2007
DOI: 10.1007/s11590-006-0043-0
|View full text |Cite
|
Sign up to set email alerts
|

Jamming communication networks under complete uncertainty

Abstract: ABSTRACT. This paper describes a problem of interdicting/jamming wireless communication networks in uncertain environments. Jamming communication networks is an important problem with many applications, but has received relatively little attention in the literature. Most of the work on network interdiction is focused on preventing jamming and analyzing network vulnerabilities. Here, we consider the case where there is no information about the network to be jammed. Thus, the problem is reduced to jamming all po… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
31
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(31 citation statements)
references
References 9 publications
0
31
0
Order By: Relevance
“…Our setting, by contrast, allows for the region to be covered to be the union of arbitrary basic semialgebraic sets (see, e.g., Figure 1(a)); this obviously enhances the modeling power. We should also comment that neither our work, nor the works in [16] and [15], satisfactorily address the more difficult problem of optimizing over the location of the transmitters.…”
mentioning
confidence: 87%
See 3 more Smart Citations
“…Our setting, by contrast, allows for the region to be covered to be the union of arbitrary basic semialgebraic sets (see, e.g., Figure 1(a)); this obviously enhances the modeling power. We should also comment that neither our work, nor the works in [16] and [15], satisfactorily address the more difficult problem of optimizing over the location of the transmitters.…”
mentioning
confidence: 87%
“…The problem we describe is motivated by some interesting and relatively recent work in [16], [15] (see also the thesis [14]), where the motivation is instead to jam the communication network of an adversary with a wireless transmitter. We note, however, that there are a few differences between our setting and that of [16] and [15], the main one being the assumption about the region to be covered.…”
mentioning
confidence: 99%
See 2 more Smart Citations
“…Using a probability of distribution and a mathematical proof, the authors proved that the optimal strategy for the attacker tends to be rather mild and long-term. Commander et al (2008) use a dynamic approach to compute the location for placing jamming devices by integrating the bounds of the area to be jammed. They assume a square-shaped area encloses the network where the jammers are placed at the intersections of a uniform grid.…”
Section: Optimal Jamming Attacksmentioning
confidence: 99%