Jammer placement to partition wireless network

Wireless communication systems are susceptible to jamming attacks, and the use of unmanned vehicles brings new opportunities for coordinated jamming attacks. At the same time, systems of autonomous vehicles that coordinate their movements over a wireless network may be particularly vulnerable to jamming attacks that disrupt the control information. Much research has been conducted on how to efficiently jam single communication links and how to protect such links from jamming. However, less research has focused on problems of jamming attacks on the overall network. In this paper, we consider the problem of determining how to efficiently position jammers so as to partition a wireless network. The communication network is represented as a graph with the vertices representing the radios, and the edges representing the communication links. Although there has been extensive research into the problem of efficiently partitioning a graph via edge separators, the action of a jammer in a wireless network is more closely analogous to blocking reception at one or more radios, which may be modeled as partitioning a graph via node separators. We formulate several optimization problems for jammer placement. Since the optimal solution to these problems are computationally complex, we develop suboptimal solutions using spectral partitioning followed by greedy jammer placement and also a harmony search. The results show that these algorithms offer a tradeoff between complexity and performance. In the scenarios where we were able to compare performance with the optimal solution, the harmony search algorithm offered performance close to that of the optimal solution while requiring a much lower complexity.

[1]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[2]  Guevara Noubir,et al.  Quantifying the Impact of Efficient Cross-Layer Jamming Attacks via Network Traffic Flows , 2022 .

[3]  Alex Pothen,et al.  PARTITIONING SPARSE MATRICES WITH EIGENVECTORS OF GRAPHS* , 1990 .

[4]  Curt Jones,et al.  Finding Good Approximate Vertex and Edge Partitions is NP-Hard , 1992, Inf. Process. Lett..

[5]  Mathew D. Penrose,et al.  Random Geometric Graphs , 2003 .

[6]  S.,et al.  An Efficient Heuristic Procedure for Partitioning Graphs , 2022 .

[7]  Ali Kaveh,et al.  Solving the conditional and unconditional p-center problem with modified harmony search: A real case study , 2011 .

[8]  John M. Shea,et al.  Energy-efficient jamming attack in IEEE 802.11 MAC , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[9]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[10]  David S. Johnson,et al.  Some Simplified NP-Complete Graph Problems , 1976, Theor. Comput. Sci..

[11]  H. B. Russell,et al.  Routing in frequency-hop packet radio networks with partial-band jamming , 1990, Conference Proceedings on Tactical Communications, Vol.1..

[12]  Wayne E. Stark,et al.  Performance of Reed-Solomon Coded Frequency-Hop Spread-Spectrum Communications in Partial-Band Interference , 1985, IEEE Trans. Commun..

[13]  Patrick Tague,et al.  Stochastic optimization of flow-jamming attacks in multichannel wireless networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[14]  Jitendra Malik,et al.  Normalized cuts and image segmentation , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[15]  Patrick Tague,et al.  MeshJam: Intelligent Jamming Attack and Defense in IEEE 802.11s Wireless Mesh Networks , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.

[16]  Xin-She Yang Harmony Search as a Metaheuristic Algorithm , 2009 .

[17]  Loukas Lazos,et al.  Selective Jamming Attacks in Wireless Networks , 2010, 2010 IEEE International Conference on Communications.

[18]  Patrick Tague,et al.  Improving anti-jamming capability and increasing jamming impact with mobility control , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).

[19]  Satyajayant Misra,et al.  Measures and Countermeasures for Null Frequency Jamming of On-Demand Routing Protocols in Wireless Ad Hoc Networks , 2012, IEEE Transactions on Wireless Communications.

[20]  Maxim Raya,et al.  DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.

[21]  Zong Woo Geem,et al.  A New Heuristic Optimization Algorithm: Harmony Search , 2001, Simul..

[22]  Joseph W. H. Liu,et al.  Using domain decomposition to find graph bisectors , 1997 .