首页> 外文学位 >A mixed-integer programming approach for jammer placement problems for flow-jamming attacks on wireless communication networks.
【24h】

A mixed-integer programming approach for jammer placement problems for flow-jamming attacks on wireless communication networks.

机译:一种混合整数编程方法,用于解决无线通信网络上的流量阻塞攻击的干扰放置问题。

获取原文
获取原文并翻译 | 示例

摘要

In this dissertation, we study an important problem of security in wireless networks.;We study different attacks and defense strategies in general and more specifically jamming attacks. We begin the dissertation by providing a tutorial introducing the operations research community to the various types of attacks and defense strategies in wireless networks. In this tutorial, we give examples of mathematical programming models to model jamming attacks and defense against jamming attacks in wireless networks. Later we provide a comprehensive taxonomic classification of the various types of jamming attacks and defense against jamming attacks. The classification scheme will provide a one stop location for future researchers on various jamming attack and defense strategies studied in literature. This classification scheme also highlights the areas of research in jamming attack and defense against jamming attacks which have received less attention and could be a good area of focus for future research.;In the next chapter, we provide a bi-level mathematical programming model to study jamming attack and defense strategy. We solve this using a game-theoretic approach and also study the impact of power level, location of jamming device, and the number of transmission channels available to transmit data on the attack and defense against jamming attacks. We show that by increasing the number of jamming devices the throughput of the network drops by at least 7%.;Finally we study a special type of jamming attack, flow-jamming attack. We provide a mathematical programming model to solve the location of jamming devices to increase the impact of flow-jamming attacks on wireless networks. We provide a Benders decomposition algorithm along with some acceleration techniques to solve large problem instances in reasonable amount of time. We draw some insights about the impact of power, location and size of the network on the impact of flow-jamming attacks in wireless networks.
机译:本文研究了无线网络中的重要安全问题。我们研究了一般的攻击和防御策略,特别是干扰攻击。我们通过提供一个教程向操作研究社区介绍无线网络中各种类型的攻击和防御策略来开始本文。在本教程中,我们提供数学编程模型的示例,以对无线网络中的干扰攻击和防御干扰进行建模。稍后,我们对各种类型的干扰攻击以及针对干扰攻击的防御提供了全面的分类学分类。分类方案将为未来的研究人员提供一站式的位置,以研究文献中研究的各种干扰攻击和防御策略。该分类方案还突出显示了干扰攻击和抗干扰攻击的研究领域,这些领域受到的关注较少,并且可能是未来研究的重点领域。;在下一章中,我们提供了一种双层数学编程模型来研究干扰攻击和防御策略。我们使用博弈论方法解决了这一问题,还研究了功率水平,干扰设备的位置以及可用于在攻击和防御干扰攻击中传输数据的传输通道数量的影响。我们显示出,通过增加干扰设备的数量,网络的吞吐量至少下降了7%。最后,我们研究了一种特殊的干扰攻击,即流干扰攻击。我们提供了一个数学编程模型来解决干扰设备的位置,从而增加流干扰攻击对无线网络的影响。我们提供Benders分解算法以及一些加速技术,以在合理的时间内解决大型问题实例。我们对网络的功率,位置和大小的影响对无线网络中的流量阻塞攻击的影响有一些见解。

著录项

  • 作者

    Vadlamani, Satish.;

  • 作者单位

    Mississippi State University.;

  • 授予单位 Mississippi State University.;
  • 学科 Operations research.;Engineering.
  • 学位 Ph.D.
  • 年度 2015
  • 页码 140 p.
  • 总页数 140
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号