Degree:Master of Engineering (Electronic Engineering)Keywords: jammer placement, jammer power allocation, optimisation, wireless jammers, wireless mesh networks, wireless network securityWireless networks are gaining widespread use and popularity because of their progressive increase in affordability and convenience. Owing to the improved facilitation of communication and data transfer, wireless networks are being deployed in numerous modalities, ranging from wireless local area networks, to mesh and sensor networks. Wireless Mesh Networks (WMNs) have numerous applications in both civilian and military based environments. The main disadvantage of WMNs is its susceptibility to interference and eavesdroppers that are able to intercept, and listen in on the communication between devices in the networks. Eavesdroppers can act as non-lethal weapons to combatants at war and can have dire consequences if vital information is obtained by the adversaries. As a result of the emerging and prevalent use of WMNs in military domains, protecting information contained in networks is of utmost importance in this information driven age.This study proposes a novel physical-layer based security method that utilises jammers to generate additional interference for devices that are eavesdropping on wireless network communication. The most popular method for ensuring data confidentiality is through the use of cryptographic techniques; however, as a result of the decentralised nature and power limited network nodes of WMNs, the protection scheme precludes the use of any cryptographic techniques and is only physical-layer based. The scheme involves the intelligent placement © University of Pretoria of continuous jammers in order to achieve maximum protection and data confidentiality for WMNs with multiple eavesdroppers, sources and destinations. Furthermore, the scheme is optimised in terms of the transmitting power associated with each jammer, so that the energy expended by the jammers is kept at a minimum.The security method is modelled as a minimisation mixed integer non-linear problem, and is approximated as the sequential solution of two linear optimisation sub-problems relating to the placement, and power allocation of the wireless jammers. The proposed security model is subject to constraints which ensure that sufficient interference is generated for malicious devices that seek to obtain confidential information, while legitimate communication within the network is not affected. The placement of the jammers takes the form of a multiple demand multi-dimensional knapsack problem with a minimisation objective. The power allocation problem is modelled as a linear real-valued minimisation optimisation problem.The branch-and-cut method, and the simplex method are the algorithms used for solving the placement and power allocation problems respectively. In the effort to reduce the computation time associated with solving the linear integer jammer placement problem, an alternating control tree based heuristic is also developed. The perform...