {\mathcal{H}}}},{{\left\{ {{U_{h}}} \right\}}_{h \in {\mathcal{H}}}},{{\mathcal{A}}_{j}}} \right\}, $$
(8)

where CHh is the cluster head of the cluster h, \(A_{h} \subseteq {{\mathcal {A}}_{h}}\) is one of the band selection strategy of the cluster h, \(A_{j} \subseteq {{\mathcal {A}}_{j}}\) is one of the jamming strategy, and Uh is the utility function of corresponding cluster head, which is expressed as follows:

$$ {U_{h}} = \left| {\mathcal{A}} \right| - \sum\limits_{e \in {{{A}}_{h}}} {\delta \left({e,{{ A}_{j}}} \right)}, $$
(9)

where eAh is a specific channel in spectrum band \({{{A}}_{h}},\left | {\mathcal {A}} \right |\) is the cardinality of channel set \(\mathcal {A}\). Moreover, the jamming indicator function δ(e,Aj) is expressed as follows:

$$ \delta \left({e,{{ A}_{j}}} \right) = \left\{ \begin{array}{l} 1,{\mathrm{ }}e \in {{ A}_{j}},A_{j} \subseteq {{\mathcal{A}}_{j}},\\ 0,{\mathrm{ }}\text{otherwise}. \end{array} \right. $$
(10)

Equation 10 means that the utility of the cluster head h is the difference between the cardinality of channel set \(\mathcal {A}\) and the jamming degree of current spectrum band strategy Ah. Hence, the optimization objective of the multi-leader sub-game is:

$$ {\mathbf{P}_{2}}:{\mathrm{ }}\left({{{A}}_{1}^ *, \cdots {{A}}_{H}^ *} \right) = \arg \max \sum\limits_{h \in {\mathcal{H}}} {{U_{h}}}. $$
(11)

The above optimization objective means that each cluster head tries to find the optimal spectrum band that minimizes the cumulative jamming degrees. Then, we give the definition of NE, and we then prove that there exists at least one pure strategy NE in the multi-leader sub-game.

Definition 2

The strategy combination \(\left ({{{A}}_{1}^ *, \cdots {{A}}_{H}^ *} \right)\) is the pure strategy NE of the game if and only if no cluster head could enhance its utility via unilaterally changing its spectrum band selection strategy [34]:

$$ {U_{h}}\left({A_{h}^{*},{A_{j}}} \right) \ge {U_{h}}\left({{A_{h}},{A_{j}}} \right),\forall h \in H,\forall {A_{h}} \in {{\mathcal{A}}_{h}}\backslash A_{h}^{*}. $$
(12)

The above equation shows that for a specific jamming strategy Aj, the pure strategy NE improves the total network utility via unilaterally optimizing each cluster head’s utility.

Theorem 1

For a specific jamming strategy Aj, there exists at least one pure strategy NE \(\left ({{{A}}_{1}^ *, \cdots {{A}}_{H}^ *} \right)\) with the following conditions:

$$ A_{h}^{*} = {\mathcal{A}}\backslash {A_{j}},\forall h \in {\mathcal{H}},{A_{j}} \in {{\mathcal{A}}_{j}},\exists A_{h}^{*} \in {{\mathcal{A}}_{h}}. $$
(13)

Equation 13 depicts that the NE strategy of each cluster head changes with the variation of the jamming strategies.

Proof

The proof by contradiction is applied for the multi-leader sub-game [29]. Assume that strategy combination \(\left ({{{A}}_{1}^ *, \cdots {{A}}_{H}^ *} \right)\) is not the NE, which means \(\exists h \in {\mathcal {H}}\) that satisfies \({U_{h}}\left ({A_{h}^{*},{A_{j}}} \right) < {U_{h}}\left ({{A_{h}},{A_{j}}} \right)\). Actually, unilaterally changing from \(A_{h}^{*}\) to Ah means that the cluster head h selects some channels that are jammed. Then, \(\sum \limits _{e \in {{{A}}_{h}}} {\delta \left ({e,{{ A}_{j}}} \right)}\) increases, and Uh decreases correspondingly. The above case depicts that the unilateral change does not satisfy \({U_{h}}\left ({A_{h}^{*},{A_{j}}} \right) < {U_{h}}\left ({{A_{h}},{A_{j}}} \right)\), and it is contradictory with the previous assumption. Thus, the proof of the above theorem has been completed. □

4.3 Multi-follower sub-game from the fine granularity

The objective of the multi-follower sub-game is to analyze and model the intra-cluster and inter-cluster competitive interactions among different cluster users. Note that the multi-leader sub-game is to guide the coarse-grained spectrum band selection of different cluster heads, and the multi-follower sub-game is to guide the fine-grained channel access of different users. Mathematically, the multi-follower sub-game is expressed as follows:

$$ {{\mathcal{G}}_{\mathrm{{MF}}}} = \left\{ {{\mathcal{H}},{{\left\{ {{{\mathcal{M}}_{h}}} \right\}}_{h \in {\mathcal{H}}}},{{\left\{ {{{\mathcal{A}}_{h}}} \right\}}_{h \in {\mathcal{H}}}},{{\left\{ {{u_{h,k}}} \right\}}_{h \in {\mathcal{H}},k \in {{\mathcal{M}}_{h}}}}} \right\}, $$
(14)

where uh,k=Rh,k denotes the throughput of the user k in the cluster h. In the multi-follower sub-game, only interference coordination needs to be considered after the multi-follower sub-game reaching NE for jamming strategy Aj.

Thus, the objective of the fine-grained multi-follower sub-game is:

$$ {\mathbf{P}_{3}}:{\mathrm{ }}\left\{ {\left({a_{1,1}^ *, \cdots a_{1,{{\mathcal{M}}_{1}}}^ *} \right)...\left({a_{H,1}^ *, \cdots a_{H,{{\mathcal{M}}_{H}}}^ *} \right)} \right\} = \arg \max \sum\limits_{h \in {\mathcal{H}}} {\sum\limits_{k \in {{\mathcal{M}}_{h}}} {{u_{h,k}}} }. $$
(15)

The above optimization objective means that each user tries to find the optimal channel access strategy that maximizes the cumulative throughput of the clustering network.

Theorem 2

For a specifical NE strategy \(\left ({{{A}}_{1}^ *, \cdots {{A}}_{H}^ *} \right)\) when the jammer attacks band Aj, there exists at least one pure strategy NE \({\mathrm { }}\left \{ {\left ({a_{1,1}^ *, \cdots a_{1,{{\mathcal {M}}_{1}}}^ *} \right)...\left ({a_{H,1}^ *, \cdots a_{H,{{\mathcal {M}}_{H}}}^ *} \right)} \right \}\) with the following condition:

$$ \left\{ \begin{array}{l} \left\{ {\left({a_{1,1}^{*}, \cdots a_{1,{M_{1}}}^{*}} \right)...\left({a_{H,1}^{*}, \cdots a_{H,{M_{H}}}^{*}} \right)} \right\} = \mathop \cup \limits_{h \in {\mathcal{H}}} A_{h}^ * \cup \left\{ 0 \right\};\\ {\mathcal{X}} = \left\{ {\left. x \right|\forall x \in {{\mathcal{M}}_{h}},m \in {{\left\{ {{{\mathcal{M}}_{h}}} \right\}}_{h \in {\mathcal{H}}}}\backslash x,a_{x}^ * \ne a_{m}^ * {\mathrm{ }}~if~{\mathrm{ }}{{\mathrm{P}}_{m}}{\mathrm{d}}_{m \to x}^{- \alpha} > {\tau_{{\text{thres}}}}} \right\};\\ \forall x \in {\mathcal{X}},a_{x}^ * \notin {A_{j}}. \end{array} \right. $$
(16)

ah,k=0 means that the user keeps silent when strategy 0 is selected. The first line of Eq. 16 means that each user selects one channel from the optimal spectrum band of the cluster it belongs, or keeps silent. The second line depicts that neighboring users choose different channels to access when reaching NE. The third line illustrates that users avoid those jamming channels.

Proof

Similarly, the proof by contradiction is also applied for the multi-follower sub-game. Assume that the strategy combination \({\mathrm { }}\left \{ {\left ({a_{1,1}^ *, \cdots a_{1,{{\mathcal {M}}_{1}}}^ *} \right)...\left ({a_{H,1}^ *, \cdots a_{H,{{\mathcal {M}}_{H}}}^ *} \right)}\right \}\) is not one NE of the multi-follower sub-game, which means \(\exists h \in {\mathcal {H}},\exists k \in {{\mathcal {M}}_{k}}\) that satisfies \({u_{h,k}}\left ({a_{h,k}^ *,a_{- \left ({h,k} \right)}^ *,{A_{j}}} \right) < {u_{h,k}}\left ({{a_{h,k}},{a_{- \left ({h,k} \right)}},{A_{j}}} \right)\). Then, the throughput of the user k in cluster h can be rewritten as:

$$ \begin{array}{l} {u_{h,k}}\left({a_{h,k}^ *,a_{- \left({h,k} \right)}^ *,{A_{j}}} \right) = \\ \left\{ \begin{array}{l} {B_{a_{h,k}^{*}}}\text{log}{_{2}}\left({1 + \frac{{{P_{h,k}}d_{h,k}^{- \alpha }}}{{{N_{a_{h,k}^{*}}}}}} \right),\mathrm{only~user~k~in~cluster}~h~\text{selects}~a_{h,k}^{*},\\ 0,\text{otherwise}. \end{array} \right. \end{array} $$
(17)

However, note that unilateral change from channel selection \(a_{h,k}^{*}\) to ah,k causes the throughput of current user down to zero, as the conflict degree increases when breaking the equilibrium state. Thus, the above case means that \({u_{h,k}}\left ({a_{h,k}^ *,a_{- \left ({h,k} \right)}^ *,{A_{j}}} \right) < {u_{h,k}}\left ({{a_{h,k}},{a_{- \left ({h,k} \right)}},{A_{j}}} \right)\) can not be satisfied, and the above hypothesis is not valid. To sum up, the conclusion of Theorem 2 holds. □

Theorem 3

For a specific jamming strategy Aj, there exists at least one SE in the proposed multi-leader multi-follower Stackelberg game.

Proof

In the above subsections, we proved that there exist at least one NE strategy combination \(\left ({{{A}}_{1}^ *, \cdots {{A}}_{H}^ *} \right)\) for the leaders’ sub-game, which maximizes the cumulative utility of all cluster heads, chooses optimal spectrum bands that are not jammed by the malicious jammer. In response to leaders’ strategies, the follower sub-game shows that users can reach at least one NE strategy combination \({\mathrm { }}\left \{ {\left ({a_{1,1}^ *, \cdots a_{1,{{\mathcal {M}}_{1}}}^ *} \right)...\left ({a_{H,1}^ *, \cdots a_{H,{{\mathcal {M}}_{H}}}^ *} \right)}\right \}\) which maximize the network throughput of cluster users. Combining Theorem 1, Theorem 2 and the definition of SE, we conclude that the proposed game has at least one SE. □

Figure 3 shows the operation process to obtain SE of the multi-leader multi-follower Stackelberg game. After observing the jamming strategy Aj, cluster heads (leaders) firstly adjust their spectrum band strategies to avoid the jamming attacks. Then, cluster users (followers) distributedly access channels after obtaining the spectrum band information sent by its cluster head. After that, cluster heads continue adjusting their band strategies until reaching the NE of the leader sub-game. When cluster users obtain the NE band strategy of their cluster heads, they adjust their channel access strategies until reaching the best-response strategy (which is also the NE of the follower sub-game). In the process of continuous adjustment of cluster heads and cluster users, the system gradually reaches the SE for the current jamming strategy. Aj While with the dynamic changing of jamming attacks, different SEs can be achieved via the Stackelberg game iterations.

Fig. 3
figure 3

The process of obtaining SE of the multi-leader multi-follower Stackelberg game

5 Hierarchical coordinated anti-jamming channel access algorithm

In this section, a hierarchical coordinated anti-jamming channel access (HCACA) algorithm is designed to obtain SEs of the multi-leader multi-follower Stackelberg game.

5.1 Slot structure

Before introducing the algorithm, we first design a slot structure for the operation of the hierarchical coordinated anti-jamming channel access, as shown in Fig. 4. At each time slot, actions are taken respectively for cluster heads and cluster users. Firstly, each cluster head observes the jamming signal, and maintains a corresponding strategy table for every jamming strategy. Secondly, each cluster head selects a spectrum band according to its strategy table. Then, all these cluster heads update their band strategies to avoid the current jamming signal. After the implementation of cluster heads, spectrum band strategies are sent to their cluster users, which means the first action for cluster users is the available channel acquisition. Each user will also maintain a specific strategy table for every jamming strategy to keep consistent with its cluster head, and it chooses one channel from its access table, which is randomly generated according to the information of the available channel. Once accessing the channel, each user transmission its data on the selected channel. When the transmission has been completed, users start updating their access strategies to avoid inter-cluster and intra-cluster conflicts among users.

Fig. 4
figure 4

The slot structure for the operation of the hierarchical coordinated anti-jamming channel access

5.2 Algorithm description

With the proposed slot structure, cluster heads and users update their spectrum band strategies and channel access strategies respectively using the hierarchical coordinated anti-jamming channel access (HCACA) algorithm. The detail of the HCACA algorithm description is shown in Algorithm 1.

The key steps of the proposed algorithm are the strategy updating processes of cluster heads and users, as shown in Eq. ?? and ??. In detail, when the cluster head h updates its strategy, it judges whether \({A_{h}}\left ({{C_{{A_{j}}}}} \right)=0\). If \({A_{h}}\left ({{C_{{A_{j}}}}} \right)=0\), then the cluster head chooses one spectrum band A to sense [35]. If the sensing band is available (not jammed), then it sets \({A_{h}}\left ({{C_{{A_{j}}}}} \right)=A'\). Otherwise, it keeps \({A_{h}}\left ({{C_{{A_{j}}}}} \right)=0\) if the sensed band is being jammed. Similarly, when user k in cluster h updates its strategy, it also judges whether an,k(Aj)=0, and the sensing process of users are similar to cluster heads. However, if an,k(Aj)≠0, the current user will transmit on the selected channel, and keep strategy an,k(Aj) unchanged for successful transmission. However, if conflicts occurs when transmitting, the user keeps its strategy with probability 1−Pback, or sets an,k(Aj)=0 with probability Pback.

5.3 Complexity analysis

Motivated by [29], we analyze the complexity of the proposed HCACA algorithm, which is consisted of computational complexity and storage size.

First, we give the computation complexity under the fixed jamming. Note that each cluster head should observe the jamming signal Aj, and the corresponding complexity is \({\mathcal {O}}\left ({J{o_{1}}} \right)\). Generally, (Jo1) is a small constant which is related to the observation process. Hence, the computation complexity for jamming observation is \(\left | {\mathcal {H}} \right |{\mathcal {O}}\left ({J{o_{1}}} \right)\).

After the spectrum band selection, each cluster head needs to update their band strategy table ATHh according to Eq. ??, and the computation complexity is \({\mathcal {O}}\left ({{B_{{\mathrm {up1}}}}} \right)\), where Bup1 is a small constant related to the band updating process. Hence, the total computation complexity for band updating is \(\left | {\mathcal {H}} \right |{\mathcal {O}}\left ({{B_{{\mathrm {up1}}}}} \right)\).

Following the updating process, each cluster head sends the band selection strategies to its cluster users, and then each user updates its channel strategy table according to Eq. ??, and the computation complexity is denoted as \({\mathcal {O}}\left ({{B_{{\mathrm {up2}}}}} \right)\). Thus, the total computation complexity for channel updating is \({\mathcal {O}}\left ({\sum \limits _{h \in {\mathcal {H}}} {\left | {{{\mathcal {M}}_{h}}} \right |} {B_{{\mathrm {up2}}}}} \right)\). Assume that the convergence iterations is T1 for the fixed jamming, and the total computation complexity is expressed as:

$$ \mathrm{Com{p_{fixed}}} = {T_{1}}\left[ {\left| {\mathcal{H}} \right|{\mathcal{O}}\left({J{o_{1}}} \right) + \left| {\mathcal{H}} \right|{\mathcal{O}}\left({{B_{{\mathrm{up1}}}}} \right) + {\mathcal{O}}\left({\sum\limits_{h \in {\mathcal{H}}} {\left| {{{\mathcal{M}}_{h}}} \right|} {B_{{\mathrm{up1}}}}} \right)} \right]. $$
(18)

Similarly, the computation complexity for the sweep jamming case is:

$$ \mathrm{Com{p_{sweep}}} = {\left| {{{\mathcal{A}}_{\mathrm{{sweep}}}}} \right|}{T_{1}}\left[ {\left| {\mathcal{H}} \right|{\mathcal{O}}\left({J{o_{1}}} \right) + \left| {\mathcal{H}} \right|{\mathcal{O}}\left({{B_{{\mathrm{up1}}}}} \right) + {\mathcal{O}}\left({\sum\limits_{h \in {\mathcal{H}}} {\left| {{{\mathcal{M}}_{h}}} \right|} {B_{{\mathrm{up1}}}}} \right)} \right], $$
(19)

where \({\mathcal {A}}_{\mathrm {{sweep}}}\) is the strategy set of the sweep jammer.

While the computation complexity for the random jamming case is:

$$ \mathrm{Com{p_{random}}} = {{\left| {{{\mathcal{A}}_{\text{random}}}} \right|^{2}}}{T_{1}}\left[ {\left| {\mathcal{H}} \right|{\mathcal{O}}\left({J{o_{1}}} \right) + \left| {\mathcal{H}} \right|{\mathcal{O}}\left({{B_{{\mathrm{up1}}}}} \right) + {\mathcal{O}}\left({\sum\limits_{h \in {\mathcal{H}}} {\left| {{{\mathcal{M}}_{h}}} \right|} {B_{{\mathrm{up1}}}}} \right)} \right], $$
(20)

where \({\mathcal {A}}_{\mathrm {{random}}}\) is the strategy set of the sweep jammer. Note that the random jammer randomly selects one strategy from its jamming strategy at each time, thus average O(|Arandom|2T1) iterations will be necessary for the convergence of the proposed HCACA algorithm (According to [28] Lemma 3).

Moreover, cluster heads and cluster users should store their band strategy tables and channel strategy tables respectively. Thus, the storage size is:

$$ \text{Store}{_{j}} = \left| {{{\mathcal{A}}_{j}}} \right|\left[ {\left| {\mathcal{H}} \right|O\left({{St_{1}}} \right) + {\mathcal{O}}\left({\sum\limits_{h \in {\mathcal{H}}} {\left| {{{\mathcal{M}}_{h}}} \right|} {St_{2}}} \right)} \right], $$
(21)

where \({{\mathcal {A}}_{j}}\) denotes different jamming strategy sets for different jamming patterns (1, \({{{\mathcal {A}}_{\mathrm {{sweep}}}}}\) or \({{{\mathcal {A}}_{\mathrm {{random}}}}}\)), St1 is a small constant which is related to the size of band strategy table for one jamming strategy, and St2 is a small constant with respect to the size of channel strategy table for one jamming strategy.

It is summarized that the computational complexity at each slot is a small constant, and the storage size is not too large as is mentioned above. In a word, the proposed HCACA algorithm has low complexity, and the approach can be implemented using typical technologies.

6 Simulation results and discussions

In this section, the simulations are conducted, and then some discussions with respect to simulation results are made.

6.1 Setting of parameters

First, the details of parameters are given, as shown in Table 1. Here, users randomly locate in an area of 12 km × 12 km, and different users may belong to different clusters. A typical scenario of the clustering network is shown in Fig. 5, where there exist 4 clusters and 24 users. In each cluster, there is a cluster head and 6 users (transmitter-receiver pairs). Users are influenced by the intra-cluster interference and inter-cluster interference if they choose the same channel to transmit data. It is assumed that the bandwidth of each channel is 2 MHz, the transmission power of each user is 0.1 W, the path-loss factor is assumed to be 3, and the background noise power is − 100 dBm. Besides, the interference distance is set to be 2000 m, which is positively related to the interference threshold τthres. Besides, the time is slotted, and the duration of one time slot is 10 ms. In detail, the duration of jamming observation, spectrum band selection, strategy updating of the cluster head, available channel acquisition, channel access and strategy updating of users are set to be 0.5 ms, and the duration of data transmission is 7 ms. Furthermore, the clustering network is under the attack of a malicious jammer, and three different wide-band jamming patterns are considered, i.e., the fixed jamming, the sweep jamming and the random jamming, as shown in Fig. 6.

Fig. 5
figure 5

The network topology of the clustering network (4 clusters with 24 users)

Fig. 6
figure 6

Different jamming patterns with wide-band spectrum characteristics

Table 1 Parameters settings in simulations
Table 2 Summary of main notations

6.2 Convergence analysis

Secondly, the convergence performance of the proposed HCACA algorithm is depicted in this subsection. Here, simulations are conducted under these three jamming patterns mentioned above. In detail, Fig. 7 shows the convergence process of the network throughput with fixed, sweep and random wide-band jamming (At each time slot, the jammer chooses 5 continuous channels to attack). It can be concluded that the proposed HCACA algorithm converges with the fastest speed under fixed jamming, as it is much easier for cluster heads to avoid the fixed jamming, and for users to coordinate the internal conflicts. Besides, the convergence time increases with the increase of the dynamic characteristic of the jammer as we can see that the proposed algorithm converges slower under the random jamming than under the sweep jamming. Note that in the initial stage, the network throughput fluctuates acutely under the sweep jamming and the random jamming, as the jamming state varies as time goes by. While with the updating of the strategy tables, the network throughput converges gradually. In a word, it depicts that the proposed algorithm is well-adapted to the dynamic and wide-band jamming environment. Moreover, the existence of channel fading also leads to slight fluctuations in network throughput; however, this phenomenon does not affect the convergence process of the HCACA algorithm.

Fig. 7
figure 7

The network throughput under different jamming patterns

6.3 Performance comparison

To further investigate the performance of the proposed approach, four different algorithms are compared in this subsection, the hierarchical coordinated anti-jamming algorithm HCACA, the distributed anti-jamming learning algorithm (DAL), the coordinated learning algorithm proposed in [36], and the random selection algorithm [37]. Here, users in the DAL algorithm first utilize the jamming signal as the coordination signal, and distributedly update their channel access strategies according to Eq. ??. While users in the coordinated learning algorithm adopt random integers as coordination signals, and avoid collision via distributed learning. Moreover, users in the random selection algorithm randomly select a channel from their channel set to access.

Figures 8 and 9 show the performance comparison under the sweep wide-band jamming and the random wide-band jamming. As shown in Fig. 8, it is concluded that the proposed HCACA outperforms other comparative algorithms and achieves the highest throughput with the fastest convergence speed under the sweep wide-band jamming. Note that the proposed DAL algorithm also performs well compared with the coordinated learning algorithm and the random selection algorithm, which shows the advantage of jamming signal utilization. Besides, due to that the coordinated algorithm adopts random integers as coordination signals, it can not adapt to the dynamic wide-band jamming well. Thus, the throughput with coordination learning fluctuates and does not converge to a stable state. Similarly, Fig. 9 depicts that the proposed HCACA algorithm has good adaptive capacity under random jamming. In detail, the proposed HCACA algorithm adapts to the stochastic behavior of the random jamming and converges gradually. The proposed DAL algorithm also performs well thanks to the observation of jamming signals. While the coordination learning algorithm and the random selection algorithm are hard to accommodate the random jamming and obtain relatively low network throughput than proposed algorithms.

Fig. 8
figure 8

The performance comparison among four different algorithms under sweep jamming

Fig. 9
figure 9

The performance comparison among four different algorithms under random jamming

To analyze the advantage in convergence speed of the proposed HCACA algorithm and DAL algorithm. Here we count the convergence time of 100 times Monte Carlo experiments, and then take the average value when reaching the equilibrium strategy combination of the network (for the HCACA algorithm, different SEs are achieved, while for the DAL algorithm, NEs are achieved for different jamming attacks). As shown in Fig. 10, the proposed hierarchical coordinated anti-jamming approach with Stackelberg game formulation converges more faster than the distributed anti-jamming learning approach under three different wide-band jamming attacks. The reason is that the proposed HCACA approach avoids jamming attacks via the cluster heads, and it reduces the strategy space greatly. In addition, it is also illustrated that with the increase of the dynamic and random characteristic of the jamming attacks, the average iterations increases accordingly, however, the proposed hierarchical anti-jamming approach still outperforms the distributed anti-jamming approach in terms of convergence speed.

Fig. 10
figure 10

The comparison of average convergence time between two different algorithms

7 Conclusion

This paper investigated the multi-user coordinated anti-jamming problem in clustering communication networks. A hierarchical coordinated anti-jamming approach was proposed, and a multi-leader multi-follower Stackelberg game was introduced to model the anti-jamming problem. In detail, cluster heads acted as leaders, and selected available frequency bands to avoid jamming attacks. While users in each cluster acted as followers, and selected corresponding channels distributedly and independently. Moreover, it was proved that there exist multiple Stackelberg equilibriums (SEs) in the proposed game. To obtain SEs, a hierarchical coordinated anti-jamming channel access (HCACA) algorithm was designed. Simulation results illustrated that the proposed approach is effective to cope with the dynamic wide-band jamming attacks. Furthermore, it was also depicted that the proposed approach outperforms the distributed anti-jamming comparative approach in terms of convergence speed.

Availability of data and materials

Not applicable.

Abbreviations

‐:

A summary of main notations is given in Table 2.

References

  1. X Lu, L Xiao, C Dai, H Dai, UAV-aided cellular communications with deep reinforcement learning against jamming. IEEE Wirel. Commun.27:, 48–53 (2020).

    Article  Google Scholar 

  2. L Xiao, X Lu, T Xu, et al., Reinforcement learning based mobile offloading for edge computing against jamming and interference. IEEE Trans. Commun.68:, 6114–6126 (2020).

    Article  Google Scholar 

  3. X Wang, J Wang, et al., Dynamic spectrum anti-jamming communications: Challenges and opportunities. IEEE Commun. Mag.58:, 79–85 (2020).

    Article  Google Scholar 

  4. Q Wu, T Ruan, et al., A unified cognitive learning framework for adapting to dynamic environment and tasks. arXiv preprint arXiv:2106.00501 (2021). https://arxiv.org/abs/2106.00501.

  5. Z Han, D Niyato, W Saad, T Başar, A Hjørungnes. Game theory in wireless and communication networks: theory, models, and applications (Cambridge university press, 2012).

  6. Y Xu, A Anpalagan, Q Wu, et al., Decision-theoretic distributed channel selection for opportunistic spectrum access: Strategies, challenges and solutions. IEEE Commun. Surv. Tutor.15:, 1689–1713 (2013).

    Article  Google Scholar 

  7. D T. Hoang, X Lu, D Niyato, P Wang, D I. Kim, Z Han, Applications of repeated games in wireless networks: A survey. IEEE Commun. Surv. Tutor.17:, 2102–2135 (2015).

    Article  Google Scholar 

  8. J Zheng, H Zhang, Y Cai, et al., Game-theoretic multi-channel multi-access in energy harvesting wireless sensor networks. IEEE Sensors J.16:, 4587–4594 (2016).

    Article  Google Scholar 

  9. Y Xu, J Wang, Q Wu, J Zheng, et al., Dynamic spectrum access in time-varying environment: Distributed learning beyond expectation optimization. IEEE Trans. Commun.65:, 5305–5318 (2017).

    Article  Google Scholar 

  10. C Yang, J Li, P Semasinghe, E Hossain, S M. Perlaza, Distributed interference and energy-aware power control for ultra-dense D2D networks: A mean field game. IEEE Trans. Wirel. Commun.16:, 1205–1217 (2017).

    Article  Google Scholar 

  11. Y Zhang, C Jiang, J Wang, Z Han, et al., Coalition formation game based access point selection for lte-u and wi-fi coexistence. IEEE Trans. Ind. Informat.14:, 2653–2665 (2018).

    Article  Google Scholar 

  12. Y Hu, A Sanjab, W Saad, Dynamic psychological game theory for secure Internet of battlefield things (IoBT) systems. IEEE Internet Things J.6:, 3712–3726 (2019).

    Article  Google Scholar 

  13. J Moura, D Hutchison, Game theory for multi-access edge computing: survey, use cases, and future trends. IEEE Commun. Surv. Tutor.21:, 260–288 (2019).

    Article  Google Scholar 

  14. J Cao, T Peng, Z Qi, et al., Interference management in ultradense networks: A user-centric coalition formation game approach. IEEE Trans. Veh. Technol.67:, 5188–5202 (2018).

    Article  Google Scholar 

  15. D Yang, J Zhang, X Fang, et al., Optimal transmission power control in the presence of a smart jammer. IEEE GLOBECOM, 5506–5511 (2012).

  16. D Yang, G Xue, J Zhang, et al., Coping with a smart jammer in wireless networks: A Stackelberg game approach. IEEE Trans. Wirel. Commun.12:, 4038–4047 (2013).

    Article  Google Scholar 

  17. L Xiao, T Chen, J Liu, H Dai, Anti-jamming transmission Stackelberg game with observation errors. IEEE Commun. Lett.19:, 949–952 (2015).

    Article  Google Scholar 

  18. L Jia, F Yao, Y Sun, et al., Bayesian Stackelberg game for anti-jamming transmission with incomplete information. IEEE Commun. Lett.20:, 1991–1994 (2016).

    Article  Google Scholar 

  19. L Jia, F Yao, Y Sun, et al., A hierarchical learning solution for anti-jamming Stackelberg game with discrete power strategies. IEEE Wirel. Commun. Lett.6:, 818–821 (2017).

    Article  Google Scholar 

  20. Y Xu, G Ren, Jin Chen, et al., A one-leader multi-follower Bayesian-Stackelberg game for anti-jamming transmission in UAV communication networks. IEEE Access. 6:, 21697–21709 (2018).

    Article  Google Scholar 

  21. N Qi, W Wang, M Xiao, et al., A learning-based spectrum access Stackelberg game: Friendly jammer-assisted communication confrontation. IEEE Trans. Veh. Technol.70:, 700–713 (2021).

    Article  Google Scholar 

  22. Y Li, L Xiao, J Liu, et al., Power control Stackelberg game in cooperative anti-jamming communications. GAMENETS, 1–6 (2014).

  23. Y Yuan, T Yang, H Feng, et al., An iterative matching-Stackelberg game model for channel-power allocation in D2D underlaid cellular networks. IEEE Trans. Wirel. Commun.17:, 7456–7471 (2018).

    Article  Google Scholar 

  24. D. N Duong, S. A Madhukumar, D Niyato, Stackelberg bayesian game for power allocation in two-tier networks. IEEE Trans. Veh. Technol., 2341–2354 (2016).

  25. Z Su, N Qi, Z Du, et al., Guarding legal communication with smart jammer: Stackelberg game based power control analysis. China Commun.18:, 126–136 (2021).

    Article  Google Scholar 

  26. K. I Ahmed, O. A Fapojuwo, Stackelberg equilibria of an anti-jamming game in cooperative cognitive radio networks. IEEE Trans. Cogn. Commun. Netw.4:, 121–134 (2018).

    Article  Google Scholar 

  27. C Han, L Huo, X Tong, et al., Spatial anti-jamming scheme for internet of satellites based on the deep reinforcement learning and Stackelberg game. IEEE Trans. Veh. Technol.69:, 5331–5342 (2020).

    Article  Google Scholar 

  28. L Cigler, B Faltings, in 10th International Conference on Autonomous Agents and Multiagent Systems, 2. Reaching correlated equilibria through multiagent learning (Taipei, 2011), pp. 509–516.

  29. Y Xu, Y Xu, X Dong, et al., Convert harm into benefit: A coordination-learning based dynamic spectrum anti-jamming approach. IEEE Trans. Veh. Technol.69:, 8–13032 (2020).

    Google Scholar 

  30. P Neamatollahi, S Abrishami, M Naghibzadeh, et al., Hierarchical clustering-task scheduling policy in cluster-based wireless sensor networks. IEEE Trans. Ind. Informat.14:, 1876–1886 (2018).

    Article  Google Scholar 

  31. C Singhal, S De, in Advances in Wireless Technologies and Telecommunication (AWTT). Resource allocation in next-generation broadband wireless access networks (IGI GlobalHershey, 2017).

    Google Scholar 

  32. Y Xu, J Wang, Q Wu, A Anpalagan, et al., Opportunistic spectrum access in unknown dynamic environment: A game-theoretic stochastic learning solution. IEEE Trans. Wirel. Commun.11:, 1380–1391 (2012).

    Article  Google Scholar 

  33. Y Sun, J Wang, F Sun, et al., Energy-Aware joint user scheduling and power control for two-tier femtocell networks: A hierarchical game approach. IEEE Syst. J.12:, 2533–2544 (2018).

    Article  Google Scholar 

  34. K Yao, J Wang, Y Xu, et al., Self-organizing slot access for neighboring cooperation in UAV swarms. IEEE Trans. Wirel. Commun.19:, 2800–2812 (2020).

    Article  Google Scholar 

  35. J Wang, G Ding, Q Wu, et al., Spatial-temporal spectrum hole discovery: A hybrid spectrum sensing and geolocation database framework. Chinese Sci. Bull.59:, 1896–1902 (2014).

    Article  Google Scholar 

  36. L Wang, K Wu, M Hamdi, et al., Attachment-learning for multi-channel allocation in distributed ofdma-based networks. IEEE Trans. Wirel. Commun.12:, 1712–1721 (2013).

    Article  Google Scholar 

  37. D Shen, O. V Li, Stabilized multi-channel aloha for wireless OFDM networks. IEEE GLOBECOM. 1:, 701–705 (2002).

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank Dr. Ximing Wang for discussions on the system model.

Funding

This work was supported by the National Natural Science Foundation of China under 62071488 and 61771488.

Author information

Authors and Affiliations

Authors

Contributions

Authors’ contributions

Yifan Xu, Jin Chen conceived the system model. Yifan Xu, Zhibin Feng and Kailing Yao completed the game-theoretic analysis of this paper. Yifan Xu, Guoxin Li, Fei Song and Gui Fang contributed to the algorithm design. Yifan Xu also performed the simulations with Zhibin Feng. Besides, Yifan Xu, Jin Chen and Zhibin Feng wrote the manuscript. The authors read and approved the final manuscript.

Authors’ information

Not applicable.

Corresponding author

Correspondence to Zhibin Feng.

Ethics declarations

Ethics approval and consent to participate

Not applicable.

Consent for publication

Not applicable.

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, Y., Chen, J., Feng, Z. et al. Hierarchical coordinated anti-jamming channel access in clustering networks: a multi-leader multi-follower Stackelberg game approach. EURASIP J. Adv. Signal Process. 2021, 42 (2021). https://doi.org/10.1186/s13634-021-00764-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13634-021-00764-0

Keywords