## Optimal strategies to evade jamming in heterogeneous mobile networks (2010)

### Cached

### Download Links

Venue: | In Proceedings of the Workshop on Search and Pursuit-Evasion |

Citations: | 9 - 9 self |

### BibTeX

@INPROCEEDINGS{Bhattacharya10optimalstrategies,

author = {Sourabh Bhattacharya},

title = {Optimal strategies to evade jamming in heterogeneous mobile networks},

booktitle = {In Proceedings of the Workshop on Search and Pursuit-Evasion},

year = {2010}

}

### OpenURL

### Abstract

Abstract — In this paper, we consider a scenario in which a mobile intruder jams the communication network in a vehicular formation. We formulate the problem as a zero-sum pursuitevasion game with players possessing heterogeneous dynamics. We use Isaacs ’ approach to derive the necessary conditions to arrive at the equations governing the saddle-point strategies of the team of players. I.

### Citations

505 | Secure Routing for Mobile Ad Hoc Networks
- Papadimitratos, Haas
- 2002
(Show Context)
Citation Context ...kets. A variety of metrics can be used to compare the effectiveness of various jamming attacks. Some of these metrics are energy efficiency, low probability of detection, and strong denial of service =-=[18]-=-,[17]. In this paper, we use the ratio of the jamming-power to the signal-power (JSR) as the metric. From [20], we have the following models for the JSR (ξ) at the receiver’s antenna. 1) R n model ξ =... |

125 |
Differential games
- Isaacs
- 1967
(Show Context)
Citation Context ...d by differential equations can be analyzed using tools from differential game theory. There is an extensive amount of research that has been done in the area of two person pursuit-evasion games [15],=-=[11]-=-. In the recent past, techniques from differential game theory have been used to analyze problems that possess potential applications for surveillance systems. In [3],[4], the authors analyze a visibi... |

105 |
Dynamic Noncooperative Game Theory, 2nd ed
- Başar, Olsder
- 1999
(Show Context)
Citation Context ...retreat are harder to compute due to the mobility of the jammer and constraints in the kinematics of the terrestrial or aerial vehicles in the formation. This attack can be modeled as a zero-sum game =-=[1]-=- between the jammer and the vehicles. Such dynamic games governed by differential equations can be analyzed using tools from differential game theory. There is an extensive amount of research that has... |

88 | JAM: A Jammed-Area Mapping Service for Sensor Networks
- Wood, Stankovic, et al.
- 2003
(Show Context)
Citation Context ...gitimate wireless devices changing the channel that they are operating on. The second strategy, spatial retreats, is a form of special evasion whereby legitimate devices move away from the jammer. In =-=[27]-=-, Wood et.al. present a distributed protocol to map jammed region so that the network can avoid routing traffic through it. The solution proposed by Cagalj et.al. [7] uses different worm holes (wired ... |

74 | Channel surfing and spatial retreats: defenses against wireless denial of service
- Wu, Wood, et al.
- 2004
(Show Context)
Citation Context ...ceiver side. Jamming attack is a well-studied and an active area of research in a wireless networks. Many defense strategies have been proposed by researchers against jamming in wireless networks. In =-=[29]-=-, Wu et.al. propose two strategies to evade jamming. The first strategy, channel surfing, is a form of spectral evasion that involves legitimate wireless devices changing the channel that they are ope... |

68 | Guidelines in nonholonomic motion planning for mobile robots', Robot Motion Planning and Control 229
- Laumond, Sekhavat, et al.
- 1998
(Show Context)
Citation Context ...and η, satisfying the constraints | W |≤ Wmax, | φ |≤ φmax and | η |≤ ηmax, are the controls of the UAV. The configuration space of the UAV is X ≃ R 3 × S 1 × S 1 . x z Fig. 1. UAV model 2) AGV: From =-=[13]-=-, we model the AGV as a car-like robot with 5-dimensional configuration space using the following dynamic equations: ˙x = v cosθ cosζ, ˙y = v sin θ cosζ ˙θ = v sin ζ, ˙v = u1, ˙ ζ = u2 where, u1 and u... |

41 | Wormhole-Based Anti-Jamming Techniques in Sensor Networks
- Cagalj, Capkun, et al.
- 2007
(Show Context)
Citation Context ...es move away from the jammer. In [27], Wood et.al. present a distributed protocol to map jammed region so that the network can avoid routing traffic through it. The solution proposed by Cagalj et.al. =-=[7]-=- uses different worm holes (wired worm holes, frequencyhopping pairs, and uncoordinated channel hopping) that lead out of the jammed region to report the alarm to the network operator. In [28], Wood e... |

37 |
Modern Communication Jamming Principles and Techniques
- Poisel
- 2004
(Show Context)
Citation Context ...metrics are energy efficiency, low probability of detection, and strong denial of service [18],[17]. In this paper, we use the ratio of the jamming-power to the signal-power (JSR) as the metric. From =-=[20]-=-, we have the following models for the JSR (ξ) at the receiver’s antenna. 1) R n model ξ = PJT GJRGRJ 10 PTGTRGRT nlog10 ( DT R D ) JR 2) Ground Reflection Propagation 3) Nicholson ξ = PJT GJRGRJ ( PT... |

32 | Overapproximating reachable sets by Hamilton-Jacobi projections
- Mitchell, Tomlin
(Show Context)
Citation Context ...lopment of numerical techniques for the computation of the value function. Recent efforts in this direction to compute an approximation of the reachable sets have been provided by Mitchell and Tomlin =-=[16]-=-, Stipanović, Hwang and Tomlin [23] and Stipanović, Sriram and Tomlin [9]. In contradistinction with the existing literature, our work analyzes the behavior of multiple vehicles in cooperative as well... |

31 | DEEJAM: defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks
- Wood, Stankovic, et al.
- 2007
(Show Context)
Citation Context ...j et.al. [7] uses different worm holes (wired worm holes, frequencyhopping pairs, and uncoordinated channel hopping) that lead out of the jammed region to report the alarm to the network operator. In =-=[28]-=-, Wood et.al. investigate how to deliberately avoid jamming in IEEE 802.15.4 based wireless networks. In [8], Lin Chen et.al. propose a strategy to introduce a special node in the network called the a... |

16 |
Differential Games: Theory and Methods for Solving Game Problems with Singular Surfaces
- Lewin
- 1994
(Show Context)
Citation Context ...verned by differential equations can be analyzed using tools from differential game theory. There is an extensive amount of research that has been done in the area of two person pursuit-evasion games =-=[15]-=-,[11]. In the recent past, techniques from differential game theory have been used to analyze problems that possess potential applications for surveillance systems. In [3],[4], the authors analyze a v... |

15 |
Game-theoretic analysis of an aerial jamming attack on a UAV communication network
- Bhattacharya, Başar
- 2010
(Show Context)
Citation Context ...e existing literature, our work analyzes the behavior of multiple vehicles in cooperative as well as non-cooperative scenarios in the presence of a malicious intruder in the communication network. In =-=[2]-=-, we envision a scenario in which an aerial jammer intrudes the communication channel in a multiple UAV formation. We model the intrusion as a continuous time pursuit-evasion game between the UAVs and... |

13 | Computation of an overapproximation of the backward reachable set using subsystem level set functions
- Stipanović, Hwang, et al.
- 2004
(Show Context)
Citation Context ... the computation of the value function. Recent efforts in this direction to compute an approximation of the reachable sets have been provided by Mitchell and Tomlin [16], Stipanović, Hwang and Tomlin =-=[23]-=- and Stipanović, Sriram and Tomlin [9]. In contradistinction with the existing literature, our work analyzes the behavior of multiple vehicles in cooperative as well as non-cooperative scenarios in th... |

9 |
Point capture of two evaders in succession
- Breakwell, Hagedorn
- 1979
(Show Context)
Citation Context ...player pursuit-evasion games. Solutions for particular multi-player games were presented by Pashkov and Terekhov [19], Levchenkov and Pashkov [14], Hagedorn and Breakwell [10], Breakwell and Hagedorn =-=[6]-=- and Sriram et.al.[22]. More general treatment of multiplayer differential games was presented by Starr and Ho [5], Bas¸ar and Olsder [11], Vaisbord and Zhukovskiy [26] and Zhukovskiy and Salukvadze [... |

9 |
Low power denial of service attacks in data wireless lans and countermeasures
- Noubir, Lin
- 2003
(Show Context)
Citation Context ... A variety of metrics can be used to compare the effectiveness of various jamming attacks. Some of these metrics are energy efficiency, low probability of detection, and strong denial of service [18],=-=[17]-=-. In this paper, we use the ratio of the jamming-power to the signal-power (JSR) as the metric. From [20], we have the following models for the JSR (ξ) at the receiver’s antenna. 1) R n model ξ = PJT ... |

8 |
On the existence of nash equilibrium for a two player pursuit-evasion game with visibility constraints
- Bhattacharya, Hutchinson
- 2009
(Show Context)
Citation Context ...erson pursuit-evasion games [15],[11]. In the recent past, techniques from differential game theory have been used to analyze problems that possess potential applications for surveillance systems. In =-=[3]-=-,[4], the authors analyze a visibility-based target-tracking problem among obstacles. The problem is formulated as a zero-sum game between the target and the observer and optimal strategies for player... |

8 |
Strategies for agents in multi-player pursuit-evasion games
- Stipanović, Tomlin
- 2008
(Show Context)
Citation Context ... Recent efforts in this direction to compute an approximation of the reachable sets have been provided by Mitchell and Tomlin [16], Stipanović, Hwang and Tomlin [23] and Stipanović, Sriram and Tomlin =-=[9]-=-. In contradistinction with the existing literature, our work analyzes the behavior of multiple vehicles in cooperative as well as non-cooperative scenarios in the presence of a malicious intruder in ... |

8 |
A differential game of approach with two pursuers and one evader
- Hagedorn, Breakwell
- 1976
(Show Context)
Citation Context ...rential game theory to multi-player pursuit-evasion games. Solutions for particular multi-player games were presented by Pashkov and Terekhov [19], Levchenkov and Pashkov [14], Hagedorn and Breakwell =-=[10]-=-, Breakwell and Hagedorn [6] and Sriram et.al.[22]. More general treatment of multiplayer differential games was presented by Starr and Ho [5], Bas¸ar and Olsder [11], Vaisbord and Zhukovskiy [26] and... |

8 |
Differential game of optimal approach of two inertial pursuers to a noninertial evader
- Levchenkov, Pashkov
- 1990
(Show Context)
Citation Context ... limited application of differential game theory to multi-player pursuit-evasion games. Solutions for particular multi-player games were presented by Pashkov and Terekhov [19], Levchenkov and Pashkov =-=[14]-=-, Hagedorn and Breakwell [10], Breakwell and Hagedorn [6] and Sriram et.al.[22]. More general treatment of multiplayer differential games was presented by Starr and Ho [5], Bas¸ar and Olsder [11], Vai... |

8 |
A differential game of approach with two pursuers and one evader
- Pashkov, Terekhov
- 1987
(Show Context)
Citation Context ...radistinction, there has been limited application of differential game theory to multi-player pursuit-evasion games. Solutions for particular multi-player games were presented by Pashkov and Terekhov =-=[19]-=-, Levchenkov and Pashkov [14], Hagedorn and Breakwell [10], Breakwell and Hagedorn [6] and Sriram et.al.[22]. More general treatment of multiplayer differential games was presented by Starr and Ho [5]... |

8 |
Multiple UAV path planning using anytime algorithms
- Sujit, Beard
- 2009
(Show Context)
Citation Context ...dynamical models are simplified to a level so as to capture the essential kinematic constraints of the system. We assume the following motion models for the nodes: 1) UAV: We use the five state model =-=[25]-=- for the UAV that takes into account the course angles, the flight path angles and the height of the UAV from the ground01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 0... |

7 |
On selfish and malicious behaviours in wireless networks - a non-cooperative game theoretic approach
- Chen
- 2008
(Show Context)
Citation Context ...opping) that lead out of the jammed region to report the alarm to the network operator. In [28], Wood et.al. investigate how to deliberately avoid jamming in IEEE 802.15.4 based wireless networks. In =-=[8]-=-, Lin Chen et.al. propose a strategy to introduce a special node in the network called the anti-jammer to drain the jammer’s energy. To achieve its goal, the anti-jammer configures the probability of ... |

6 |
Further properties of non-zereo sum differential games
- Breakwell, Hagedorn
- 1969
(Show Context)
Citation Context ...19], Levchenkov and Pashkov [14], Hagedorn and Breakwell [10], Breakwell and Hagedorn [6] and Sriram et.al.[22]. More general treatment of multiplayer differential games was presented by Starr and Ho =-=[5]-=-, Bas¸ar and Olsder [11], Vaisbord and Zhukovskiy [26] and Zhukovskiy and Salukvadze [30], and Stipanović, Hovakimyan and Melikyan [24]. The inherent hardness in obtaining an analytical solution to Ha... |

6 | Collision avoidance strategies for a three player game
- Shankaran, Stipanović, et al.
- 2008
(Show Context)
Citation Context ...n games. Solutions for particular multi-player games were presented by Pashkov and Terekhov [19], Levchenkov and Pashkov [14], Hagedorn and Breakwell [10], Breakwell and Hagedorn [6] and Sriram et.al.=-=[22]-=-. More general treatment of multiplayer differential games was presented by Starr and Ho [5], Bas¸ar and Olsder [11], Vaisbord and Zhukovskiy [26] and Zhukovskiy and Salukvadze [30], and Stipanović, H... |

5 |
Some Sufficient Conditions for MultiPlayer Pursuit-Evasion
- Stipanovic, Melikyan, et al.
- 2006
(Show Context)
Citation Context ...t of multiplayer differential games was presented by Starr and Ho [5], Bas¸ar and Olsder [11], Vaisbord and Zhukovskiy [26] and Zhukovskiy and Salukvadze [30], and Stipanović, Hovakimyan and Melikyan =-=[24]-=-. The inherent hardness in obtaining an analytical solution to Hamilton-Jacobi-Isaacs equation has led to the development of numerical techniques for the computation of the value function. Recent effo... |

4 |
Game-theoretic analysis of a visibility based pursuit-evasion game in the presence of obstacles
- Bhattacharya, Hutchinson, et al.
- 2009
(Show Context)
Citation Context ...n pursuit-evasion games [15],[11]. In the recent past, techniques from differential game theory have been used to analyze problems that possess potential applications for surveillance systems. In [3],=-=[4]-=-, the authors analyze a visibility-based target-tracking problem among obstacles. The problem is formulated as a zero-sum game between the target and the observer and optimal strategies for players ar... |

4 |
The Vector Valued Maxmin, volume 193
- Zhukovskiy, Salukvadze
- 1994
(Show Context)
Citation Context ...] and Sriram et.al.[22]. More general treatment of multiplayer differential games was presented by Starr and Ho [5], Bas¸ar and Olsder [11], Vaisbord and Zhukovskiy [26] and Zhukovskiy and Salukvadze =-=[30]-=-, and Stipanović, Hovakimyan and Melikyan [24]. The inherent hardness in obtaining an analytical solution to Hamilton-Jacobi-Isaacs equation has led to the development of numerical techniques for the ... |

2 |
Lion and man game in the presence of a circular obstacle
- Karnad, Isler
- 2009
(Show Context)
Citation Context ...problem among obstacles. The problem is formulated as a zero-sum game between the target and the observer and optimal strategies for players are computed using tools from differential game theory. In =-=[12]-=-, tools from differential game theory are used to analyze the lion and the man problem in the presence of a circular obstacle in the environment. In contradistinction, there has been limited applicati... |