Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer

In this work, we analyze the problem of maintaining connectivity in a network of mobile agents in the presence of a jammer. This is a variation of the standard connectivity maintenance problem in which the issue arises due to limitations in communications and sensing model for each agent. In our work, the limitations in communications are due to the presence of a jammer in the vicinity of the mobile agents. First, we present a differential game-theoretic formulation of the problem and provide the necessary conditions for optimal controls for each agent. Then we present a model that constructs a state-dependent graph based on the state-space of the agents. We use tools from algebraic-graph theory on the state-dependent graph in order to provide locally optimal control laws for the agents in the formation. Finally, we present some simulations to validate the proposed control scheme.

[1]  George J. Pappas,et al.  Flocking in Fixed and Switching Networks , 2007, IEEE Transactions on Automatic Control.

[2]  Ian M. Mitchell,et al.  Overapproximating Reachable Sets by Hamilton-Jacobi Projections , 2003, J. Sci. Comput..

[3]  Meng Ji,et al.  Distributed Formation Control While Preserving Connectedness , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.

[4]  R. Murray,et al.  Robust connectivity of networked vehicles , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[5]  P. Varaiya,et al.  Differential games , 1971 .

[6]  Richard M. Murray,et al.  Consensus problems in networks of agents with switching topology and time-delays , 2004, IEEE Transactions on Automatic Control.

[7]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[8]  Francesco Bullo,et al.  Maintaining limited-range connectivity among second-order agents , 2006 .

[9]  Inseok Hwang,et al.  Computation of an over-approximation of the backward reachable set using subsystem level set functions , 2003, 2003 European Control Conference (ECC).

[10]  Vladimir Igorevich Arnold,et al.  Geometrical Methods in the Theory of Ordinary Differential Equations , 1983 .

[11]  Magnus Egerstedt,et al.  Graph Theoretic Methods in Multiagent Networks , 2010, Princeton Series in Applied Mathematics.

[12]  Lin Chen,et al.  On Selfish and Malicious Behaviors in Wireless Networks - a Non-cooperative Game Theoretic Approach. (Sur les Comportements Égoïstes et Malveillants dans les Réseaux sans Fil - une Approche base sur la Théorie des Jeux Non-coopératifs) , 2008 .

[13]  Meng Ji,et al.  Connectedness preserving distributed coordination control over dynamic graphs , 2005, Proceedings of the 2005, American Control Conference, 2005..

[14]  Guevara Noubir,et al.  Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.

[15]  T. Başar,et al.  Optimal Strategies to Evade Jamming in Heterogeneous Mobile Networks , 2010 .

[16]  George J. Pappas,et al.  Distributed connectivity control of mobile networks , 2007, 2007 46th IEEE Conference on Decision and Control.

[17]  M. Mesbahi On State-dependent dynamic graphs and their controllability properties , 2005, IEEE Transactions on Automatic Control.

[18]  HubauxJean-Pierre,et al.  Wormhole-Based Antijamming Techniques in Sensor Networks , 2007 .

[19]  Vijay Kumar,et al.  Maintaining Connectivity in Mobile Robot Networks , 2008, ISER.

[20]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[21]  Norman Biggs Algebraic Graph Theory: Index , 1974 .

[22]  Ali Jadbabaie,et al.  Decentralized Control of Connectivity for Multi-Agent Systems , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.

[23]  Srdjan Capkun,et al.  Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[24]  Richard A. Poisel,et al.  Modern Communications Jamming Principles and Techniques , 2003 .

[25]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[26]  Gang Zhou,et al.  DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[27]  S Bhattacharya,et al.  Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.

[28]  Richard M. Murray,et al.  INFORMATION FLOW AND COOPERATIVE CONTROL OF VEHICLE FORMATIONS , 2002 .

[29]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[30]  George J. Pappas,et al.  Controlling Connectivity of Dynamic Graphs , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.

[31]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[32]  George J. Pappas,et al.  Potential Fields for Maintaining Connectivity of Mobile Networks , 2007, IEEE Transactions on Robotics.

[33]  Vijay Kumar,et al.  Connectivity management in mobile robot teams , 2008, 2008 IEEE International Conference on Robotics and Automation.