Skip to main content
Log in

Spatial approaches to broadband jamming in heterogeneous mobile networks: a game-theoretic approach

  • Published:
Autonomous Robots Aims and scope Submit manuscript

Abstract

In this paper, we address the problem of a mobile intruder jamming the communication network in a vehicular formation. In order to understand the spatial aspect of the jamming problem, we consider a jamming model that takes into account the relative distance of the jammer from the vehicles. We formulate the problem as a zero-sum pursuit-evasion game between a jammer and a team of players with players possessing heterogeneous dynamics. We use Isaacs’ approach to arrive at the equations governing the optimal strategies of the team of players. Finally, we obtain the optimal trajectories in the neighborhood of termination by numerically simulating the strategies for some variants of the problem.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Başar, T., & Olsder, G. J. (1999). SIAM series in classics in applied mathematics. Dynamic noncooperative game theory (2nd ed.). Philadelphia: SIAM.

    MATH  Google Scholar 

  • Bhattacharya, S., & Başar, T. (2010a). Differential game-theoretic approach to a spatial jamming problem. In Proceedings of 14th international symposium on dynamic games and applications. Banff, Canada, June 2010.

    Google Scholar 

  • Bhattacharya, S., & Başar, T. (2010b). Game-theoretic analysis of an aerial jamming attack on a UAV communication network. In Proceedings of American control conference, Baltimore, Maryland, June 2010 (pp. 818–823).

    Google Scholar 

  • Bhattacharya, S., & Başar, T. (2010c). Graph-theoretic approach to connectivity maintenance in mobile networks in the presence of a jammer. In Proc. 49th IEEE conference on decision and control, CDC’10, Dec. 15–17, 2010, Atlanta, GA (pp. 3560–3565).

    Chapter  Google Scholar 

  • Bhattacharya, S., & Başar, T. (2010d). Optimal strategies to evade jamming in heterogeneous mobile networks. In Proceedings of workshop on search and pursuit-evasion, Anchorage, Alaska.

    Google Scholar 

  • Bhattacharya, S., & Başar, T. (2012). Differential game-theoretic approach to a spatial jamming problem. In Annals of the international society of dynamic games (to appear).

  • Bhattacharya, S., Khanafer, A., & Başar, T. (2011a). Power allocation in team jamming games in wireless ad hoc networks. In 4th international ICST workshop on game theory in communication networks (Gamecomm).

    Google Scholar 

  • Bhattacharya, S., Khanafer, A., & Başar, T. (2011b). Switching behavior in optimal communication strategies for team jamming games under resource constraints. In IEEE conference on control applications, Denver, Colorado.

    Google Scholar 

  • Boothby, W. M. (2003). An introduction to differentiable manifolds and Riemannian geometry. London: Academic Press.

    Google Scholar 

  • Breakwell, J. V., & Hagedorn, P. (1979). Point capture of two evaders in succession. Journal of Optimization Theory and Applications, 27, 89–97.

    Article  MathSciNet  MATH  Google Scholar 

  • Cagalj, M., Capcun, S., & Hubaux, J. P. (2007). Wormhole-based anti-jamming techniques in sensor networks. IEEE Transactions on Mobile Computing, 6, 100–114.

    Article  Google Scholar 

  • Chen, L. (2008). On selfish and malicious behaviours in wireless networks—a non-cooperative game theoretic approach. PhD thesis, Ecole Nationale Superieure des Telecommunications, Paris, October 2008.

  • Ding, X. C., Rahmani, A., & Egerstedt, M. (2009). Optimal multi-UAV convoy protection. In Conference on robot communication and configuration, April 2009 (Vol. 9, pp. 1–6).

    Google Scholar 

  • Hagedorn, P., & Breakwell, J. V. (1976). A differential game of approach with two pursuers and one evader. Journal of Optimization Theory and Applications, 18, 15–29.

    Article  MathSciNet  MATH  Google Scholar 

  • Isaacs, R. (1965). Differential games. New York: Wiley.

    MATH  Google Scholar 

  • Khanafer, A., Bhattacharya, S., & Başar, T. (2011). Adaptive resource allocation in jamming teams using game theory*. In 7th international workshop on resource allocation and cooperation in wireless networks (RAWNET).

    Google Scholar 

  • Krassovski, N., & Subbottin, A. (1987). Game-theoretical control problems. Moscow: Springer.

    Google Scholar 

  • Laumond, J. P., Sekhavat, S., & Lamiraux, F. (1998). Guidelines in nonholonomic motion planning for mobile robots. Berlin: Springer.

    Book  Google Scholar 

  • Levchenkov, A. Y., & Pashkov, A. G. (1990). Differential game of optimal approach of two inertial pursuers to a noninertial evader. Journal of Optimization Theory and Applications, 65, 501–518.

    Article  MathSciNet  MATH  Google Scholar 

  • Lewin, J. (1994). Differential games: Theory and methods for solving game problems with singular surfaces. London: Springer.

    Google Scholar 

  • Luenberger, D. G. (1969). Optimization by vector space methods. New York: Wiley.

    MATH  Google Scholar 

  • Mitchell, I. M., & Tomlin, C. J. (2003). Overapproximating reachable sets by Hamilton-Jacobi projections. Journal of Scientific Computing, 19, 323–346.

    Article  MathSciNet  MATH  Google Scholar 

  • Noubir, G., & Lin, G. (2003). Low power denial of service attacks in data wireless lans and countermeasures.

  • Papadimitratos, P., & Haas, Z. J. (2002). Secure routing for mobile ad hoc networks.

  • Pashkov, A. G., & Terekhov, S. D. (1987). A differential game of approach with two pursuers and one evader. Journal of Optimization Theory and Applications, 55, 303–311.

    Article  MathSciNet  MATH  Google Scholar 

  • Poisel, R. A. (2004). Modern communication jamming principles and techniques. Norwood: Artech.

    Google Scholar 

  • Proakis, J. J., & Salehi, M. (2007). Digital communications. New York: McGraw-Hill.

    Google Scholar 

  • Shankaran, S., Stipanović, D., & Tomlin, C. (2008). Collision avoidance strategies for a three player game. In International society of dynamic games, Wroclaw, Poland, July 2008.

    Google Scholar 

  • Stipanović, D. M., Hwang, I., & Tomlin, C. J. (2004). Computation of an over-approximation of the backward reachable set using subsystem level set functions. In Dynamics of continuous, discrete and impulsive systems, Series A: Mathematical analysis (Vol. 11, pp. 399–411).

    Google Scholar 

  • Stipanović, D. M., Shankaran, S., & Tomlin, C. (2008). Strategies for agents in multi-player pursuit-evasion games. In Eleventh international symposium on dynamic games and applications.

    Google Scholar 

  • Stipanović, D. M., Melikyan, A. A., & Hovakimyan, N. V. (2009). Some sufficient conditions for multi-player pursuit evasion games with continuous and discrete observations. In Annals of the international society of dynamic games (Vol. 10, pp. 133–145).

    Google Scholar 

  • Subbottin, A. (1995). Generalized solutions of first-order PDEs. The dynamical optimization perspective. Boston: Birkhäuser.

    Google Scholar 

  • Sujit, P. B., & Beard, R. (2009). Multiple uav path planning using anytime algorithms. In Proceedings of American control conference, St. Louis, Missouri, June 2009 (pp. 2978–2983).

    Google Scholar 

  • Tisdale, J., Kim, Z., & Hedrick, J. (2009). Autonomous UAV path planning and estimation. IEEE Robotics & Automation Magazine, 16, 35–42.

    Article  Google Scholar 

  • Tobias, J., & Seddon, N. (2009). Randomized pursuit-evasion with local visibility. Current Biology, 19(7), 577–582.

    Article  Google Scholar 

  • Tokekar, P., Karnad, N., & Isler, V. (2011). Energy-optimal velocity profiles for car-like robots. In Proc. IEEE int. conf. on robotics and automation, May (pp. 1457–1462).

    Google Scholar 

  • Vaisbord, E. M., & Zhukovskiy, V. I. (1988). Introduction to multi-player differential games and their applications. New York: Gordon and Breach.

    Google Scholar 

  • Walsh, S. S. R. M. G., Tilbury, D., & Laumond, J. (1994). Stabilization of trajectories for systems with nonholonomic constraints. IEEE Transactions on Automatic Control, 39(1), 216–222.

    Article  MathSciNet  MATH  Google Scholar 

  • Wood, A. D., Stankovic, J. A., & Son, S. H. (2003). Jam: a jammed-area mapping service for sensor networks. In Proceedings of 24th IEEE real-time systems symposium (RTSS 03), December 2003 (pp. 286–297).

    Google Scholar 

  • Wood, A. D., Stankovic, J. A., & Zhou, G. (2007). Deejam: Defeating energy-efficient jamming in IEEE 802.15.4 based wireless networks. In 4th annual IEEE conference on sensor, mesh and ad hoc communications and networks (SECON 07) (pp. 60–69).

    Chapter  Google Scholar 

  • Wu, X., Wood, T., Trappe, W., & Zhang, Y. (2004). Channel surfing and spatial retreats: defenses against wireless denial of service. In 3rd ACM workshop on wireless security (WiSe 04) (pp. 80–89).

    Google Scholar 

  • Zhukovskiy, V. I., & Salukvadze, M. E. (1994). The vector valued maxmin (Vol. 193). San Diego: Academic Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sourabh Bhattacharya.

Additional information

This material is based upon work supported in part by the U.S. Army Research Laboratory (ARL) and the U.S. Army Research Office (ARO) under grant number W911NF-09-1-0383 and in part by the U.S. Air Force Office of Scientific Research (AFOSR) under grant number FA9550-09-1-0249.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bhattacharya, S., Başar, T. Spatial approaches to broadband jamming in heterogeneous mobile networks: a game-theoretic approach. Auton Robot 31, 367–381 (2011). https://doi.org/10.1007/s10514-011-9253-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10514-011-9253-0

Keywords

Navigation