Abstract
In this paper, we address the problem of a mobile intruder jamming the communication network in a vehicular formation. In order to understand the spatial aspect of the jamming problem, we consider a jamming model that takes into account the relative distance of the jammer from the vehicles. We formulate the problem as a zero-sum pursuit-evasion game between a jammer and a team of players with players possessing heterogeneous dynamics. We use Isaacs’ approach to arrive at the equations governing the optimal strategies of the team of players. Finally, we obtain the optimal trajectories in the neighborhood of termination by numerically simulating the strategies for some variants of the problem.
Similar content being viewed by others
References
Başar, T., & Olsder, G. J. (1999). SIAM series in classics in applied mathematics. Dynamic noncooperative game theory (2nd ed.). Philadelphia: SIAM.
Bhattacharya, S., & Başar, T. (2010a). Differential game-theoretic approach to a spatial jamming problem. In Proceedings of 14th international symposium on dynamic games and applications. Banff, Canada, June 2010.
Bhattacharya, S., & Başar, T. (2010b). Game-theoretic analysis of an aerial jamming attack on a UAV communication network. In Proceedings of American control conference, Baltimore, Maryland, June 2010 (pp. 818–823).
Bhattacharya, S., & Başar, T. (2010c). Graph-theoretic approach to connectivity maintenance in mobile networks in the presence of a jammer. In Proc. 49th IEEE conference on decision and control, CDC’10, Dec. 15–17, 2010, Atlanta, GA (pp. 3560–3565).
Bhattacharya, S., & Başar, T. (2010d). Optimal strategies to evade jamming in heterogeneous mobile networks. In Proceedings of workshop on search and pursuit-evasion, Anchorage, Alaska.
Bhattacharya, S., & Başar, T. (2012). Differential game-theoretic approach to a spatial jamming problem. In Annals of the international society of dynamic games (to appear).
Bhattacharya, S., Khanafer, A., & Başar, T. (2011a). Power allocation in team jamming games in wireless ad hoc networks. In 4th international ICST workshop on game theory in communication networks (Gamecomm).
Bhattacharya, S., Khanafer, A., & Başar, T. (2011b). Switching behavior in optimal communication strategies for team jamming games under resource constraints. In IEEE conference on control applications, Denver, Colorado.
Boothby, W. M. (2003). An introduction to differentiable manifolds and Riemannian geometry. London: Academic Press.
Breakwell, J. V., & Hagedorn, P. (1979). Point capture of two evaders in succession. Journal of Optimization Theory and Applications, 27, 89–97.
Cagalj, M., Capcun, S., & Hubaux, J. P. (2007). Wormhole-based anti-jamming techniques in sensor networks. IEEE Transactions on Mobile Computing, 6, 100–114.
Chen, L. (2008). On selfish and malicious behaviours in wireless networks—a non-cooperative game theoretic approach. PhD thesis, Ecole Nationale Superieure des Telecommunications, Paris, October 2008.
Ding, X. C., Rahmani, A., & Egerstedt, M. (2009). Optimal multi-UAV convoy protection. In Conference on robot communication and configuration, April 2009 (Vol. 9, pp. 1–6).
Hagedorn, P., & Breakwell, J. V. (1976). A differential game of approach with two pursuers and one evader. Journal of Optimization Theory and Applications, 18, 15–29.
Isaacs, R. (1965). Differential games. New York: Wiley.
Khanafer, A., Bhattacharya, S., & Başar, T. (2011). Adaptive resource allocation in jamming teams using game theory*. In 7th international workshop on resource allocation and cooperation in wireless networks (RAWNET).
Krassovski, N., & Subbottin, A. (1987). Game-theoretical control problems. Moscow: Springer.
Laumond, J. P., Sekhavat, S., & Lamiraux, F. (1998). Guidelines in nonholonomic motion planning for mobile robots. Berlin: Springer.
Levchenkov, A. Y., & Pashkov, A. G. (1990). Differential game of optimal approach of two inertial pursuers to a noninertial evader. Journal of Optimization Theory and Applications, 65, 501–518.
Lewin, J. (1994). Differential games: Theory and methods for solving game problems with singular surfaces. London: Springer.
Luenberger, D. G. (1969). Optimization by vector space methods. New York: Wiley.
Mitchell, I. M., & Tomlin, C. J. (2003). Overapproximating reachable sets by Hamilton-Jacobi projections. Journal of Scientific Computing, 19, 323–346.
Noubir, G., & Lin, G. (2003). Low power denial of service attacks in data wireless lans and countermeasures.
Papadimitratos, P., & Haas, Z. J. (2002). Secure routing for mobile ad hoc networks.
Pashkov, A. G., & Terekhov, S. D. (1987). A differential game of approach with two pursuers and one evader. Journal of Optimization Theory and Applications, 55, 303–311.
Poisel, R. A. (2004). Modern communication jamming principles and techniques. Norwood: Artech.
Proakis, J. J., & Salehi, M. (2007). Digital communications. New York: McGraw-Hill.
Shankaran, S., Stipanović, D., & Tomlin, C. (2008). Collision avoidance strategies for a three player game. In International society of dynamic games, Wroclaw, Poland, July 2008.
Stipanović, D. M., Hwang, I., & Tomlin, C. J. (2004). Computation of an over-approximation of the backward reachable set using subsystem level set functions. In Dynamics of continuous, discrete and impulsive systems, Series A: Mathematical analysis (Vol. 11, pp. 399–411).
Stipanović, D. M., Shankaran, S., & Tomlin, C. (2008). Strategies for agents in multi-player pursuit-evasion games. In Eleventh international symposium on dynamic games and applications.
Stipanović, D. M., Melikyan, A. A., & Hovakimyan, N. V. (2009). Some sufficient conditions for multi-player pursuit evasion games with continuous and discrete observations. In Annals of the international society of dynamic games (Vol. 10, pp. 133–145).
Subbottin, A. (1995). Generalized solutions of first-order PDEs. The dynamical optimization perspective. Boston: Birkhäuser.
Sujit, P. B., & Beard, R. (2009). Multiple uav path planning using anytime algorithms. In Proceedings of American control conference, St. Louis, Missouri, June 2009 (pp. 2978–2983).
Tisdale, J., Kim, Z., & Hedrick, J. (2009). Autonomous UAV path planning and estimation. IEEE Robotics & Automation Magazine, 16, 35–42.
Tobias, J., & Seddon, N. (2009). Randomized pursuit-evasion with local visibility. Current Biology, 19(7), 577–582.
Tokekar, P., Karnad, N., & Isler, V. (2011). Energy-optimal velocity profiles for car-like robots. In Proc. IEEE int. conf. on robotics and automation, May (pp. 1457–1462).
Vaisbord, E. M., & Zhukovskiy, V. I. (1988). Introduction to multi-player differential games and their applications. New York: Gordon and Breach.
Walsh, S. S. R. M. G., Tilbury, D., & Laumond, J. (1994). Stabilization of trajectories for systems with nonholonomic constraints. IEEE Transactions on Automatic Control, 39(1), 216–222.
Wood, A. D., Stankovic, J. A., & Son, S. H. (2003). Jam: a jammed-area mapping service for sensor networks. In Proceedings of 24th IEEE real-time systems symposium (RTSS 03), December 2003 (pp. 286–297).
Wood, A. D., Stankovic, J. A., & Zhou, G. (2007). Deejam: Defeating energy-efficient jamming in IEEE 802.15.4 based wireless networks. In 4th annual IEEE conference on sensor, mesh and ad hoc communications and networks (SECON 07) (pp. 60–69).
Wu, X., Wood, T., Trappe, W., & Zhang, Y. (2004). Channel surfing and spatial retreats: defenses against wireless denial of service. In 3rd ACM workshop on wireless security (WiSe 04) (pp. 80–89).
Zhukovskiy, V. I., & Salukvadze, M. E. (1994). The vector valued maxmin (Vol. 193). San Diego: Academic Press.
Author information
Authors and Affiliations
Corresponding author
Additional information
This material is based upon work supported in part by the U.S. Army Research Laboratory (ARL) and the U.S. Army Research Office (ARO) under grant number W911NF-09-1-0383 and in part by the U.S. Air Force Office of Scientific Research (AFOSR) under grant number FA9550-09-1-0249.
Rights and permissions
About this article
Cite this article
Bhattacharya, S., Başar, T. Spatial approaches to broadband jamming in heterogeneous mobile networks: a game-theoretic approach. Auton Robot 31, 367–381 (2011). https://doi.org/10.1007/s10514-011-9253-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10514-011-9253-0