Designing interference-robust wireless mesh network using a defender-attacker-defender model
Nicholas, Paul J.
Alderson, David L.
MetadataShow full item record
Wireless mesh networks (WMNs) are interconnected systems of wireless access points (APs) that provide untethered network connectivity for a group of users who require data, voice, and/or video communication. The wireless access medium of a WMN makes it particularly vulnerable to attack and exploitation. We seek a method for quickly designing WMN physical topologies (i.e., the placement of APs) that are robust to the effects of electromagnetic jamming. The conflicting interests of a network designer and attacker in respectively maximizing and minimizing network performance make this problem a natural candidate for the use of game theory. We apply the game theoretic defender-attacker-defender (DAD) methodology to the simultaneous routing, resource allocation, and coverage (SRRA+C) model of WMN performance to simulate the design, attack, and operation of a WMN. Our algorithm and associated decision-support tool can quickly prescribe jamming-robust WMN topologies that minimize the worst possible damage that an adversary can inflict. Our approach considers radio-operating characteristics, the relative importance of client coverage and network flow, and the effects of radio propagation over terrain. To our knowledge, we are the first to use an algorithm with proven global convergence to design jamming-robust WMNs, and the first to apply the DAD framework to the problem of WMN design.
Approved for public release; distribution in unlimited.Prepared for: Office of Naval Research, 875 N. Randolph Street, Arlington, VA 22203
NPS Report NumberNPS-OR-15-002
Showing items related by title, author, creator and subject.
Mitigating risk to DOD information networks by improving network security in third-party information networks Kansteiner, Michael J. (Monterey, California: Naval Postgraduate School, 2016-06);Poorly defended third-party information networks can act as an attack vector for cyber attackers to successfully breach larger and more robustly defended information networks. Therefore, third-party networks connecting to ...
Babick, John P. (Monterey, California. Naval Postgraduate School, 2009-09);We introduce a new way to perform network analysis on critical infrastructure that is superior to Risk Analysis and Management for Critical Asset Protection (RAMCAP), currently used by the Department of Homeland Security. ...
Courtney, David W.; Thulasiraman, Preetha (2016);Tactical wireless sensor networks (WSN) consist of power constrained devices spread throughout a region of interest to provide data extraction in real time. The main challenges to the deployment of tactical WSNs for ...