The wireless network jamming problem
نویسندگان
چکیده
In adversarial environments, disabling the communication capabilities of the enemy is a high priority. We introduce the problem of determining the optimal number and locations for a set of jamming devices in order to neutralize a wireless communication network. This problem is known as the WIRELESS NETWORK JAMMING PROBLEM. We develop several mathematical programming formulations based on covering the communication nodes and limiting the connectivity index of the nodes. Two case studies are presented comparing the formulations with the addition of various percentile constraints. Finally, directions of further research are addressed.
منابع مشابه
Jointly Effective Optimal Flow Control and Multi-path Routing for Wireless Networks under Probabilistic Attacks
A wireless network is vulnerable to jamming attacks since the network relies on open and shared wireless channels. Maintaining an acceptable level of network performance degradation has been an important problem in the wireless network. This paper studies a scheme for network performance optimization by exploiting dynamic rate control and multi-path routing in the wireless network under probabi...
متن کاملA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
Wireless networks are susceptible to numerous security vulnerabilities due to the open nature of the wireless medium. Anyone with a transceiver can eavesdrop on ongoing transmissions, block the transmission of legitimate ones or inject spurious messages. One of the fundamental ways for degrading the overall network performance is by jamming wireless transmissions. In this paper, we deal with th...
متن کاملAvoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks
--In this we address the dynamical jamming problem in wireless mesh networks and although some research has been conducted on countering Jamming attacks. Generally Multipath source routing protocols allow a data source node to distribute the total traffic among available paths. We consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on ...
متن کاملPerformance Study of Untrusted Relay Network Utilizing Cooperative Jammer
Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...
متن کاملRevisiting wireless network jamming by SIR-based considerations and Multiband Robust Optimization
We revisit the mathematical models for wireless network jamming introduced by Commander et al. [12,13]: we first point out the strong connections with classical wireless network design and then we propose a new model based on the explicit use of signal-to-interference quantities. Moreover, to address the uncertain nature of the jamming problem and tackle the peculiar right-hand-side (RHS) uncer...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Comb. Optim.
دوره 14 شماره
صفحات -
تاریخ انتشار 2007