402 research outputs found

    A Mixed-Integer Programming Approach for Jammer Placement Problems for Flow-Jamming Attacks on Wireless Communication Networks

    Get PDF
    In this dissertation, we study an important problem of security in wireless networks. We study different attacks and defense strategies in general and more specifically jamming attacks. We begin the dissertation by providing a tutorial introducing the operations research community to the various types of attacks and defense strategies in wireless networks. In this tutorial, we give examples of mathematical programming models to model jamming attacks and defense against jamming attacks in wireless networks. Later we provide a comprehensive taxonomic classification of the various types of jamming attacks and defense against jamming attacks. The classification scheme will provide a one stop location for future researchers on various jamming attack and defense strategies studied in literature. This classification scheme also highlights the areas of research in jamming attack and defense against jamming attacks which have received less attention and could be a good area of focus for future research. In the next chapter, we provide a bi-level mathematical programming model to study jamming attack and defense strategy. We solve this using a game-theoretic approach and also study the impact of power level, location of jamming device, and the number of transmission channels available to transmit data on the attack and defense against jamming attacks. We show that by increasing the number of jamming devices the throughput of the network drops by at least 7%. Finally we study a special type of jamming attack, flow-jamming attack. We provide a mathematical programming model to solve the location of jamming devices to increase the impact of flow-jamming attacks on wireless networks. We provide a Benders decomposition algorithm along with some acceleration techniques to solve large problem instances in reasonable amount of time. We draw some insights about the impact of power, location and size of the network on the impact of flow-jamming attacks in wireless networks

    A Mixed-Integer Programming Approach for Jammer Placement Problems for Flow-Jamming Attacks on Wireless Communication Networks

    Get PDF
    In this dissertation, we study an important problem of security in wireless networks. We study different attacks and defense strategies in general and more specifically jamming attacks. We begin the dissertation by providing a tutorial introducing the operations research community to the various types of attacks and defense strategies in wireless networks. In this tutorial, we give examples of mathematical programming models to model jamming attacks and defense against jamming attacks in wireless networks. Later we provide a comprehensive taxonomic classification of the various types of jamming attacks and defense against jamming attacks. The classification scheme will provide a one stop location for future researchers on various jamming attack and defense strategies studied in literature. This classification scheme also highlights the areas of research in jamming attack and defense against jamming attacks which have received less attention and could be a good area of focus for future research. In the next chapter, we provide a bi-level mathematical programming model to study jamming attack and defense strategy. We solve this using a game-theoretic approach and also study the impact of power level, location of jamming device, and the number of transmission channels available to transmit data on the attack and defense against jamming attacks. We show that by increasing the number of jamming devices the throughput of the network drops by at least 7%. Finally we study a special type of jamming attack, flow-jamming attack. We provide a mathematical programming model to solve the location of jamming devices to increase the impact of flow-jamming attacks on wireless networks. We provide a Benders decomposition algorithm along with some acceleration techniques to solve large problem instances in reasonable amount of time. We draw some insights about the impact of power, location and size of the network on the impact of flow-jamming attacks in wireless networks

    Design methods for optimal resource allocation in wireless networks

    Get PDF
    Wireless communications have seen remarkable progress over the past two decades and perceived tremendous success due to their agile nature and capability to provide fast and ubiquitous internet access. Maturation of 3G wireless network services, development of smart-phones and other broadband mobile computing devices however have motivated researchers to design wireless networks with increased capacity and coverage, therefore un-leaching the wireless broadband capabilities. In this thesis, we address two very important design aspects of wireless networks, namely, interference management and control through optimal cross-layer design and channel fading mitigation through relay-assisted cooperative communications. For the former, we address, in the context of wireless network design, the problem of optimally partitioning the spectrum into a set of non-overlapping channels with non uniform spectrum widths and we model the combinatorially complex problem of joint routing, link scheduling, and spectrum allocation as an optimization problem. We use column generation decomposition technique (which decomposes the original problem into a master and a pricing subproblem) for solving the problem optimally. We also propose several sub-optimal methods for efficiently solving the pricing subproblems. For the latter problem, we study the joint problem of relay selection and power allocation in both wireless unicast and multicast cooperative cellular networks. We employ convex optimization technique to model this complex optimization problem and use branch and bound technique to solve it optimally. We also present sub-optimal methods to reduce the problem complexity and solve it more efficiently

    Development of wireless network planning software for rural community use

    Get PDF
    Rural New Zealand has poor access to broadband Internet. The CRCnet project at the University of Waikato identified point-to-point wireless technology as an appropriate solution, and built networks for rural communities. The project identified viable solutions using low-cost wireless technologies and commodity hardware, allowing them to establish general construction guidelines for planning rural wireless networks. The CRCnet researchers speculated that these general construction guidelines had simplified the wireless network problem to a point at which it seemed feasible to embed the guidelines within a software tool. A significant observation by the CRCnet researchers was that community members are collectively aware of much of the local information that is required in the planning process. Bringing these two ideas together, this thesis hypothesises that a software tool could be designed to enable members of rural communities to plan their own wireless networks. To investigate this hypothesis, a wireless network planning system (WiPlan) was developed. WiPlan includes a tutorial that takes the unique approach of teaching the user process rather than the detail of network planning. WiPlan was evaluated using a novel evaluation technique structured as a roleplaying game. The study design provided participants with local knowledge appropriate for their planning roles. In two trials, WiPlan was found to support participants in successfully planning feasible networks, soliciting local knowledge as needed throughout the planning process. Participants in both trials were able to use the techniques introduced by the tutorial while planning their wireless network and successfully plan feasible wireless networks within budget in both study trials. This thesis explores the feasibility of designing a wireless networking planning tool, that can assist members of rural communities with no expertise in wireless network planning, to plan a feasible network and provides reasonable evidence to support the claim that such a planning tool is feasible

    Performance Optimization in Wireless Local Area Networks

    Get PDF
    Wireless Local Area Networks (WLAN) are becoming more and more important for providing wireless broadband access. Applications and networking scenarios evolve continuously and in an unpredictable way, attracting the attention of academic institutions, research centers and industry. For designing an e cient WLAN is necessary to carefully plan coverage and to optimize the network design parameters, such as AP locations, channel assignment, power allocation, MAC protocol, routing algorithm, etc... In this thesis we approach performance optimization in WLAN at di erent layer of the OSI model. Our rst approach is at Network layer. Starting from a Hybrid System modeling the ow of tra c in the network, we propose a Hybrid Linear Varying Parameter algorithm for identifying the link quality that could be used as metric in routing algorithms. Go down to Data Link, it is well known that CSMA (Carrier Sense Multiple Access) protocols exhibit very poor performance in case of multi-hop transmissions, because of inter-link interference due to imperfect carrier sensing. We propose two novel algorithms, that are combining Time Division Multiple Access for grouping contending nodes in non-interfering sets with Carrier Sense Multiple Access for managing the channel access behind a set. In the rst solution, a game theoretical study of intra slot contention is introduced, in the second solution we apply an optimization algorithm to nd the optimal degree between contention and scheduling. Both the presented solutions improve the network performance with respect to CSMA and TDMA algorithms. Finally we analyze the network performance at Physical Layer. In case of WLAN, we can only use three orthogonal channels in an unlicensed spectrum, so the frequency assignments should be subject to frequent adjustments, according to the time-varying amount of interference which is not under the control of the provider. This problem make necessary the introduction of an automatic network planning solution, since a network administrator cannot continuously monitor and correct the interference conditions su ered in the network. We propose a novel protocol based on a distributed machine learning mechanism in which the nodes choose, automatically and autonomously in each time slot, the optimal channel for transmitting through a weighted combination of protocols

    Whitepaper on New Localization Methods for 5G Wireless Systems and the Internet-of-Things

    Get PDF

    Heterogeneous Cellular Networks: From Resource Allocation To User Association

    Get PDF
    Heterogeneous networking paradigm addresses the ever growing need for capacity and coverage in wireless networks by deploying numerous low power base stations overlaying the existing macro cellular coverage. Heterogeneous cellular networks encompass many deployment scenarios, with different backhauling techniques (wired versus wireless backhauling), different transmission coordination mechanisms and resource allocation schemes, different types of links operating at different bands and air-interface technologies, and different user association schemes. Studying these deployment scenarios and configurations, and understanding the interplay between different processes is challenging. In the first part of the thesis, we present a flow-based optimization framework that allows us to obtain the throughput performance of a heterogeneous network when the network processes are optimized jointly. This is done under a given system ``snapshot'', where the system parameters like the channel gains and the number of users are fixed and assumed known. Our framework allows us to configure the network parameters to allocate optimal throughputs to these flows in a fair manner. This is an offline-static model and thus is intended to be used at the engineering and planning phase to compare many potential configurations and decide which ones to study further. Using the above-mentioned formulation, we have been able to study a large set of deployment scenarios and different choices of resource allocation, transmission coordination, and user association schemes. This has allowed us to provide a number of important engineering insights on the throughput performance of different scenarios and their configurations. The second part of our thesis focuses on understanding the impact of backhaul infrastructure's capacity limitation on the radio resource management algorithms like user scheduling and user association. Most existing studies assume an ideal backhaul. This assumption, however, needs to be revisited as backhaul considerations are critical in heterogeneous networks due to the economic considerations. In this study, we formulate a global α\alpha-fair user scheduling problem under backhaul limitations, and show how this limitation has a fundamental impact on user scheduling. Using results from convex optimization, we characterize the solution of optimal backhaul-aware user scheduling and show that simple heuristics can be used to obtain good throughput performance with relatively low complexity/overhead. We also study the related problem of user association under backhaul-limitations. This study is a departure from our ``snapshot'' approach. We discuss several important design considerations for an online user association scheme. We present a relatively simple backhaul-unaware user association scheme and show that it is very efficient as long as the network has fine-tuned the resource allocation
    corecore