2011
DOI: 10.1007/s10514-011-9253-0
|View full text |Cite
|
Sign up to set email alerts
|

Spatial approaches to broadband jamming in heterogeneous mobile networks: a game-theoretic approach

Abstract: In this paper, we address the problem of a mobile intruder jamming the communication network in a vehicular formation. In order to understand the spatial aspect of the jamming problem, we consider a jamming model that takes into account the relative distance of the jammer from the vehicles. We formulate the problem as a zero-sum pursuitevasion game between a jammer and a team of players with players possessing heterogeneous dynamics. We use Isaacs' approach to arrive at the equations governing the optimal stra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
6
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 32 publications
0
6
0
Order By: Relevance
“…[37] was restricted to the case of 2 UAVs and a jammer, and [1] provided an extension to multiple UAVs and jammers. And in [9], we extended the results to a scenarion involving also AGVs. We have addressed the connectivity maintenance problem also in [14], but now when two mobile autonomous agents (holonomic agents) navigate in an environment containing polygonal obstacles.…”
Section: Communication Jamming and Allocation Of Resources With Applmentioning
confidence: 82%
See 1 more Smart Citation
“…[37] was restricted to the case of 2 UAVs and a jammer, and [1] provided an extension to multiple UAVs and jammers. And in [9], we extended the results to a scenarion involving also AGVs. We have addressed the connectivity maintenance problem also in [14], but now when two mobile autonomous agents (holonomic agents) navigate in an environment containing polygonal obstacles.…”
Section: Communication Jamming and Allocation Of Resources With Applmentioning
confidence: 82%
“…In a series of papers [1,9,14,16,23,28,29,30,37,40,42,44], we have brought in additional elements into the jamming scenario above such as mobility, continuous dynamics, and multiplicity of agents. In [1] and [37], we have investigated a jamming attack on the communication network of a team of unmanned aerial vehicles (UAVs) flying in a formation under a communication and a motion model for the UAVs, where communication is essential for a team of UAVs to sustain formation.…”
Section: Communication Jamming and Allocation Of Resources With Applmentioning
confidence: 99%
“…The problem of finding an algorithm to attain Nash equilibrium (NE) has inspired many researchers thanks to the vast variety of applications of differential non-cooperative games in areas such as motion planning (LaValle and Hutchinson, 1998), (LaValle, 2000), (Turnwald et al, 2014), formation control (Olfati-Saber et al, 2007), (Gu, 2007), wireless networks (Shen et al, 2014), (AlSkaif et al, 2015), mobile sensor networks (Bhattacharya and Bas ¸ar, 2011), (Gu, 2010), network security (Li et al, 2012), and demand side management in smart grid (Zhu & Bas ¸ar, 2011), (Zhu et al, 2012).…”
Section: Introductionmentioning
confidence: 99%
“…T HE problem of finding an algorithm to attain NE has inspired many researchers thanks to the vast variety of applications of differential non-cooperative games in areas such as motion planning [1], [2], [3], formation control [4], [5], wireless networks [6], [7], mobile sensor networks [8], [9], network security [10] and demand side management in smart grid [11], [12].…”
Section: Introductionmentioning
confidence: 99%