Jamming communication networks under complete uncertainty

نویسندگان

  • Clayton W. Commander
  • Panos M. Pardalos
  • Valeriy Ryabchenko
  • Oleg V. Shylo
  • Stan Uryasev
  • Grigoriy Zrazhevsky
چکیده

This paper describes a problem of interdicting/jamming wireless communication networks in uncertain environments. Jamming communication networks is an important problem with many applications, but has received relatively little attention in the literature. Most of the work on network interdiction is focused on preventing jamming and analyzing network vulnerabilities. Here, we consider the case where there is no information about the network to be jammed. Thus, the problem is reduced to jamming all points in the area of interest. The optimal solution will determine the locations of the minimum number of jamming devices required to suppress the network. We consider a subproblem which places jamming devices on the nodes of a uniform grid over the area of interest. The objective here is to determine the maximum grid step size. We derive upper and lower bounds for this problem and provide a convergence result. Further, we prove that due to the cumulative effect of C. W. Commander · P. M. Pardalos · V. Ryabchenko · O. Shylo · S. Uryasev · G. Zrazhevsky Department of Industrial and Systems Engineering, University of Florida, Gainesville, FL 32611, USA P. M. Pardalos e-mail: [email protected] V. Ryabchenko e-mail: [email protected] O. Shylo e-mail: [email protected] S. Uryasev e-mail: [email protected] C. W. Commander (B) Air Force Research Laboratory, Munitions Directorate, Eglin AFB, FL 32542, USA e-mail: [email protected] C. W. Commander et al. the jamming devices, the proposed method produces better solutions than the classical technique of covering the region with uniform circles.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Eavesdropping and Jamming Communication Networks

Eavesdropping and jamming communication networks is an important part of any military engagement. However, until recently there has been very limited research in this area. Two recent papers by Commander et al. [2, 3] addressing this problem represent the current state-of-the-art in the study of the WIRELESS NETWORK JAMMING PROBLEM. In this chapter, we survey the problem and highlight the resul...

متن کامل

On the Antijamming Performance of the NR-DCSK System

This paper investigates the anti-jamming performance of the NR-DCSK system. We consider several practical jamming environments including broad-band jamming (BBJ), partial-time jamming (PTJ), tone jamming (TJ) consisting of both single-tone and multi-tone, and sweep jamming (SWJ). We first analytically derived the bit error rates of the considered system under the BBJ and the PTJ environments in...

متن کامل

Performance Analysis of WiMAX under Single and Multi-Carrier Jamming

WiMAX is at the peak of communication technology as it is gaining a great position in the next generation of wireless networks. With the development of various wireless networks rapidly, they have turn into necessary infrastructure in our networking atmosphere. The main challenge for WiMAX is the problems associated with various jamming attacks that make them unavailable. Jamming attack is easy...

متن کامل

Friendship-based Cooperative Jamming for Secure Communication in Poisson Networks

Wireless networks with the consideration of social relationships among network nodes are highly appealing for lots of important data communication services. Ensuring the security of such networks is of great importance to facilitate their applications in supporting future social-based services with strong security guarantee. This paper explores the physical layer security-based secure communica...

متن کامل

Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks

Multi-radio (multi-interface, multi-channel) 802.11 and sensor networks have been proposed to increase network capacity and to reduce energy consumption, to name only a few of their applications. They are vulnerable, however, to jamming attacks, in which attackers block communication by radio interference or MAC-protocol violation. Two jamming countermeasures have been proposed, namely software...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Optimization Letters

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2008