Optimal placement and power allocation for jammers in wireless mesh networks

Show simple item record

dc.contributor.advisor Maharaj, Bodhaswar Tikanath Jugpershad en
dc.contributor.coadvisor Alfa, Attahiru S. en
dc.contributor.postgraduate Lall, Shruti en
dc.date.accessioned 2016-07-29T11:01:58Z
dc.date.available 2016-07-29T11:01:58Z
dc.date.created 2016-04-15 en
dc.date.issued 2015 en
dc.description Dissertation (MEng)--University of Pretoria, 2015. en
dc.description.abstract Wireless networks are gaining widespread use and popularity because of their progressive increase in affordability and convenience. Owing to the improved facilitation of communication and data transfer, wireless networks are being deployed in numerous modalities, ranging from wireless local area networks, to mesh and sensor networks. Wireless Mesh Networks (WMNs) have numerous applications in both civilian and military based environments. The main disadvantage of WMNs is its susceptibility to interference and eavesdroppers that are able to intercept, and listen in on the communication between devices in the networks. Eavesdroppers can act as non-lethal weapons to combatants at war and can have dire consequences if vital information is obtained by the adversaries. As a result of the emerging and prevalent use of WMNs in military domains, protecting information contained in networks is of utmost importance in this information driven age. This study proposes a novel physical-layer based security method that utilises jammers to generate additional interference for devices that are eavesdropping on wireless network communication. The most popular method for ensuring data confidentiality is through the use of cryptographic techniques; however, as a result of the decentralised nature and power limited network nodes of WMNs, the protection scheme precludes the use of any cryptographic techniques and is only physical-layer based. The scheme involves the intelligent placement of continuous jammers in order to achieve maximum protection and data confidentiality for WMNs with multiple eavesdroppers, sources and destinations. Furthermore, the scheme is optimised in terms of the transmitting power associated with each jammer, so that the energy expended by the jammers is kept at a minimum. The security method is modelled as a minimisation mixed integer non-linear problem, and is approximated as the sequential solution of two linear optimisation sub-problems relating to the placement, and power allocation of the wireless jammers. The proposed security model is subject to constraints which ensure that sufficient interference is generated for malicious devices that seek to obtain confidential information, while legitimate communication within the network is not affected. The placement of the jammers takes the form of a multiple demand multi-dimensional knapsack problem with a minimisation objective. The power allocation problem is modelled as a linear real-valued minimisation optimisation problem. The branch-and-cut method, and the simplex method are the algorithms used for solving the placement and power allocation problems respectively. In the effort to reduce the computation time associated with solving the linear integer jammer placement problem, an alternating control tree based heuristic is also developed. The performance of the proposed security method and heuristic are evaluated through appropriate simulations conducted on random network instances. The performance of the proposed security scheme is shown for a number of different scenarios with varying parameters. The branch-and-cut algorithm is used to solve various cases of the jammer placement sub-problem while altering parameters such as the grid size, the number of legitimate nodes, the number of malicious eavesdropping nodes and the locations of potential jammers. The heuristic is successfully applied to large networks, demonstrating the scalability of the implementation. The performance in terms of the solution provided and the computation time associated with use of the heuristic, in comparison to the branch-and-cut algorithm, is also shown. The heuristic can perform up to 60 times faster than the branchand- cut method depending on the particular network instance, while returning a solution that is within 10% of the optimal solution. The use of the heuristic proves to be imperative in real-life large network scenarios, where an acceptable solution needs to be obtained with a low execution time. It can therefore be concluded, that for small network scenarios, where optimality in terms of the number of jamming devices required to protect an area is critical, the branch-and-cut method should be implemented. However, in scenarios where the execution time is critical, the heuristic can be used to obtain a reasonable solution within a small time limit. en
dc.description.availability Unrestricted en
dc.description.degree MEng en
dc.description.department Electrical, Electronic and Computer Engineering en
dc.description.librarian tm2016 en
dc.identifier.citation Lall, S 2015, Optimal placement and power allocation for jammers in wireless mesh networks, MEng Dissertation, University of Pretoria, Pretoria, viewed yymmdd <http://hdl.handle.net/2263/56082> en
dc.identifier.other A2016 en
dc.identifier.uri http://hdl.handle.net/2263/56082
dc.language.iso en en
dc.publisher University of Pretoria en_ZA
dc.rights © 2016 University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria.
dc.subject UCTD en
dc.title Optimal placement and power allocation for jammers in wireless mesh networks en
dc.type Dissertation en


Files in this item

This item appears in the following Collection(s)

Show simple item record