Accepted Manuscript Analyzing the Robustness of an Array of Wireless Access Points to Mobile Jammers David Schweitzer, Ruholla Jafari-Marandi, Hugh Medal PII: DOI: Reference:
S0360-8352(17)30083-9 http://dx.doi.org/10.1016/j.cie.2017.02.022 CAIE 4652
To appear in:
Computers & Industrial Engineering
Received Date: Accepted Date:
9 November 2016 27 February 2017
Please cite this article as: Schweitzer, D., Jafari-Marandi, R., Medal, H., Analyzing the Robustness of an Array of Wireless Access Points to Mobile Jammers, Computers & Industrial Engineering (2017), doi: http://dx.doi.org/ 10.1016/j.cie.2017.02.022
This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
Title Page
Analyzing the Robustness of an Array of Wireless Access Points to Mobile Jammers
David Schweitzer*a
Ruholla Jafari-Marandib
Hugh Medalc
Department of Industrial & Systems Engineering, Mississippi State University, PO Box 9542, Mississippi State, MS 39762, United States of America a:
[email protected] b:
[email protected] c:
[email protected] *: corresponding author
Analyzing the Robustness of an Array of Wireless Access Points to Mobile Jammers February 24, 2017
Abstract We present an approach for measuring the vulnerability of a wireless network. Our metric, nRobustness, measures the change in a network's total signal strength resulting from the optimal placement of n jammers by an attacker. Toward this end, we develop a multi-period mixedinteger programming interdiction model that determines the movement of n jammers over a time horizon so as to minimize the total signal strength of users during a sustained jamming attack. We compared several solution approaches for solving our model including a Lagrangian relaxation heuristic, a genetic algorithm, and a stage decomposition heuristic. We tested our approach on a wireless trace dataset developed as part of the Wireless Topology Discovery project at the University of California San Diego. We found found that the Lagrangian approach, which performed best overall, nds a close-to-optimal solution while requiring much less time than solving the MIP directly. We then illustrate the behavior of our model on a small example taken from the dataset as well as a set of experiments. Through our experiments we conclude that the total signal power follows a sigmoid curve as we increase the number of jammers and access points. We also found that increasing access points only improves network robustness initially; after that the benet levels o. In addition, we found that the problem instances we considered have an n-Robustness of between 39 and 69 percent, indicating that the value of the model parameters (e.g., number of jammers, number of time periods) has an eect on robustness.
Keywords : networks, mixed-integer programming, security, interdiction, location analysis 1
Introduction
The goal of this paper is to develop a new computational tool for measuring the vulnerability of a wireless network. By considering a set of wireless access points (signal senders), demand points (signal receivers or users), the connectivity between the two, and how the loss of a connection can lead to the reassignment via a second connection, we examine the robustness of a wireless network's performance in the event of an attack on the network by a set of jamming devices in which the goal of the attacker is to minimize the total signal strength. We develop a multi-period mixed-integer programming (MIP) model that minimizes the total signal strength over a time horizon which takes
1
into account the mobility of demand points. We then dene a metric, how robust a network is when under attack by
n
n-Robustness, for determining
jammers. This metric, computed using our MIP
model, measures the ratio of the total remaining signal power on a network because of jamming against its total signal power when jammers are not present.
1.1
Motivation
As wireless networks require limited necessary infrastructure, needing only access points to establish the connections, it is important to defend them from attacks.
The rst step to increasing the
robustness of a system is understanding its weakness and proneness to attacks. In many contexts, wireless service is provided by a set of spatially-distributed access points, or transmitters.
In these contexts, the loss of one of these access points can result in the loss
of service for a large number of demand points.
This paper examines this idea by studying the
optimal placement of jammers within the service area of a set of access points in order to minimize its connectivity.
Understanding strategies for eective attacking will provide insights as to the
robustness of a given network. These insights can lead to the increased defense of the network by examining or re-examining the locations of signal access points.
1.2
Relevant Literature
Technological aspects of wireless communication security have been well studied, and they comprise descriptions of jamming attacks (Noubir et al., 2003, Law et al., 2009) and the strategies against jamming attacks such as instance channel-hopping (Navda et al., 2007) and spread spectrum techniques (Liu et al., 2010). Also, studies related to anti-jamming protocols for dierent network layers (Awerbuch et al., 2008, Richa et al., 2011) and key management (Du et al., 2004) are other focuses in the literature. Operational considerations have also been studied, such as methods for responding to a jamming attack (Jiang et al., 2009) and creating ecient approaches toward determining the placement of one or a set of jammers (Pelechrinis et al., 2009, Feng et al., 2014, Vadlamani et al., 2014, Commander et al., 2009). wireless networks from the
Each of these technological studies investigates the security of
micro-level. In this paper we take a macro-level approach.
The jamming placement problem is related to the network interdiction problem, which has been been extensively studied.
There are studies to interdict networks in order to achieve objectives,
such as maximizing the shortest path (Ramirez-Marquez, 2010 ,Cappanera et al., 2011), minimizing the maximum ow (Aksen et al., 2014), and, similar to this study, minimizing network connectivity (Nguyen et al., 2013).
Interdiction models have applications in a variety of areas, such as drug
smuggling prevention (Wood, 1993), drug-related law enforcement (Malaviya et al., 2012), waterway commodity ows (Baroud et al., 2014), vulnerability analysis of power grids (Salmerón et al., 2009), and interdicting nuclear plans projects (Brown et al., 2009, Morton et al., 2007). Recently, researchers have been expanding on dierent variations of the problem, including: 1) multiple ow commodities (Lim et al., 2007), 2) multiple time periods (Malaviya et al., 2012), 3) dynamic interdiction (Rad and Kakhki, 2013), 4) dynamic attacker/defender interactions (Lunday and Sherali,
2
2010), 5) stochastic network interdiction (Morton, 2011), including random network topology (Held et al., 2005) and random adversary characteristics (Feng et al., 2008), 6) deception tactics (Salmerón, 2012), and 7) disruption intensity levels (Losada et al., 2012). The literature shows that interdiction models have been studied extensively in physical systems with several (aforementioned) applications. Despite this fact, there is little literature in focusing on the interdiction of networks within the context of communication networks such as wireless networks. Nevertheless, a few studies have focused on the placement of jammers so as to minimize connectivity (Commander et al., 2009, Vadlamani et al., 2014, Feng et al., 2014), and there is some literature showing the optimal defense of networks knowing an attack is imminent in a gametheoretic approach (Basdere et al., 2013); however, these studies consider multi-hop wireless mesh networks. No studies to date have considered jamming in the context of a single-hop network, such as a network of access points.
1.3
Contributions
This paper is the rst to study the jammer placement problem in an array of wireless access points, i.e., a wireless local area network (WLAN). Specically, this paper makes several contributions. 1) We present a mixed-integer programming model for the problem of placing jammers in order to jam access points. 2) We investigate several approaches, exact and heuristic, for solving the model and compare their run times and solution quality. 3) We analyze how the model responds to changes in parameters; this analysis helps generate insights for wireless network security.
2
Problem Description
Our problem consists of a set of users (demand points), signal towers (access points), a number of jammers, and a list of possible jammer locations. Users link with a signal tower through some device (e.g., laptop, smart device), and the device receives an associated signal strength (received signal strength indicator, or RSSI). Users may link with multiple signal towers if they are in range of more than one, but a connection will only be established with the signal tower coinciding with the strongest signal, i.e., the largest RSSI. We seek to determine the optimal location of placing jammers such that the total signal strength is minimized. As users change their location over time, we also consider how the jamming devices themselves may relocate over multiple time periods. We also consider that users may be reassigned to a dierent signal tower (with a reduced RSSI or weaker signal) should the current signal be jammed.
Although many types of jammers exist,
such as jammers that only jam a fraction of the signal strength, jammers that deceive networks by transmitting legitimate information while distorting the eect of actual demand points, and others (each proposed in Xu et al. 2005), we assume that the jammer blocks the signal completely whenever an access or demand point is within its jamming radius. We consider this type of jammer because we are seeking to examine the robustness of a worst-case scenario, where signals are completely blocked and no connection to the network can be found between some demand points and some
3
access points. Figure 1 shows a wireless network that is being jammed. Squares represent the access points (a wireless router or cell phone tower, for example), circles represent demand points (people trying to connect to an access point), and the triangles represent the jammers. The circular elds around the triangles show the jamming radius of a jammer.
The lines between users and access points
represent connections, either actual or potential; the numbers on the lines represent the signal strength received by the user from the access point.
Thus, in this paper we distinguish between
potential signal strength and actual signal strength. Solid lines represent the strongest received signal
strength by a user and thus an established connection; the dashed lines represent backup connections which have less signal strength. Under jamming, a user may need to reassign to a backup connection if the primary established connection is jammed. The way a jammer works is that it emits some omnidirectional signal power over a radius. If an access point falls within this radius, it is jammed, severing all connections any demand points have with it. If a demand point falls within the radius, any connection it has made and any possible connections it can make with other access points are also jammed. On a graph consisting of nodes representing access and demand points with edges representing a connection between a demand point and access point, potential or actual, jamming is eectively removing edges from the graph. However, in the case of a jammed link, the demand point is reassigned to another access point if one is available and the demand point is capable of establishing a connection (is not within the radius of a jammer). For example, consider demand point
3
in Figure 1a, which is linked to access points
The demand point's strongest signal links it with access point can reassign itself to access point demand point
3
2.
1,
but if access point
So to eectively block demand point
needs to be jammed outright or both access points
1
and
3's 2
1
4
2.
signal entirely, either
need to be jammed, as
(b) Jammed network.
Figure 1: Toy illustration.
and
is jammed, it
is the case in Figure 1b.
(a) Network without jamming.
1
3
Mathematical model
3.1
Mixed-integer programming model
To model the problem described in Section 2 we present the following mixed-integer programming (MIP) model. The core of the MIP model has been adopted from the
r-interdiction
median model,
which has applications in identifying critical infrastructures in supply chain management (Church et al., 2004). The
r-interdiction
median problem is essentially the reverse of the famous
problem. In the latter, the problem entails locating the facilities to
minimize
p-median
the total weighted
distance to a set of demand points, while the former problem is to choose a subset of facilities to remove with the purpose of
r-interdiction
maximizing
weighted distance.
In our problem, the facilities in the
median problem correspond to access points.
Specically, our model seeks to jam
(remove) a set of access points in order to minimize the total signal strength received by demand points. This objective function is similar to those used in the facility location literature (Church et al. 2004 and Wood, 1993). In order to formulate an optimization model, the following notation is considered.
Indices
i
index for demand points (locations change over time)
j
index for access points
k
index for locations of jammers
l
index for jammers
t
index for time periods
Parameters
Sij
the signal power from access point
Dijklt
1 if jammer
l
located in position
and demand point
i
at period
t;
k
j
for the demand point
i
can disturb the connectivity between access point
j
0 otherwise
dkl
the Euclidean distance between the two locations
R
the greatest distance between any two possible jammer locations a jammer may relocate to between time periods
n
the number of jammers available
5
k
and
l
Sets
I
the set of demand points
J
the set of access points
K
the set of potential locations for jammers
L
the set of existing jammers (not necessarily identical)
T
the set of time periods
Ait = {jJ | 0 < Sijt } the set of access points that has some signals for demand point i at period t n o Tijt = qAit | n 6= j , Siqt ≤ Sijt the set of existing access points (not including j ) that have at most the same signal from access point
Pk = {mK | m 6= k, dkm > R} from
k
j
for demand point
i
at period
the set of locations of jammers (not including
is greater than
k)
t
whose distance
R
Decision variables
xijt
1 if the demand point
yklt
1 if the jammer
l
i
is connected to access point
is located at position
k
in period
j
t;
at time
t;
otherwise 0
otherwise 0
Using the above notation, our MIP is the following:
M in Z =
XXX i
j
Sij xijt
(1a)
t
subject to:
X
xijt = 1 ∀iI, tT
(1b)
yklt = 1 ∀lL, tT
(1c)
jAit
X k
xijt ≤ (1 − Dijklt yklt ) ∀iI, jJ, kK, , lL, tT X
xint ≤
nTijt
X
X X (Dijklt yklt ) ∀iI, jJ, tT k
(1d)
(1e)
l
ym,l,t+1 ≤ 1 − yklt
mPk
6
∀kK, lL, tT
(1f )
yklt {0, 1} ∀kK, lL, tT
(1g)
The objective function of this model (1a) strives to minimize the network connectivity (in terms of total received signal strength) and thus maximize the impact of jammer placement. The set of constraints (1b) maintains that every demand point in every time period has connection to only one access point. In reality, there are cases that an access point is not in the range of any demand points or simply has been jammed.
In these cases, the demand points will be associated to a
dummy access point which has zero signal strength for all of the demand points and can never be jammed; this point is illustrated in Figure 1 with access point
4
in the bottom right corner. The
set of constraints (1c) makes certain that all jammers are active and are positioned in one of the possible locations. The set of constraints (1d) forces all of the interdicted connections to be zero. The set of constraints (1e) prevents assignments from demand points signals than what
i
has from
j,
i to access points with smaller
unless the connection between the access point and the demand
point has been interdicted (jammed). Thus, demand point
i
will be forced to be assigned to the
access point with the strongest signal. Finally, the set of constraints (1f), the jammer movement constraints,establishes the restrictions on the jammers not being able to move farther than a distance limit from one period of time to the next.
3.2
n-Robustness
We dene
metric
n-Robustness
as the robustness of a network when
as to maximize the total actual signal jammed. We dene all demand points without jamming for a time period
t
under the optimal jamming attack consisting of
n
t.
Tt
n
jammers are placed optimally so
as the total actual signal strength of
The total actual signal strength in period
jammers is dened as
Rtn .
Eectively,
Rtn
is
the remaining actual signal after the network has been jammed, and we note that our MIP model calculates
Rtn
directly. Finally, our metric,
n-Robustness,
is dened as
P n R n − Robustness = Pt t × 100% t Tt So if a network has a
3-Robustness
the total signal power remains after
3
equal to
75%
for a
10-period
horizon, this means
75%
of
jammers have been introduced to the network and placed
optimally for the ten time periods.
4
Dataset Construction
In this section we describe how we modied a publicly-available dataset in order to construct a dataset for our problem.
7
4.1
WTD Dataset
We used a modied version of a wireless trace dataset developed as part of the Wireless Topology Discovery project at UC San Diego (UCSD) (McNett and Voelker, 2005) that provided traces of user-to-access point connections over a period of time. This data contained Cartesian coordinates for all access points and a list of pings for each demand point. A ping is a documented record of a connection a demand point has with an access point (or an attempt to connect with an access point, in the case of multiple connections). Our pings contained a time of the ping and an associated signal strength (which we took as received signal strength indicator, or RSSI) to each access point the demand point attempted to establish a connection with, one row per connection. Several assumptions were made in the modication of this dataset because of a lack of suitable information. The rst was that we assumed the space to be free, i.e., no obstacles or topographical interference from hills or buildings. This assumption came from the fact that, over all the data,
z
the
Cartesian coordinate did not vary signicantly, and there was no information regarding any
possible obstructions or details on landmarks. Another assumption made was that each individual time period in our model represented an interval of time in our datasets. For our purposes, we used one hour to represent each time period. For some of the demand points there were some time periods without any pings. In this case we assumed a linear signal power change between the two time periods with ping data. For our experiments
150
demand points (clients) were used for
10
time periods.
200,
dataset contained much more data: the total number of access points was of demand points was
275,
and the total number of pings was
13, 215, 413.
The WTD
the total number
To select a subset of
data for our experiments, the demand points and pings associated with those demand points were randomly chosen.
4.2
Estimated Received Signal Strength
The UCSD contained signal strengths for each instance that a demand point pinged an access point.
However, our model requires distances.
Thus, we used the following approach to convert
signal strength to distance. The data used was interpreted as a set of demand points with accompanying received signal strength indications (RSSI) with values that ranged from
0
(no connection) to
tion), and we assumed them to be wi signals. We rst converted the
0-33
33
(strong connec-
RSSI values to a signal
quality percentage, which is eectively a measure of how clear the signal is with regards to outside noise. With signal quality ranging from
0 to 99 percent, the signal quality percentage was converted
into a signal-to-noise ratio (SNR), which is the power ratio between the signal strength and the noise level, measured in dBm, using the equation
SN R = [quality/2] − 100 We note that signal-to-noise ratio is an absolute power quantity, meaning from here, we could
8
estimate a distance between the demand point and access point by solving for
d
in the following
equation
SN R = −10blog10 (d) + M Here,
b is the path loss exponent.
2 (free space). M
Taken from (Farahani and Shahin, 2008), we assumed it to be
is the RSSI value at a reference distance. This is typically taken from a point one
meter away from a source with no obstacles between them. For the purposes of our model, because of a lack of explicit information, we took this to be the largest reported RSSI value in the dataset,
33,
which when converted from the rst steps, was equal to
−50
dBm. Thus our equation became
d = 10(−50−SN R)/20 . 4.3
Placing Users Via Trilateration
With the signal strength converted into a distance, each demand point was separated into one of three categories: those linked (i.e., have a signal strength value with) with one, two, or more access points.
For a given demand point, we could represent each signal strength distance as a radius
around each access point. Given the radius and location of each access point, we use trilateration, the process of using known locations and distances to determine another location, to estimate the locations of the demand points.
We assumed a linear rate of change among the
z
coordinates
(height) of each access point because given only access point locations and RSSI, true height could not be determined exactly; since height values did not vary signicantly, we did not include the
z -dimension
in our analysis.
In the case of three or more access points, we only used the three access points with which the demand point has the strongest signal to, coinciding with a best estimate that also guarantees the demand point, in the case of an attack, will connect to the next strongest available signal as required in the set of constraints (1e). Alongside the case of two access points, these two problems could be solved exactly by calculating either the intersection point of three circles or the external tangent point of two circles. Both of these ideas are illustrated in Figures 2a and 2b. For the case of only one access point, the demand point was assigned a random location on the circumference of the given circle. However, care was made that this location's choice was such that it was not accidentally within the range of some other access point, or else the dataset would have provided the necessary ping information. If such a random point had been chosen, a new one was selected, and the cycle was repeated until a suitable location was found. In Figure 2c, we represent the unsuitable locations within the radius of another access point with dashed lines..
4.4
Set of Potential Jammer Locations
To form the set
K
of potential jammer locations, we considered the largest and smallest
coordinates of each access point to give the boundaries of a region and divided this into a
9
x
and
y
12 × 12
(a) Three access points.
(b) Two access points.
(c) One access point.
Figure 2: Three, two, and one point trilateration. Squares represent access points, circles represent signal radius, and solid points represent demand points.
evenly spaced grid, where the corner points of the cells are the possible locations. We ltered out potential jamming locations that were able to jam only a small number of connections (less than
5%).
We assumed a jamming radius of
1, 000
locations of access points (averaging around points. Our total region measured
5
feet for each jammer, a choice coming from the given
800 feet in distance) and estimated locations of demand
11, 295 × 8, 301
in feet.
Solution Methodologies
The presented problem is an NP-hard problem because it is a more general case of the
r-interdiction
median problem [Church et al., 2004] with added constraints to account for the jammers' movements and connectivity which is itself an extension of the
p-median
problem, which was proven to
be NP-hard [Megiddo and Supowit, 1984].
As such, its solve time exponentially increases when
the dimensions of entering instances grow.
Although commercial general solvers can solve small
instances of the problem, we also employed Lagrangian relaxation, a stage decomposition heuristic approach, and a genetic algorithm for faster but sub-optimal solutions.
5.1
Lagrangian Relaxation Heuristic
As an alternative to solving our MIP formulation exactly, we employed a Lagrangian relaxation heuristic.
The general Lagrangian Relaxation procedure dualizes one or more of the constraints
in the model and then uses a subgradient technique to nd the optimal dual multiplier vector. Although this procedure is optimal for convex problems, it is not guaranteed to be optimal for integer programs, which are non-convex. In our Lagrangian procedure we dualized the set of constraints (1d), obtaining the following Lagrangian subproblem:
10
L(λ) = M in Z =
XXX i
xijt × Sijt +
XXXXX [λijklt (1 − Dijklt × yklt − xijt )]
t
j
i
j
k
(2a)
t
l
subject to:
X
xijt = 1 ∀iI, tT
(2b)
yklt = 1 ∀lL, tT
(2c)
jAit
X k
X
xiqt ≤
qTijt
X
(Dijklt × (
X
k
X
yklt )) ∀iI, jJ, tT
(2d)
l
yml(t+1) ≤ 1 − yklt
∀kK, lL, tT
(2e)
mPk The Lagrangian relaxation procedure involved repeatedly solving the Lagrangian subproblem (2), continually updating the Lagrangian multiplier vectors
λ, which must be non-positive, to maxi-
mize the resulting bound. In other words, a Lagrangian-based lower bound was obtained by solving the following optimization problem:
max L(λ).
(3)
λ≤0
To obtain a feasible we set the values of
xijt
x
vector for a
y
vector returned by solving a Lagrangian subproblem (3),
so that each demand point was assigned to a non-jammed access point with
the largest signal strength in each period. This gave a feasible solution to the original problem (1).
5.1.1 Subgradient Optimization To search for the optimal multipliers, we employed the sub-gradient method. Through trial-anderror we chose
−0.0125
as the initial value of each element of the
λ
multiplier vector. We then used
the following iterative scheme to update the multipliers:
r λr+1 ijklt = λijklt + φr (Dijklt × yklt + xijt − 1) The parameter
φr ,
(4)
a step size, was updated using the following equation (see Fisher, 1985):
φr = tr (L(λr ) − Z ∗ )/
XXXXX i
j
k
l
r (1 − Dijklt × yklt − xrijt )
(5)
t
L(λr ) is the objective value of the Lagrangian model (2) at the current multiplier value λr , ∗ and Z is the objective value of the current best known feasible solution to the original model (1). where
11
The parameter
tr ,
a scalar between
0
and
2,
started at
2
and was halved whenever
L(λr )
failed to
improve after 30 consecutive iterations.
5.2
Stage Decomposition Heuristic
The formulated problem has two distinct parts: one is the placement of jammers, and the other is the association of demand points and access points. The connecting point of the two parts of the problem in the original program is the set of constraints (1e).
Removing these constraints
allowed the problem to decompose into two separate problems: the location of the jammers and the assignment of demand points to access points.
In the rst part, maximization was done by
just taking the jamming placement into consideration. This task was accomplished by applying the jammers' placement in the set of constraints (1d) and updating the set of constraints (6c). On the other hand, the objective function of the second part of the model objective function attempted to maximize the possible impact of jamming placement when the assignments were already decided. The two decomposed models are proposed as follows:: 1. Maximize the connectivity while the jammer location variables are xed (the are the decision variables and the
yklt
xijt
variables
variables are xed):
M ax
XXX
Sijt xijt
(6a)
t
j subject to:
X
xijt = 1 ∀iI, tT
(6b)
jAit
xijt ≤ (1 − Dijklt yˆklt ) ∀iI, jJ, kK, , lL, tT
(6c)
2. Minimize the connectivity by maximizing the amount of jamming while the assignments are xed (the
xijt
variables are xed and the
M ax
yklt
variables are the decision variables):
XXXXX l
t
Sijt Dijklt )ˆ xijt yklt
(7a)
j
subject to:
X
yklt = 1 ∀lL, tT
(7b)
k
X
yml(t+1) ≤ 1 − yklt
mPk
12
∀kK, lL, tT
(7c)
Figure 3: A sample chromosome for the genetic algorithm.
Thus, the procedure was as follows:
yklt
1. Randomly assign values for solution as
that are feasible to constraints (7b); denote this random
yˆ.
2. Optimize the rst mixed-integer program with the
y
3. Optimize the second mixed-integer program with the 4. If the values of the vector
x ˆ
variables xed and denoted as
x
yˆ..
variables xed and denoted as
x ˆ.
have been found as a solution to a previous solution to model 6,
report the smallest objective function for model 6 found thus far. If not, go to step 2. With regards to step 4, it was possible that the algorithm may have converged to a sub-optimal solution. Specically, if the objective value increased between the rejected the (i
5.3
+ 1)st
ith
and (i
solution, terminated the algorithm, and reported the
+ 1)st
ith
iterations, we
solution.
Genetic Algorithm approach
In addition, we also tested a genetic algorithm for this problem. Genetic algorithms have long been used with success on a variety of combinatorial optimization problems. The fact that the GA is a random and population based algorithm helps it escape from local optima in the search for global optima.
5.3.1 Chromosome Encoding GA's chromosome based feature whose structure allows for the immediate realization of some of the constraints has made the algorithm popular. The algorithm works with a population of solutions, represented as chromosomes. We used the following chromosome structure to represent solutions to our problem. For each time period, each jamming location had an element in the chromosome. The element for a jamming location at a particular time period contained an integer that represented the jammer's location at that time period. Figure 3 shows an example of our chromosome representation for a problem with
3 jammers, 8 possible locations for the jammers with 2 periods of time.
to the solution represented by this chromosome, the rst jammer was at locations for periods one and two, the second jammer at locations
2
and
1.
7 and 8,
5 and 4 respectively
and the third jammer at locations
Thus, this chromosome translated into a solution for each variable
13
According
yklt .
5.3.2 Fitness function The tness function in our GA calculated the tness/goodness of any chromosome, serving the same purpose as the objective value in our MIP, and this value was the basis for sorting the population and giving each member the proportional level of chance to undergo crossover or mutation. However,
xijt
could not be directly computed from the chromosome as the encoding only extracted the values
for
yklt
as the calculation of the tness function determined the association between a demand
point and some access point. Every time a chromosome was passed to the tness function, decoded from the chromosome, and then
xijt
yklt
was
was assigned appropriately based on the following
procedure. The access points with which the connection was not jammed based on the calculated
yklt
and had the highest signal was associated to the considered demand points, unless there was
no unjammed signal between the demand point and any access points, in which case the demand point was associated with the dummy access point. With the calculated
xijt
values, the total signal
strength (1a) was the tness value for the entering chromosome, and every chromosome in the population had its tness value calculated independent of its genes' structure.
5.3.3 Operators: Crossover and Mutation In our GA implementation we used two procedures for ensuring population diversity: crossover and mutation. Diversity is necessary because without it the algorithm does not necessarily yield new solutions. While crossover allows for the population to move towards optimality, mutation prevents premature convergence and nding local optima.
Also, unlike mutation, crossover operates on
two chromosomes, attempting to combine the two chromosomes' characteristics to produce better ospring; to this end, we used the uniform crossover procedure (Mills et al., 2014). During mutation, a drastic change is inicted upon the chromosomes' structure with the goal of producing better solutions; here, a traditional rate-controllable mutation procedure was adopted, meaning the level of mutation was controlled and was based on each generation's solution.
5.3.4 Feasibility Check An important issue for both the crossover and mutation operations is the need for a feasibility check of exiting chromosomes (ospring in case of crossover). Often, when the population is randomly initialized, the way the procedure is designed makes sure that infeasible solutions will not be created, such as placing multiple jammers in the same location as an example of our chromosomes' structure. In this paper, the initialization of chromosomes was done in a way that preserved feasibility, but the chromosomes that had undergone crossover or mutation were prone to violation of the jammer movement constraints (1f). Therefore, the existence of a feasibility check after every mutation and crossover was crucial. At initialization of the population (except for the rst time period), the jammer placement was randomly assigned from the set of possible locations based on the parameter
R.
Furthermore, for the feasibility check that ran for the outputs of crossovers and
mutations, the jammers' placements that infringed the jammers' ranges of movement were again
14
randomly assigned from the set of possible locations. The set of constraints (1c) were enforced by the chromosome structure and all other constraints (1b,1d, and 1f) were enforced by the way tness function calculation was designed.
5.3.5 Evolutionary Iterations Figure 4 shows the main procedure for the genetic algorithm. In every iteration, the population was sorted based on the chromosomes' tness values.
Chromosome selection was based on the
roulette-wheel function, where chromosomes higher on the list had a better chance to be selected to go through crossover and mutation operations. Roulette-wheel selection was used for chromosome selection for both operators. The algorithm continued until there had been no improvement for a prespecied number of iterations.
Figure 4: Genetic algorithm owchart.
15
6
Example illustration
In this section, we present a visualization of how the model works. We considered a set of points,
15
demand points, and
points, and triangles jammers.
F.
4
time periods.
6
access
Squares represent access points, circles demand
For the sake of legibility, demand points
10-15
are labeled
A-
We include solid lines representing an established connection and a dashed line is a potential
reassignment; the numbers on line lines denote the associated RSSI. As time moves from period to
4,
1
the demand points change their position according to the data from the WTD dataset. In
pursuit of the demand points, the jammers, with a jamming radius of 250 feet, also move in order to disrupt the maximal signal strength.
The circles around each of the jammers represent their
jamming radii.
Figure 5:
An example illustration.
Time period
16
0,
the network without jamming.
Figure 6:
(a) Time period
1.
(b) Time period
2.
(c) Time period
3.
(d) Time period
4.
The example illustration, continued.
Demand points move over the four periods,
while the access points remain stationary. The jammers also move in pursuit of the demand points, seeking to minimize the total signal strength over the four periods.
Initially, in time period points.
0,
we had in our unjammed network
113.
access points and
15
demand
Demand points were each connected to their closest access points, which maximized the
total signal strength. Access point of
6
Access point
and access point
1
4
2 was connected to four demand points for a total signal strength
supplied a total signal strength of
supplied a total of
43.
112,
access point
The total signal power was
5
supplied a total of
63,
375.
During the rst time period, jammers were initially placed, causing demand points to be reas-
17
signed to other access points. In the optimal jammer placement, jammers were placed near access points
2
and
4,
likely because these were supplying a large signal strength as seen in Figure 5.
5
Notice that although demand point
has a jammed connection to access point
2,
this was not
its strongest connection, so its potential connection being jammed does not count in a total signal jammed. Also notice that demand point
1 could not obtain a signal from any demand point because
its only available access point was jammed. In addition, demand point
3
had no signal even though
its second-closest access point (6) was not jammed; this was because it was within the jamming radius of jammer period was
2;
The total signal power for time period
1
was
108.
The
3-Robustness
for
1
time
(108/375) × 100% = 28.8% 1, several demand
During the second time period, all three jammers relocated. Near access point points moved closer together which gave jammer
1
a better means of jamming several signals at
once by jamming them all directly. The total signal power for time period total unjammed signal power was
348.
2
increased to
154.
The
3-Robustness for 2 time periods was (108 + 154)/(375 +
The
348) × 100% = 36.2% During the third time period, jammer follow the movement of demand points
F,
2
5, C ,
did not move, while jammers and
E.
1
and
3
did in order to
Although other demand points, such as
B
and
moved, they did not move in such a way so as to force the jammer to move. The total signal
power for time period
3
decreased to
129.
The total unjammed signal power was
the same calculation pattern as for the previous two periods, the
3-Robustness
389. 3
for
Following
time periods
35.2%.
was
During the nal time period, all three jammers relocated again, and in this case, no access point was directly jammed.
Instead, all jammers were actively following the demand points and
jamming only them. Jammer
104.
jammed demand points
The total unjammed signal power was
3-Robustness
the
1
for
4
time periods was
380.
33.2%.
1, 2,
and
7.
The total signal power was
Similarly calculated from the previous periods,
Thus, the presence of jammers caused a
2/3
drop
in network performance.
7
Numerical experiments
7.1
Problem tractability
In this section we investigated how changing the number of access points, demand points, jammers, jamming locations, and time periods aected the run time of our solution methodologies. Table 1 shows the run time for each of the algorithms used in our project for dierent values of the number of demand points periods
|T |.
|I|,
access points
|J|,
potential jamming locations
For all experiments, we took
R = 60,
|K|,
jammers
|L|,
and time
the maximum distance a jammer may move
between two time periods. We also assumed that all jammers had the same power (and radius), but we note that the model can be easily generalized to encompass multiple types of jammers. The number of access points depended on the number of demand points because of both actual and potential connections. If demand point
1
was connected to access points
18
1, 2,
and
3,
we were
forced to include all three access points. The reverse was not true. If access point
1, 2,
with demand points
and
3,
1 had connections
we were not required to experiment on demand points
2
and
3
necessarily. Thus, our choice of the number of access points was dependent on our choice of demand points, both how many and which ones were chosen. By running all of the remaining possible combinations of considering a small or large parameter value, which added up to
16
experiments, many
insights could be gained about the computational capability of the algorithms used in this paper. For each combination, we listed the total run time for each of the four algorithms implemented: the exact approach (Exact), the stage decomposition heuristic (SDH), the genetic algorithm (GA), and the Lagrangian relaxation (LR). Bold are the best run times for each experiment. Finally, we included the percentage over the optimal solution that the SDH, GA, and LR algorithms provided, and we bold the best method. For GA, the population, crossover percentage, mutation percentage, and mutation rate values were taken to be iterations was set to
30, 70, 30, 0.4,
respectively. The maximum number of
40.
To solve the problem instances we used a Lenovo Ideapad Y510 running 64-bit Windows 8.1 on 4 dedicated Intel Core i7-4700MQ processors running at 2.4 GHz with 8 GB RAM. The Genetic Algorithm was encoded using MATLAB. The MIP model was solved using Gurobi 6.0.5 with its Python API. All other algorithms were encoded in Python 3.4, with subproblems solved with Gurobi 6.0.5. Table 1: Run times and solution percentage deviations of the algorithms. Run time (seconds) No.
|I|
|J|
|K|
|L|
|T |
1
50
27
10
2
1
2
50
27
10
2
10
3
50
27
10
5
1
4
50
27
10
5
10
5
50
27
40
2
1
6
50
27
40
2
10
7
50
27
40
5
1
8
50
27
40
5
10
9
150
63
10
2
1
10
150
63
10
2
10
11
150
63
10
5
1
12
150
63
10
5
10
13
150
63
40
2
1
14
150
63
40
2
15
150
63
40
16
150
63
40
Exact 2.6 12.5 5.4 33.6
SDH
0.2 0.5 0.3 1.3
4.4
1.0
30.4
4.6
4.2
1.3
50.5
9.7
502.6
11.2
1,702.4
115.0
607.1
14.3
2,015.4
132.6
989.3
40.0
10
2,770.5
302.5
5
1
1,021.1
86.7
5
10
2,047.5
819.2
Percentage over optimal
GA
LR
1.1
1.3
1.2
1.8
1.1
1.8
1.1 1.0 2.1 1.7
2.7 6.5 18.1 12.3 31.0 28.6 67.1 32.3 207.1
SDH
GA
LR
16.4
1.7
18.2
1.9
13.3
1.9
4.0
0.0 0.0 0.0 1.3 0.5 0.4
4.7
2.1
6.7
5.5
2.7
8.1
19.2
3.3
10.2
44.1
3.0
11.3
20.2
14.2
7.3
54.4
13.3
5.4
51.6
13.9
5.5
123.2
14.4
4.9
75.2
15.7
3.4
242.6
14.8
2.7
2.2 3.6
17.3
1.4
9.1
1.7
8.4
1.6
1.2 1.3 1.5 2.0 1.5 1.3 0.9 1.1 0.7 0.9
For small problems, the SDH algorithm ran the fastest and produced the best quality solutions. For larger problems, however, the GA ran the fastest while the LR yielded the best quality solutions. Overall, the LR heuristic yielded the best combination of solution quality and run time, especially for larger problems.
19
7.2
n-Robustness
metric computation
Here, we computed the
n-Robustness
metric from the exact solution to display how we dened
the robustness of our dataset. Table 2 shows the combinations.
That is, rows with
|L| = 2
show
n-Robustness
value for the dierent parameter
2-Robustness,
and rows with
|L| = 5
show
5-
Robustness. As the results show, there was good robustness for a single time period. Further, the robustness value decreased as more jammers and possible jammer locations were added to the network. However, as time periods increased in number, the robustness increased. Similarly, as demand points and access points increased, robustness increased as more signal connections (actual and potential) were possible and jammers had to work harder under a movement distance restriction to optimally jam the total signal strength.
Table 2:
n-Robustness metric, as %. P P n |L| |T | n−Robustness t Tt t Rt
No.
|I|
|J|
|K|
1
50
27
10
2
1
1,194
762
63.8
2
50
27
10
2
10
12,387
8,457
68.3
3
50
27
10
5
1
1,194
468
39.2
4
50
27
10
5
10
12,387
5,376
43.4
5
50
27
40
2
1
1,194
730
61.1
6
50
27
40
2
10
12,387
7,892
63.7
7
50
27
40
5
1
1,194
433
36.3
8
50
27
40
5
10
12,387
4,732
38.2
9
150
63
10
2
1
2,733
1,878
68.7
10
150
63
10
2
10
28,963
20,593
71.1
11
150
63
10
5
1
2,733
1,145
41.9
12
150
63
10
5
10
28,963
13,236
45.7
13
150
63
40
2
1
2,733
1,473
65.3
14
150
63
40
2
10
28,963
19,492
67.3
15
150
63
40
5
1
2,733
1,060
38.8
16
150
63
40
5
10
28,963
11,643
40.2
In Figure 7, we've also shown how the robustness changed as the distance restriction by having plotted
2-Robustness
over
10
time periods.
possible distance a jammer could move, in intervals of
R
changed
The horizontal axis shows the maximum
50
feet, and the vertical axis shows the
overall robustness for one time period. We produced results using the values for the variables from experiments
2, 6, 10,
and
14.
As the gure shows, as this distance increased, robustness decreased
along a sigmoid curve. Initially, jammers appeared to nd it dicult to pursue moving signals if their movement is too limited; however, as their limitations decreased, they could better move to minimize signal strength, until eventually they yielded diminishing returns in their ecacy.
20
Figure 7: Robustness versus maximum distance of jammers' possible movements.
7.2.1 Eect of access point topology on robustness We wished to explore the eects that the geographical distribution of access points has on network robustness. To this end, we compared the dataset's access point distribution to three other access point topologies. For all three topologies, we provided output for only experiments
4 and 12 because
the overall trend, as in Figure 7, remained consistent across experiments for each of the three experiments.
The rst topology distributed the access points uniformly around the perimeter.
Since this is a rectangular region, this means each side had per side and
6
or
15 or 16 (for experiment 12) access point per side.
7
(for experiment
4)
access points
We named this pattern Perimeter.
The second topology was a cross pattern, where half the access points were aligned vertically and half were aligned horizontally (13 or
14
each for experiment
4, 31
or
32
each for experiment
12),
each column or row in the center of the region; we named this pattern Cross. The third topology had a completely random distribution, and to avoid clustering, we required that every access point remained at least
150
feet away from every other access point; we named this pattern Random.
Figure 8 illustrate these distributions with
27
access points (experiment
4).
Table 3 shows the
robustness results. For all three experiments, we kept the demand point location and movement patterns the same as from the dataset. Finally, for ease of comparison, we re-provide the results of our original experiments one from experiment
4
4
and
12,
which we named Original. We made bold the two best results,
and one from experiment
12.
21
(a) Perimeter pattern
(b) Cross pattern
(c) Random pattern
Figure 8: Topology distributions
Table 3:
5-Robustness
comparison (as %) across four dierent network topologies
5 t Rt
Pattern
Experiment Number
|I|
|J|
|K|
|L|
|T |
P
Original
4
50
27
10
5
10
12,387
5,376
Perimeter
4
50
27
10
5
10
4,006
2,185
t Tt
P
5−Robustness 43.4
54.5
Cross
4
50
27
10
5
10
14,111
4,516
32.0
Random
4
50
27
10
5
10
7,227
3,830
53.0
Original
12
150
63
10
5
10
28,963
13,236
Perimeter
12
150
63
10
5
10
9,239
4,509
48.8
Cross
12
150
63
10
5
10
35,892
12,067
33.6
Random
12
150
63
10
5
10
19,454
7,332
37.7
The columns follow the same naming conventions as in Table 2.
45.7
The rst column gives the
topology name and the experiment number. The results indicate that the placing the access points along a perimeter yields the best robustness. The high robustness of the Perimeter pattern was the result of the demand distribution and movement patterns from the original dataset; because access points are on the perimeter, demand points were able to more easily access a variety of additional access points. In the original dataset the low number of connections for most demand points meant that only a few signals needed to be jammed to completely remove a demand point's connection (or minimize it if demand points could reassign to other access points); as a result, several demand points could be removed from the network. In the Perimeter pattern, however, very few demand points were able to be completely removed from the network. However, as this is a preliminary analysis, we oer the following caveats. First, the number of jammers is signicantly overshadowed by the number of access points, and having such a distribution of access points with limited movements between the jammers while demand points may move freely suggests that the jammers might not move much at all between time periods as there was not a
22
signicantly dierent total signal strength to jam, and we note that with our dataset this point was true. Also, and as an extension to the previous point, there was very low overall signal strength and thus overall low connectivity as most of the demand points were clearly not near the perimeter, suggesting further that jammers not only did not move much but did not need to move much to continue jamming maximum signal strengths. More analysis is needed not only in the topology of access point locations, but also that demand distributions and movement patterns be reected more realistically (where demand points may seek stronger signals if they do not immediately have access to any, such as if they are in the center of a region where all access points are located along the perimeter) in determining the robustness of a network in terms of its physical conguration.
7.3
Problem sensitivity analysis
7.3.1 Experimental design We also ran experiments to analyze how certain parameters inuence the optimal solution. Specically, we wished to examine how the number of jammers and possible jamming locations inuenced the total signal jammed based on where they were located. Again, we used a simple grid to dene where jammers could have been located as in Section 4.4. In all experiments, we only considered time period. For the rst two experiments, we considered a base problem instance of and
25
demand points.
1
10 access points
For the second problem instance, we considered the eects of increasing
the number of access points from
10
to
20.
For our nal problem instance, we reconsidered only
access points but increased our demand points from
25
to
50
10
and reported the third results. Thus,
relative to our base instance, we saw the impact of the numbers of jammers and their locations as we attempted to increase access points, simulating the expansion of a network, and as we attempted to increase demand points, simulating increased network activity. Respectively, we've referred to all problem instances as base, rst, and second instances.
7.3.2 Eect of the number of jammers In our rst experiment, we examined how increasing the number of jammers aects the total signal jammed, considering increasing to
30
possible locations. Figure 9 shows the results. Starting with
1
jammer and
29 by adding 2 for each run, our base trial gave us an apparent exponential curve.
Our
rst trial showed a signicantly smoother exponential curve, and our second showed a signicantly sharper exponential curve.
These results should have been expected; the rst few jammers will
immediately be placed in locations where there are the most connections, or the most activity. Once these sites were jammed, the remaining possible locations had considerably fewer signals to jam, so we saw diminishing results.
23
Figure 9: Total signal jammed versus number of jammers.
7.3.3 Eect of the number of possible jammer locations In our second experiment, we examined how increasing the number of possible jammer locations aected the total signal jammed, considering with
10
locations and increasing to
three experiments.
80
by
5
10
jammers. Figure 10 shows the results. Starting
for each run, we again saw exponential curves for all
However, these curves were signicantly atter, possibly indicating that the
number of locations were not as stressful on a network as the number of jammers themselves. In this case, the atness of the curve resulted from how increasing the number of potential locations for a jammer made the model more accurate for the jammer.
Figure 10: Total signal jammed versus number of jamming locations.
24
7.3.4 Eect of the numbers of access points and jammers In our third experiment, we examined the inuence of total signal jammed by the eects of changing both the number of access points and the number of jammers, simulating the attempts at countering a possible jamming threat by adding more access points which allows for continued network connectivity. We considered
50
demand points and
30
possible jammer locations, and we gradually
increased the number of jammers relevant to the number of access points. Specically, we began with
3
and
5
jammers as a base, and we proceeded to add
5
jammers until the number of jammers
equaled the number of access points. For example, in Figure 11a, there are increased the jammers to from
5
to
10, 15, 20,
10.
In Figure 11d, there are
and nally to
25,
10
access points, so we
25 access points, so we increased the jammers
and so forth for the others. Figures 11a through 11e show
the results.
25
(a)
10
access points.
(c)
(d)
25
20
(b)
15
access points.
(e)
30
access points.
access points.
access points.
Figure 11: Total signal jammed versus total number of jammers and access points, with points,
30
jammer locations, and
1
50 demand
time period.
Initially, in Figures 11a through 11c the plots continue to follow an exponential curve. However,
26
from Figures 11c through 11e, the curve began to take a more sigmoid (concave then convex) shape. Indeed, the gradual change can be seen through all
5 gures.
In terms of signal strength, this meant
that a smaller number of jammers initially were unable to counter the eects of the growing number of access points because the access points could be placed as they need to be, but once the jammers were placed, there were only so many locations they could be moved to. Then, once all access points were in place, jammers were quickly able to locate optimal areas of placement. The result, then, was that the number of access points mitigated the total signal lost.
However, this was only an
initial conclusion; as the number of jammers increased, the total signal lost followed the results of the previous experiments.
8
Conclusions
8.1
Discussion
Wireless networks play such an important role in areas of business, recreation, and defense that ensuring their safety is an absolute priority.
This study examines the robustness of a wireless
network via a mathematical model that considers the optimal placement of jammers to jam a network consisting of a set of xed access points and mobile demand points. In doing so, a mixed-integer programming model is developed. To solve the model, we employ a stage decomposition heuristic, Lagrangian relaxation (LR) heuristic, and a genetic algorithm (GA) as means of approaching suboptimal solutions in a shorter run time. The LR approach gives a much better sub-optimal solution, but the GA is signicantly faster in computational time. Overall the LR heuristic yields the best combination of run time and solution quality. We illustrate the model through an example, showing an initial network comprised of demand and access points and connections between them and, over four time periods, showing the optimal placement of jammers to minimize the total signal. The example demonstrates that, because jammers have a constraint on how far they can move in a given time period, initial placement of jammers is important,. Finally, we oer a metric,
n-Robustness,
should it come under attack by
n
jammers.
that gives insight to how robust a network can be We dene it in such a way that users of the metric
can have an idea on how functional a network will continue to be after or during a jamming attack as the metric shows the percentage of what total signal power remains. Our results show that our network overall robustness is in the range of
39-69%.
Also, robustness increases as time periods,
demand points, and access points increase. With regards to time periods, the jammers' distance restriction is what allows for the robustness to increase. Initially, jammers may be placed anywhere in the set of possible locations. However, although demand points may move as they are able to, jammers' distance restriction forces them to lose their ecacy if they are not allowed to keep up with the moving demand points. We present a sigmoid trend showing how robustness changes with a jammer's distance's restriction, showing that the jammers' movement only slightly decreases until their movement restriction is relaxed signicantly, and then their ability to decrease robustness
27
yields diminishing returns. The results in Section 7 give a strong indication that the number of jammers is more critical to a network's security than their locations, as evidenced by a sharper drop in total signal with fewer jammers than with fewer location possibilities. However, although the possible locations of a jammer may not directly inuence total signal loss, the atness seen in Figure 10 compared to Figure 9 suggests something else. Namely, by improving the accuracy of optimal placement for a jammer, a jammer that may be just out of range of a possible link may be able to jam said link with more accurate location choices.
Also, a set of jammers can better follow roaming demand
points, being able to continue to jam large signals as these signal carriers move. On the other hand, attempts to mitigate such an attack by increasing the number of access points only works to a point: eventually, the number of jammers will become too strong that increased access points cease to mitigate the total jammed signal with any real signicance.
8.2
Future Work
With these points in mind, we address possible future works. First, the potential location of jammers needs to be addressed. In our case, we used a simple grid approach. Placing potential locations in intelligent areas, perhaps based on signal activity density or total signal power, should be investigated. In addition, our model only considers minimizing total signal power, which is important when critical devices must maintain connectivity; another possibility is to consider disrupting the total number of access-demand point connections, regardless of total signal strength. From the defender's point-of-view, intelligent placement of jammers leads to the problem of intelligent network design such that jammers do not have easy access to key locations. In our dataset, we assumed free space, or that jammers could move freely in any direction with no obstructions and were limited only by how far they could move in any time period. Taking note of this fact, the defender could focus on the intelligent placement of obstructions, particularly if there is an additional constraint that required access points have a load capacity, meaning an access point can only establish connections with a certain number of demand points. Our model assumed no such constraint. Similarly, the placement of access points may greatly mitigate an attack. dataset, we considered a region with boundaries based on maximum and minimum
With our specic
x and y Cartesian
coordinates. Generalizing this idea, building more access points around and outside the perimeter would signicantly reduce the lost signal by an attack if many demand points are concentrated near the boundaries. Thus, it would be useful to optimize the location of access points within a defender-attacker-defender model. This idea coincides with the previously mentioned proposition of adding in a load capacity constraint, where if access points can only connect with a specic number of demand points, their locations with regards to demand point density becomes of greater importance. In reality, network connectivity consists of two primary players: attackers and defenders. Although our model considers only stationary access points with moving jammers and demand points,
28
there is also the consideration of mobile access points. In this case, a game theory approach may demystify what can happen if both attacker and defender have the means of intelligently moving their players: jammers for the attacker and access points for the defender.
References Aksen, Deniz, Sema engül Akca, and Necati Aras. capacitated facilities and demand outsourcing.
A bilevel partial interdiction problem with
Computers & Operations Research, 41:346358,
2014. Awerbuch, Baruch, Andrea Richa, and Christian Scheideler. A jamming-resistant mac protocol for single-hop wireless networks. In
Proceedings of the twenty-seventh ACM symposium on Principles
of distributed computing, ACM, pages 4554, 2008.
Hiba Baroud, José E. Ramirez-Marquez, Kash Barker, and Claudio M. Rocco. Stochastic measures of network resilience: Applications to waterway commodity ows.
Risk Analysis, 34(7):13171335,
2014. M. Basdere, N. Aras, S. Afsar, and I.K. Altinel. problem in wireless sensor networks.
A leader-follower game for the point coverage
European Journal of Industrial Engineering, 7(5):635656,
2013. Brown, Gerald G., W. Matthew Carlyle, and Robert C. Harney. project.
Operations Research, 57(4):866877, 2009.
Interdicting a nuclear-weapons
Cappanera, Paola, and Maria Paola Scaparra. Optimal allocation of protective resources in shortestpath networks.
Transportation Science, 45(1):6480, 2011.
Church, R. L., M. P. Scaparra, and R. S Middleton. Identifying critical infrastructure: the median and covering facility interdiction problems.
Annals of the Association of American Geographers,
94(3):491502, 2004. Commander, Clayton W., Panos M. Pardalos, Valeriy Ryabchenko, Sergey Sarykalin, Timofey Turko, and Stan Uryasev. Robust wireless network jamming problems.
erative Control Strategies, pages 399416, 2009.
Optimization and Coop-
Du, Wenliang, Jing Deng, Yunghsiang S. Han, Shigang Chen, and Prainod K. Varshney.
A key
INFOCOM 2004. Twenty-third AnnualJoint conference of the IEEE computer and communications societies, management scheme for wireless sensor networks using deployment knowledge.
In
volume 1. IEEE, 2004. Farahani and Shahin. Zigbee wireless networks and transceivers. pages 172173, 2008. Feng, Pan, and David P. Morton. Minimizing a stochastic maximum-reliability path. (3):111119, 2008.
29
Networks, 52
Feng, Jixing, Xin Li, Eduardo L. Pasiliao, and John M. Shea. wireless network. In
Jammer placement to partition
Globecom Workshops (GC Wkshps), pages 14871492. IEEE, 2014.
Marshall L. Fisher. An applications oriented guide to lagrangian relaxation.
Interfaces, 15(2):1021,
1985. Harald Held, Raymond Hemmecke, and David L. Woodru. A decomposition algorithm applied to planning the interdiction of stochastic networks.
Naval Research Logistics (NRL), 52(4):321328,
2005. Jiang, Shanshan, and Yuan Xue. Optimal wireless network restoration under jamming attack. In
Computer Communications and Networks, 2009. ICCCN 2009. Proceedings of 18th Internatonal Conference, pages 16. IEEE, 2009.
Law, Yee Wei, Marimuthu Palaniswami, Lodewijk Van Hoesel, Jeroen Doumen, Pieter Hartel, and Paul Havinga. Energy-ecient link-layer jamming attacks against wireless sensor network mac protocols.
ACM Transactions on Sensor Networks (TOSN), 5(1):6, 2009.
Lim, Churlzu, and J. Cole Smith. network interdiction problems.
Algorithms for discrete and continuous multicommodity ow
IIE Transactions, 39(1):1526, 2007.
Liu, Yao, Peng Ning, Huaiyu Dai, and An Liu. Randomized dierential dsss: Jamming-resistant wireless broadcast communication.
In
INFOCOM, 2010 Proceedings IEEE, pages 19. IEEE,
2010. Chaya Losada, M. Paola Scaparra, Richard L. Church, and Mark S. Daskin. The stochastic interdiction median problem with disruption intensity levels.
Annals of Operations Research, 201(1):
345365, 2012. Brian J. Lunday and Hanif D. Sherali. A dynamic network interdiction problem.
Informatica, 21
(4):553574, 2010. Ajay Malaviya, Chase Rainwater, and Thomas Sharkey. Multi-period network interdiction problems with applications to city-level drug enforcement. M. McNett and G. M. Voelker.
IIE Transactions, 44(5):368380, 2012.
Access and mobility of wireless pda users.
Mobile Computing Communications Review, 9(2):4055, 2005.
ACM SIGMOBILE
Nimrod Megiddo and Kenneth J. Supowit. On the complexity of some common geometric location problems.
SIAM journal on computing, 13(1):182196, 1984.
Mills, K. L., J. J. Filliben, and A. L. Haines. Determining relative importance and eective settings for genetic algorithm control parameters.
Evolutionary computation, 2014.
Morton, David P., Feng Pan, and Kevin J. Saeger. Models for nuclear smuggling interdiction.
Transactions, 39(1):314, 2007.
30
IIE
David P Morton. Stochastic network interdiction.
Management Science, 2011.
Wiley Encyclopedia of Operations Research and
Navda, Vishnu, Aniruddha Bohra, Samrat Ganguly, and Dan Rubenstein. Using channel hopping to increase 802.11 resilience to jamming attacks. In
INFOCOM 2007. 26th IEEE International
Conference on Computer Communications. IEEE, pages 25262530. IEEE, 2007.
Nguyen, Duy T., Yilin Shen, and My T. Thai. Detecting critical nodes in interdependent power networks for vulnerability assessment.
Smart Grid, IEEE Transactions, 4(1):151159, 2013.
Noubir, Guevara, and Guolong Lin. Low-power dos attacks in data wireless lans and countermeasures.
ACM SIGMOBILE Mobile Computing and Communications Review, 7(3):2930, 2003.
Pelechrinis, Konstantinos, Iordanis Koutsopoulos, Ioannis Broustis, and Srikanth V. Krishnamurthy. Lightweight jammer localization in wireless networks: System design and implementation.
In
Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, pages 16. IEEE, 2009. M. Afshari Rad and H. Taghizadeh Kakhki. Maximum dynamic network ow interdiction problem: New formulation and solution procedures.
Computers & Industrial Engineering, 65(4):531536,
2013. José Emmanuel Ramirez-Marquez. A bi-objective approach for shortest-path network interdiction.
Computers & Industrial Engineering, 59(2):232240, 2010.
Richa, Andrea, Christian Scheideler, Stefan Schmid, and Jin Zhang. Competitive and fair medium access despite reactive jamming. In
Distributed Computing Systems (ICDCS), 2011 31st Inter-
national Conference, pages 507516. IEEE, 2011. Salmerón, Javier, Kevin Wood, and Ross Baldick. electric power grids.
Worst-case interdiction analysis of large-scale
Power Systems, IEEE Transactions, 24(1):96104, 2009.
Javier Salmerón. Deception tactics for network interdiction: A multiobjective approach.
Networks,
60(1):4558, 2012. Satish Vadlamani, Hugh Medal, Burak Eksioglu, and Pan Li. A bi-level programming model for the wireless network jamming placement problem. In
IIE Annual Conference. Proceedings, page
1003. Institute of Industrial Engineers-Publisher, 2014. R. Kevin Wood. Deterministic network interdiction.
Mathematical and Computer Modelling, 17(2):
118, 1993. Wenyuan Xu, Wade Trappe, Yanyong Zhang, and Timothy Wood.
The feasibility of launching
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, pages 4657, 2005. and detecting jamming attacks in wireless networks.
31
Analyzing the Robustness of an Array of Wireless Access Points
Highlights 1. 2. 3. 4. 5.
A risk metric for a wireless network under attack by jammers is proposed. A multi-period mixed integer programming interdiction model is developed. Signal strength trend is negative-exponential relative to jammers and locations. UCSD dataset indicates a fairly robust network in spite of jamming. Lagrangian relaxation often finds near-optimal solutions for jammer placement.