Abstract
We extend the results presented in a previous paper which focused on deterministic formulations of the wireless network jamming problem. This problem seeks to determine the optimal number and placement locations for a set of wireless jamming devices to sufficiently suppress a communication network according to some specified criterion. We now introduce robust variants of those formulations which account for the fact that the exact topology of the network to be jammed may not be known entirely. Particularly, we consider instances in which several topologies are considered likely, and develop robust scenarios for placing jamming devices which are able to suppress the network regardless of which candidate topology is realized. We derive several formulations and include percentile constraints to account for a variety of scenarios. Case studies are presented and the results are analyzed. We conclude with directions of future research.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Arulselvan, A., Commander, C.W., Elefteriadou, L., Pardalos, P.M.: Detecting critical nodes in social networks. Computers and Operations Research (accepted, 2008)
Arulselvan, A., Commander, C.W., Pardalos, P.M., Shylo, O.: Managing network risk via critical node identification. In: Gulpinar, N., Rustem, B. (eds.) Risk Management in Telecommunication Networks. Springer, Heidelberg (submitted, 2007)
Boginski, V., Commander, C.W.: Detecting critical nodes in protein-protein interaction networks. In: Butenko, S.I., Chaovilitwongse, W.A., Pardalos, P.M. (eds.) Clustering Challenges in Biological Networks. World Scientific, Singapore (to appear, 2008)
Commander, C.W.: Optimization Problems in Telecommunications with Military Applications. Ph.D. Dissertation, University of Florida (2007)
Commander, C.W., Pardalos, P.M., Ryabchenko, V., Shylo, O., Uryasev, S.: Jamming communication networks under complete uncertainty. Optimization Letters 2(1), 53–70 (2008)
Commander, C.W., Pardalos, P.M., Ryabchenko, V., Uryasev, S.: The wireless network jamming problem. Journal of Combinatorial Optimization 14(4), 481–498 (2007)
Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W.H. Freeman and Company, New York (1979)
Holton, G.: Value-at-Risk: Theory and Practice. Academic Press, London (2003)
King, J.: Three problems in search of a measure. American Mathematical Monthly 101, 609–628 (1994)
Krokhmal, P., Palmquist, J., Uryasev, S.: Portfolio optimization with conditional value-at-risk objective and constraints. The Journal of Risk 4(2), 11–27 (2002)
Peake, J.B.: Beyond the Purple Heart - Continuity of care for the wounded in Iraq. New England Journal of Medicine 352(3), 219–222 (2005)
Resende, M.G.C., Pardalos, P.M.: Handbook of Optimization in Telecommunications. Springer, Heidelberg (2006)
Rockafellar, R.T., Uryasev, S.: Optimization of conditional value-at-risk. The Journal of Risk 2(3), 21–41 (2000)
Rockafellar, R.T., Uryasev, S.: Conditional value-at-risk for general loss distributions. Journal of Banking and Finance 26, 1443–1471 (2002)
Uryasev, S.: Conditional value-at-risk: Optimization algorithms and applications. Financial Engineering News 14, 1–5 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Commander, C.W., Pardalos, P.M., Ryabchenko, V., Sarykalin, S., Turko, T., Uryasev, S. (2009). Robust Wireless Network Jamming Problems. In: Hirsch, M.J., Commander, C.W., Pardalos, P.M., Murphey, R. (eds) Optimization and Cooperative Control Strategies. Lecture Notes in Control and Information Sciences, vol 381. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88063-9_23
Download citation
DOI: https://doi.org/10.1007/978-3-540-88063-9_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88062-2
Online ISBN: 978-3-540-88063-9
eBook Packages: EngineeringEngineering (R0)