Radio Communications Interdiction Problem under deterministic and probabilistic jamming

Abstract The Radio Communications Interdiction Problem (RCIP) seeks to identify the locations of transmitters on the battlefield that will lead to a robust radio communications network by anticipating the effects of intentional radio jamming attacks used by an adversary during electronic warfare. RCIP is a sequential game defined between two opponents that target each other’s military units in a conventional warfare. First, a defender locates a limited number of transmitters on the defender’s side of the battlefield to optimize the relay of information among its units. After observing the locations of radio transmitters, an attacker locates a limited number of radio jammers on the attacker’s side to disrupt the communication network of the defender. We formulate RCIP as a binary bilevel (max–min) programming problem, present the equivalent single level formulation, and propose an exact solution method using a decomposition scheme. We enhance the performance of the algorithm by utilizing dominance relations, preprocessing, and initial starting heuristics. To reflect a more realistic jamming representation, we also introduce the probabilistic version of RCIP where a jamming probability is associated at each receiver site as a function of the prevalent jamming to signal ratios leading to an expected coverage of receivers as an objective function. We approximate the nonlinearity in the jamming probability function using a piecewise linear convex function and solve this version by adapting the decomposition algorithm constructed for RCIP. Our extensive computational results on realistic scenarios show the efficacy of the solution approaches and provide valuable tactical insights.

[1]  Arun Shankar Optimal Jammer Placement to Interdict Wireless Network Services , 2008 .

[2]  Rajan Batta,et al.  The Maximal Expected Covering Location Problem: Revisited , 1989, Transp. Sci..

[3]  Maria Paola Scaparra,et al.  Optimizing dynamic investment decisions for railway systems protection , 2016, Eur. J. Oper. Res..

[4]  R. Kevin Wood,et al.  Shortest‐path network interdiction , 2002, Networks.

[5]  Richard L. Church,et al.  Protecting Critical Assets: The r-interdiction median problem with fortification , 2007 .

[6]  Satish Vadlamani,et al.  A Bi-Level Programming Model for the Wireless Network Jamming Placement Problem , 2014 .

[7]  J. Cruz,et al.  On the Stackelberg strategy in nonzero-sum games , 1973 .

[8]  Satish Vadlamani,et al.  A mixed-integer programming approach for locating jamming devices in a flow-jamming attack , 2018, Comput. Oper. Res..

[9]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[10]  Simon R. Saunders,et al.  Antennas and Propagation for Wireless Communication Systems , 1999 .

[11]  Jonathan F. Bard,et al.  Practical Bilevel Optimization: Algorithms and Applications , 1998 .

[12]  D. Curtis Schleher,et al.  Electronic Warfare in the Information Age , 1999 .

[13]  Mark S. Daskin,et al.  A Maximum Expected Covering Location Model: Formulation, Properties and Heuristic Solution , 1983 .

[14]  David L Adamy,et al.  Ew 101: A First Course in Electronic Warfare , 2001 .

[15]  R. Kevin Wood,et al.  Deterministic network interdiction , 1993 .

[16]  Bahar Yetis Kara,et al.  Hub location under competition , 2016, Eur. J. Oper. Res..

[17]  Artur Alves Pessoa,et al.  A branch-and-cut algorithm for the discrete (r∣p)-centroid problem , 2013, Eur. J. Oper. Res..

[18]  Rakesh Nagi,et al.  Clustering Sensors in Wireless Ad Hoc Networks Operating in a Threat Environment , 2005, Oper. Res..

[19]  Panos M. Pardalos,et al.  The wireless network jamming problem , 2007, J. Comb. Optim..

[20]  Gerald G. Brown,et al.  Interdicting a Nuclear-Weapons Project , 2009, Oper. Res..

[21]  David P. Morton,et al.  Models for nuclear smuggling interdiction , 2007 .

[22]  Stephen P. Boyd,et al.  Simultaneous routing and resource allocation via dual decomposition , 2004, IEEE Transactions on Communications.

[23]  S. Dempe Annotated Bibliography on Bilevel Programming and Mathematical Programs with Equilibrium Constraints , 2003 .

[24]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[25]  Panos M. Pardalos,et al.  Jamming communication networks under complete uncertainty , 2008, Optim. Lett..

[26]  Xin Li,et al.  Jammer placement to partition wireless network , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[27]  C. D. Perttunen,et al.  Lipschitzian optimization without the Lipschitz constant , 1993 .

[28]  Hanif D. Sherali,et al.  Optimal location of transmitters for micro-cellular radio communication system design , 1996, IEEE J. Sel. Areas Commun..

[29]  David L. Alderson,et al.  Designing Interference-Robust Wireless Mesh Networks Using a Defender-Attacker-Defender Model , 2015 .

[30]  Alvin S. Lim,et al.  Jamming and anti-jamming techniques in wireless networks: a survey , 2014, Int. J. Ad Hoc Ubiquitous Comput..

[31]  Gunhak Lee,et al.  Maximal covering with network survivability requirements in wireless mesh networks , 2010, Comput. Environ. Urban Syst..

[32]  Tapan K. Sarkar,et al.  Methods for optimizing the location of base stations for indoor wireless communications , 2002 .

[33]  M. C. Roboredo,et al.  Solving bilevel combinatorial optimization as bilinear min-max optimization via a branch-and-cut algorithm , 2013 .

[34]  David L. Alderson,et al.  Fast, Effective Transmitter Placement in Wireless Mesh Networks , 2012 .

[35]  Roger M. Whitaker,et al.  On the optimality of facility location for wireless transmission infrastructure , 2004, Comput. Ind. Eng..

[36]  Hugh R. Medal The wireless network jamming problem subject to protocol interference , 2016, Networks.

[37]  Richard L. Church,et al.  A bilevel mixed-integer program for critical infrastructure protection planning , 2008, Comput. Oper. Res..

[38]  Stephan Dempe,et al.  Foundations of Bilevel Programming , 2002 .

[39]  Jaafar M. H. Elmirghani,et al.  Energy-Efficient Base Stations Locations Optimisation in an Airport Environment , 2012, 2012 Sixth International Conference on Next Generation Mobile Applications, Services and Technologies.

[40]  Jonathan F. Bard,et al.  The Mixed Integer Linear Bilevel Programming Problem , 1990, Oper. Res..

[41]  Abdullah Konak,et al.  A Game-Theoretic Genetic Algorithm for the reliable server assignment problem under attacks , 2015, Comput. Ind. Eng..

[42]  Gerald G. Brown,et al.  A defender‐attacker optimization of Port Radar surveillance , 2011 .

[43]  Musa Mammadov,et al.  Coverage in WLAN: Optimization Model and Algorithm , 2007 .

[44]  Rudolf Mathar,et al.  Optimum positioning of base stations for cellular radio networks , 2000, Wirel. Networks.

[45]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[46]  David J. Thuente,et al.  Jamming attacks in 802.11g — A cognitive radio based approach , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[47]  Martine Labbé,et al.  Bilevel programming and price setting problems , 2013, 4OR.

[48]  Eric M. Delmelle,et al.  Base station location and channel allocation in a cellular network with emergency coverage requirements , 2005, Eur. J. Oper. Res..

[49]  Patrice Marcotte,et al.  An overview of bilevel optimization , 2007, Ann. Oper. Res..

[50]  Richard L. Church,et al.  The maximal covering location problem , 1974 .

[51]  Satish Vadlamani,et al.  Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender-attacker model , 2016, Comput. Oper. Res..

[52]  J. Bard,et al.  An algorithm for the discrete bilevel programming problem , 1992 .

[53]  Yury Kochetov,et al.  Heuristic and Exact Methods for the Discrete (r |p)-Centroid Problem , 2010, EvoCOP.

[54]  Heinrich von Stackelberg,et al.  Stackelberg (Heinrich von) - The Theory of the Market Economy, translated from the German and with an introduction by Alan T. PEACOCK. , 1953 .

[55]  Omar Ben-Ayed,et al.  Bilevel linear programming , 1993, Comput. Oper. Res..

[56]  M. Willjuice Iruthayarajan,et al.  Multiobjective Mobile Antenna Location identification using evolutionary optimization algorithm , 2010, 2010 Second International conference on Computing, Communication and Networking Technologies.

[57]  Satish Vadlamani,et al.  Jamming attacks on wireless networks: A taxonomic survey , 2016 .

[58]  Marceau Coupechoux,et al.  Competitive location in cognitive radio networks , 2015, 4OR.

[59]  Enrique Alba,et al.  Optimal antenna placement using a new multi-objective chc algorithm , 2007, GECCO '07.

[60]  R. K. Wood,et al.  Bilevel Network Interdiction Models: Formulations and Solutions , 2011 .

[61]  Gerald G. Brown,et al.  A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..

[62]  Heinz Mühlenbein,et al.  ENCON: an evolutionary algorithm for the antenna placement problem , 2003 .

[63]  Necati Aras,et al.  The budget constrained r-interdiction median problem with capacity expansion , 2010, Central Eur. J. Oper. Res..

[64]  Jesse R. O'Hanley,et al.  Designing robust coverage networks to hedge against worst-case facility losses , 2008, Eur. J. Oper. Res..

[65]  Zvi Drezner,et al.  A defensive maximal covering problem on a network , 2009, Int. Trans. Oper. Res..