Jammer placement to partition wireless network

Jixin Feng, Xin Li, E. Pasiliao, J. Shea
{"title":"Jammer placement to partition wireless network","authors":"Jixin Feng, Xin Li, E. Pasiliao, J. Shea","doi":"10.1109/GLOCOMW.2014.7063644","DOIUrl":null,"url":null,"abstract":"Wireless communication systems are susceptible to jamming attacks, and the use of unmanned vehicles brings new opportunities for coordinated jamming attacks. At the same time, systems of autonomous vehicles that coordinate their movements over a wireless network may be particularly vulnerable to jamming attacks that disrupt the control information. Much research has been conducted on how to efficiently jam single communication links and how to protect such links from jamming. However, less research has focused on problems of jamming attacks on the overall network. In this paper, we consider the problem of determining how to efficiently position jammers so as to partition a wireless network. The communication network is represented as a graph with the vertices representing the radios, and the edges representing the communication links. Although there has been extensive research into the problem of efficiently partitioning a graph via edge separators, the action of a jammer in a wireless network is more closely analogous to blocking reception at one or more radios, which may be modeled as partitioning a graph via node separators. We formulate several optimization problems for jammer placement. Since the optimal solution to these problems are computationally complex, we develop suboptimal solutions using spectral partitioning followed by greedy jammer placement and also a harmony search. The results show that these algorithms offer a tradeoff between complexity and performance. In the scenarios where we were able to compare performance with the optimal solution, the harmony search algorithm offered performance close to that of the optimal solution while requiring a much lower complexity.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"227 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE Globecom Workshops (GC Wkshps)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOMW.2014.7063644","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 17

Abstract

Wireless communication systems are susceptible to jamming attacks, and the use of unmanned vehicles brings new opportunities for coordinated jamming attacks. At the same time, systems of autonomous vehicles that coordinate their movements over a wireless network may be particularly vulnerable to jamming attacks that disrupt the control information. Much research has been conducted on how to efficiently jam single communication links and how to protect such links from jamming. However, less research has focused on problems of jamming attacks on the overall network. In this paper, we consider the problem of determining how to efficiently position jammers so as to partition a wireless network. The communication network is represented as a graph with the vertices representing the radios, and the edges representing the communication links. Although there has been extensive research into the problem of efficiently partitioning a graph via edge separators, the action of a jammer in a wireless network is more closely analogous to blocking reception at one or more radios, which may be modeled as partitioning a graph via node separators. We formulate several optimization problems for jammer placement. Since the optimal solution to these problems are computationally complex, we develop suboptimal solutions using spectral partitioning followed by greedy jammer placement and also a harmony search. The results show that these algorithms offer a tradeoff between complexity and performance. In the scenarios where we were able to compare performance with the optimal solution, the harmony search algorithm offered performance close to that of the optimal solution while requiring a much lower complexity.
干扰器放置分区无线网络
无线通信系统容易受到干扰攻击,无人驾驶车辆的使用为协同干扰攻击带来了新的机会。与此同时,通过无线网络协调其运动的自动驾驶汽车系统可能特别容易受到干扰攻击,从而破坏控制信息。如何有效地干扰单个通信链路以及如何保护单个通信链路不受干扰已经进行了大量的研究。然而,对整个网络的干扰攻击问题的研究较少。在本文中,我们考虑如何确定有效的位置干扰,以划分无线网络的问题。通信网络用图形表示,顶点表示无线电,边表示通信链路。尽管对通过边缘分隔器有效划分图的问题已经进行了广泛的研究,但无线网络中干扰器的作用更接近于阻塞一个或多个无线电的接收,这可以建模为通过节点分隔器划分图。我们提出了干扰机布置的几个优化问题。由于这些问题的最优解在计算上是复杂的,我们开发了次优解,使用频谱划分,然后是贪婪干扰器放置和和声搜索。结果表明,这些算法在复杂性和性能之间进行了权衡。在我们能够将性能与最优解决方案进行比较的场景中,和声搜索算法提供了接近最优解决方案的性能,同时要求的复杂性要低得多。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信