Method for interference-robust transmitter placement in wireless mesh networks

Information

  • Patent Grant
  • 9788213
  • Patent Number
    9,788,213
  • Date Filed
    Monday, December 28, 2015
    8 years ago
  • Date Issued
    Tuesday, October 10, 2017
    7 years ago
Abstract
The disclosure provides a computer-implemented system for establishing a wireless mesh network resistant to degradation induced by deliberate jamming or other electromagnetic interference emanating from point sources within an operating area. The computer-implemented system provides WMN AP locations that minimize disruptions to client coverage caused by jammers, subject to constraints on network service. The computer-implemented system considers jammers placed by an intelligent adversary and identifies the AP locations λ through quantification of an objective function of the general form Z(λ,χ)=Zcoverage(λ,χ)−w Zflow(λ,χ), where Zcoverage(λ,χ) reflects resulting coverage shortfall, Zflow(λ,χ) reflects traffic flow within the WMN, and w is a scalar reflecting the relative weight of the two terms. The final set of AP locations λ identifies the locations of APs to create a WMN that is the most robust to the worst possible jamming attack. Such an attack could represent the actions of a rational human opponent, or the worst-case positioning of unintentional interference sources such as civilian radios, other RF devices, or high-voltage electrical devices.
Description
BACKGROUND
1. Field of the Invention

The present invention relates generally to communications systems and particularly to wireless mesh networks. Still more particularly, the invention relates to a computer-implemented system for quickly and particularly designing a wireless mesh network to maximize robustness against jamming attacks by an intelligent adversary.


2. Description of the Related Art

Wireless mesh networks (WMNs) are interconnected systems of wireless access points (APs) that provide untethered network connectivity for a group of users that require data, voice, and/or video communication. Each AP has two radio devices: the first connects to local client devices, such as laptops and portable digital assistants (PDAs); the second connects to other APs to create a backhaul network. Communication between users on a WMN passes from a source client through one or more APs before reaching a destination client. To function, APs require only a local power source, such as a battery or portable generator. This property of WMNs make them well-suited to operations in austere environments, such as combat and humanitarian assistance disaster relief (HA/DR) operations. For an introduction to WMNs see Nicholas, P., “Optimal transmitter placement in wireless mesh networks,” (masters thesis, Naval Postgraduate School, 2009).


The wireless access medium of a WMN makes it particularly vulnerable to attack and exploitation. Such actions may include passive eavesdropping and packet capture, spoofing trusted identities to gain unauthorized access to the network, injecting malicious code, or denial of service (DoS) attacks. During physical-layer noise jamming DoS attacks, an attacker constantly broadcasts noise on the same radio frequency used by the WMN in an attempt to overpower the friendly signal, degrading or denying use of the channels. Powerful commercial and military jamming systems are readily available, but this type of attack can be conducted with inexpensive equipment and little technological prowess, and can be very challenging to defend against. Even unintentional interference can be as harmful as an intentional attack. Hence it is of increasing concern in both civilian and military operating environments.


There has been much recent research in defending WMNs from attack. Some approaches describe a method of mapping the areas affected by physical layer jamming to avoid placing sensors in these denied areas, or rely on algorithms to improve the classification rate of jamming attacks. See Wood et al., JAM: A jammed-area mapping service for sensor networks, Proceedings of the 24th IEEE International Real-Time Systems Symposium (RTSS'03) (2003), and see Xu et al., The feasibility of launching and detecting jamming attacks in wireless networks, MobiHoc 05 (2005). Others increase the robustness of wireless networks to attacks, including the use of directional antennae, frequency hopping and spread spectrum technology, lower data rates, fiber-optic backhaul networks, encryption and error correction, frequency-agile control channels, and adjustment of transmission power, but do not specifically consider defensive placement or mobility of APs. See Ståhlberg, Radio jamming attacks against two popular mobile networks, Seminar on Network Security, (2002); see also Lazos et al, Selective jamming/dropping insider attacks in wireless mesh networks. IEEE Network, 25(1) (2011); see also Xu et al., On adjusting power to defend wireless networks from jamming. Proceedings of the 1st ACM Conference on Wireless Security, (2008); see also Wood et al., DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. 4th Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks, (2007). Others examine spatial retreats, i.e., moving APs physically away from the sources of interference, as a form of defense against a jamming attack, assume that jammers are stationary, and minimize the damage done by coordinating the retreat of APs from the effective range of the adversary's jammers. However, they also fail to consider jammers that could then move and attack the newly-configured network. See Xu et al., Channel surfing and spatial retreats: defenses against wireless denial of service, Proceedings of 3rd ACM Workshop on Wireless Security (2004); see also Ma et al., Mobile network management and robust spatial retreats via network dynamics, Mobile Adhoc and Sensor Systems Conference, 2005 (2005).


Some investigations have utilized game theory to model optimal jamming attack and detection strategies, but have considered only strategic-form games wherein players move simultaneously, rather than extensive form games wherein players move sequentially. See Thamilarasu et al., Game theoretic modeling of jamming attacks in ad hoc networks, Proceedings Of the 18th International Conference on Computer Communications and Networks, (2009). Others have similarly considered the deliberate placement of jammers by an intelligent adversary (called the attacker) to maximally disrupt network operation, but have not investigated a continuous space for jammer placement (and therefore an infinite number of possible locations). See Shankar, Optimal jammer placement to interdict wireless network services, (Master's Thesis). Monterey, Calif.: Naval Postgraduate School (2008).


Presented here is a computer-implemented system for forming robust wireless mesh networks in environments where jamming is expected. Unlike previous efforts focusing on static or random jamming, the computer-implemented system disclosed considers WMN network design in the presence of an intelligent adversary who observes the network and then places jammer(s) to maximally disrupt network performance. In this way, the computer implemented system provides network designs which maximize robustness to the worst possible jamming attack, rather than defending against a specific one.


These and other objects, aspects, and advantages of the present disclosure will become better understood with reference to the accompanying description and claims.


SUMMARY

The disclosure provides a computer-implemented system for establishing a wireless mesh network (WMN) resistant to degradation induced by deliberate jamming or other electromagnetic interference (EMI) emanating from point sources within an operating area. The computer-implemented system provides WMN Access Point (AP) locations that minimize disruptions to client coverage caused by jammers, subject to constraints on network service. The computer-implemented system comprises a computer-based apparatus which considers network design in the presence of an intelligent adversary capable of observing the WMN and placing jammers to maximally disrupt coverage, rather than merely considering static or random jamming.


The computer implemented system comprises a computer-based apparatus which provides AP locations within a geographic area by successively analyzing AP locations λ and jammer locations χ through quantification of an objective function having the general form Z(λ,χ)=Zcoverage(λ,χ)−w Zflow(λ,χ), where Zcoverage(λ,χ) reflects resulting coverage shortfall within the geographic area for a given λ and a given χ, Zflow(λ,χ) reflects and traffic flows within the geographic area for the given λ and the given χ, and w is a scalar reflecting the relative weight of the two terms. The computer-based apparatus employs a nested analysis by selecting an initial set of AP locations λ, then iteratively analyzing selected jammer locations χ against the initial set of AP locations λ using the physical characteristics of the geographic area, selected technical specifications of the WMN, and quantification of the objective function Z(λ,χ). Upon completing this inner loop, the computer-based apparatus returns to the outer loop to select a subsequent set of AP locations λ, and repeats the inner loop analysis to determine the most disruptive jammer locations χ for the subsequent set of AP locations λ. This process repeats until selected stopping criterion are satisfied. At the conclusion of the process, the computer-based apparatus provides the final set of AP locations λ which most effectively counters the most disruptive set of jammer locations χ located during the iterative process. The final set of AP locations λ thereby identifies the locations of APs to create a WMN that is the most robust to the worst possible jamming attack identified. Such an attack could represent the actions of a rational human opponent, or the worst-case positioning of unintentional interference sources such as civilian radios, other radio frequency (RF) devices, or high-voltage electrical devices.


In a particular embodiment, stopping criteria for the inner and outer loops are based on a specified number of iterations. In another embodiment, the stopping criteria is based on the difference between quantified objective functions in successive iterations. In a further embodiment, the computer-based apparatus selects the subsequent set of AP locations λ based on minimizing the impact of the most maximally disruptive set of χ yet encountered in the process, and utilizing that λ configuration as the subsequent set of AP locations λ.


In some embodiments, the computer-implemented system further comprises a two-dimensional display in data communication with the computer-based apparatus, and provides graphic representation of the operating area and the resultant final set of AP locations λ. In another embodiment, the two-dimensional display provides the discrete coverage regions within the operating area, and provides the coverage shortfalls expected for the final set of AP locations λ given the maximally disruptive jammer placement.


Embodiments in accordance with the invention are best understood by reference to the following detailed description when read in conjunction with the accompanying drawings.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 illustrates a WMN placed within an operating area.



FIG. 2 illustrates a WMN and jammers placed within an operating area.



FIG. 3 illustrates the process employed by the computer-based apparatus.



FIG. 4 illustrates a two AP WMN in the absence of jamming.



FIG. 5 illustrates a two AP WMN subject to a direct attack.



FIG. 6 illustrates a two AP WMN subject to an in-between attack.



FIG. 7 illustrates the impact of one barrage jammer on client coverage in a 2 AP WMN.



FIG. 8 illustrates the impact of one barrage jammer on network flow in a 2 AP WMN.



FIG. 9 illustrates a WMN in a first operating area in the absence of a jamming attack.



FIG. 10 illustrates the WMN in the first operating area subject to a jamming attack.



FIG. 11 illustrates the WMN in the first operating area subject to a maximally disruptive jamming attack.



FIG. 12 illustrates a WMN in a second operating area in the absence of a jamming attack.



FIG. 13 illustrates the WMN in the second operating area subject to a jamming attack.



FIG. 14 illustrates the WMN in the second operating area subject to a maximally disruptive jamming attack.





Embodiments in accordance with the invention are further described herein with reference to the drawings.


DETAILED DESCRIPTION

The disclosure provides a computer-implemented system for establishing a wireless mesh network (WMN) resistant to degradation induced by deliberate jamming or other electromagnetic interference (EMI) emanating from point sources within an operating area. The computer-implemented system may generally be employed against any form of WMN interference in which network performance is a function of the distance between interference sources and WMN Access Points (APs), and provides AP locations that minimize the disruption to client coverage caused by jammers, subject to constraints on network service and considering the effects of radio propagation over terrain. The computer-implemented system utilizes a process which considers network design in the presence of a simulated intelligent adversary capable of observing the WMN and placing jammers to maximally disrupt coverage.


The computer implemented system comprises a computer-based apparatus which provides AP locations based on inputs including selected inherent technical characteristics of APs and jammers within the WMN, the characteristics of the geographic area within which the WMN will operate, and others. The computer-based apparatus acts to analyze successive AP locations λ and jammer locations χ placed within the operating area by formulating an objective function having the general form Z(λ,χ)=Zcoverage(λ,χ)−w Zflow(λ,χ), where Zcoverage(λ,χ) reflects resulting coverage shortfall within the geographic area for a given λ and a given χ, Zflow(λ,χ) reflects and traffic flows within the geographic area for the given λ and the given χ, and w is a scalar reflecting the relative weight of the two terms. Details and quantification of the objective function Z(λ,χ) are further discussed below. The computer-based apparatus provides an optimized set of AP locations λ by initially selecting a set of AP locations λ, where individual λi in the set may be any location within the operating area, and may be selected using any methodology. Having defined a set of AP locations λ, the computer-based apparatus evaluates the objective function over multiple iterations in order to locate a set of jammer locations χ within the operating area which most disrupts the WMN established by the set of AP locations λ, based on resulting the value of the objective function Z(λ,χ). Once the most disruptive set of χ for the current set of λ is located, the computer-based apparatus selects a subsequent set of AP locations λ and conducts similar analysis of the objective function to locate a second set of jammer locations χ for maximal disruption of the new WMN established by the subsequent set of AP locations λ. In a particular embodiment, the computer-based apparatus selects the subsequent set of AP locations λ based on minimizing the impact of the most disruptive set of χ yet encountered in the process, and utilizing that λ configuration as the subsequent set of AP locations λ. The methodology continues in this fashion until stopping criterion are met. At the conclusion of the process, the computer-based apparatus provides a final set of AP locations λ which most effectively counters the most disruptive set of jammer locations χ located during the iterative process. The final set of AP locations λ thereby identifies the locations of APs to create a WMN that is the most robust to the worst possible jamming attack encountered. Such an attack could represent the actions of a rational human opponent, or the worst-case positioning of unintentional interference sources such as civilian radios, other RF devices, or high-voltage electrical devices.


In a particular embodiment, the computer-implemented system further comprises a two-dimensional display in data communication with the computer-based apparatus which provides graphic representation of the operating area and the resultant final set of AP locations λ. In another embodiment, the two-dimensional display provides discrete coverage regions within the operating area, and coverage shortfalls expected for the final set of AP locations λ given the maximally disruptive jammer placement.


Calculating the Value of a WMN Topology:


The computer-based apparatus employs a methodology for calculating the value of a WMN physical topology given fixed AP and jammer locations. See Nicholas et al., “Fast, Effective Transmitter Placement in Wireless Mesh Networks,” Military Operations Research, 17(4) (2012); see also U.S. Pat. No. 8,654,672 issued to Nicholas et al., issued Feb. 18, 2014. N is defined to be the set of all AP nodes, indexed by i=1, 2, . . . , n, where n=|N|. M is defined to be the set of all jammer nodes, indexed by k=1, 2, . . . , m, where m=|M|. Let λ=(λ1, λ2, . . . λn) represent the locations of the APs, and let χ=(χ1, χ2 . . . χm) represent the locations of the jamming sources. The operating area is the topographic area where an AP i or jamming source k may be physically located. A two-dimensional coordinate (x, y) is associated with each location χi and with each χk; these coordinates represent the northing and easting for AP node i and each jammer node k, respectively. The APs and jammers, once placed, generally remain stationary. The operating area is divided into a set of discrete coverage regions R, indexed by r=1, 2, . . . |R|. The formulation allows the use of any discretization scheme, however generally the implementation assumes rectangular regions arranged in a grid. Each coverage region rεR may have an associated elevation. In some embodiments, the elevation is assumed to be uniform throughout the region. This assumption is not true in practice, but is consistent with much of the available elevation data. See P. J. Nicholas and D. L. Alderson, “Designing interference-robust wireless mesh networks using a defender-attacker-defender model,” Naval Postgraduate School, Monterey, Calif., Tech. Rep. NPS-OR-15-002 (2015).



FIG. 1 illustrates an operating area 101 having discrete coverage regions such as 102, a wireless mesh network comprising AP locations such as AP location 103. FIG. 1 depicts a typical WMN in the absence of jamming. AP nodes are illustrated as white circles, and shaded grid elements represent locations that receive sufficient client coverage from the APs. The coverage obtained at each grid location depends on several factors including the local terrain, AP and client radio characteristics, and EMI. The dashed lines in FIG. 1 represent the backhaul network used to communicate between AP nodes. FIG. 2 illustrates the operating area as 201 with discrete coverage regions such as 202, AP locations such as AP location 203, and operating in the presence of a jammer 204. As illustrated, the placement of a jammer, denoted by a black circle, decreases client coverage and disrupts backhaul network connectivity. Each jammer node kεM may have two active transmitters: one interfering with nearby AP client coverage radios and the other interfering with nearby AP backhaul network radios. Generally, the APs are not subject to self-jamming or interference from other APs, and jammers emit signals consisting of random noise perfectly matched in frequency, phase, and polarization to AP transmissions (i.e., perfect physical-layer interference). See e.g. Pelechrinis et al., “Denial of service attacks in wireless networks: The case of jammers,” IEEE Communications Surveys & Tutorials, 13(2) (2011).


Each AP node iεN may serve as a source of network traffic. Sink or destination nodes dεN are identified as the sinks for all network traffic. Generally all APs serve as destination nodes, as is common in peer-to-peer networks. Typically, the physical location of one destination node, designated the headquarters (HQ) node, is known in advance and fixed. This node may serve as the network gateway and/or location of domain controllers and servers. This is consistent with reality, where network designers must place an AP at their headquarters, satellite gateway, or Internet point of presence (PoP).


Quantifying the value of a particular WMN topology in the presence of EMI is conducted by calculating two subproblems: the value of coverage provided to client devices Zcoverage, and the value of delivered backhaul network flow Zflow. The value of the given WMN topology is given by the linear combination:

Z({circumflex over (λ)},{circumflex over (χ)})≡Zcoverage({circumflex over (λ)},{circumflex over (χ)})−w Zflow({circumflex over (λ)},{circumflex over (χ)}),  (1)


where w is a positive scalar representing the relative importance of network flow, and the ^ symbol denotes that the locations λ and χ are fixed.


Given fixed AP locations {circumflex over (λ)} and fixed jammer locations {circumflex over (χ)}, the operator D aims to minimize client coverage shortfall and minimize negative network flow (i.e., maximize positive network flow) by choice of flow variables S, F, T, and P. For clarity, the variables being minimized by the operator D are explicitly stated in the operator's problem:











Z

D
_




(


λ
^

,

χ
^


)


=


min

S
,
F
,
T
,
P




(



Z
coverage



(


λ
^

,

χ
^


)


-


wZ
flow



(


λ
^

,

χ
^

,
S
,
F
,
T
,
P

)



)






(
2
)







Placing Jammers:


The attacker A, given fixed AP node locations {circumflex over (λ)}, wishes to maximize disruption to the WMN by placing jammer nodes at locations:











DA



D
_



(


λ
^

,

·

,
·



)



:


Z

A


D
_





(

λ
^

)



=


max
χ




min

S
,
F
,
T
,
P




(



Z
coverage



(


λ
^

,
χ

)


-


wZ
flow



(


λ
^

,
χ
,
S
,
F
,
T
,
P

)



)







(
3
)







The attacker's objective is to maximize coverage shortfall and minimize delivered backhaul network flow.


The network designer D, given fixed jammer node locations {circumflex over (χ)}, wishes to maximize WMN performance by placing AP nodes at locations λ:











Z

D


D
_





(

χ
^

)


:


min
λ




min

S
,
F
,
T
,
P




(



Z
coverage



(

λ
,

χ
^


)


-


wZ
flow



(

λ
,

χ
^

,
S
,
F
,
T
,
P

)



)







(
4
)







The designer's objective is to minimize coverage shortfall and maximize delivered backhaul network flow.


The DAD Problem:


The computer-based apparatus nests the problems of the operator, attacker, and designer to utilize an overall SRRA+C DAD formulation:










Z

DA


D
_



=


min
λ




max
χ




min

S
,
F
,
T
,
P




(



Z
coverage



(

λ
,
χ

)


-


wZ
flow



(

λ
,
χ
,
S
,
F
,
T
,
P

)



)








(
5
)







In the specific operation of the computer-based apparatus, the designer D first chooses AP locations λ, which the attacker A then aims to maximally disrupt by placing jammers at locations χ. The operator D calculates client coverage and determines how to route traffic given AP and jammer locations. The solution to the DAD problem indicates where the network designer should place APs to minimize the worst-case disruption possible by EMI. That is, when solved to optimality, the obtained AP network topology is completely immune to greater degradation, as the attacker cannot possibly do more damage.


Solving the DAD Problem:


To solve the SRRA+C DAD problem, the computer-based apparatus decomposes the DAD problem into a designer D master problem with separate attacker A subproblems. See e.g. Alderson, D. L., Brown, G. G., Carlyle, W. M., & Wood, R. K. (2011). Solving defender-attacker-defender models for infrastructure defense. In R. K. Wood & R. F. Dell (Eds.), Operations Research, Computing, and Homeland Defense (pp. 28-49). Hanover, Md.: INFORMS. In the master problem, the computer-based apparatus chooses AP locations λu for each iteration u=1, 2, . . . , max_master_iterations. For those given AP locations, the associated subproblem chooses jammer locations χv for each iteration v=1, 2, . . . , max_sub_iterations. Given AP locations λu and jammer locations χv, the overall objective value is then obtained via solving the operator's problem (2). After max_sub_iterations, the subproblem returns the jammer locations {circumflex over (χ)} yielding the best attack found (i.e., the highest overall objective value). The master problem continues searching for the best AP locations λ* to minimize the damage caused by the worst attack found until max_master_iterations.


The general process utilized by the computer-based apparatus is presented at FIG. 3. The process has available as input the operating region over the WMN is to be established, the number and operating characteristics of APs and jammers in the operating region, HQ node location, elevation and coverage requirements for each rεR, and desired stopping criterion and second stopping criteria. The process commences at BEGIN, and continues through block 1) to block 2) if the stopping criterion is satisfied. At block 2), the process selects an initial set of AP locations λ, and continues through block 3) to block 3a) if a second stopping criterion is satisfied. The process then begins the methodology for finding the most disruptive jammer locations χ for the current set of AP locations λ established at block 2). The process proceeds by selecting a set of jammers locations χ within the operating region at 3a), then quantifying the objective function parameters Zcoverage (λ,χ) and Zflow (λ,χ) using the current set of AP locations λ and the current set of jammer locations χ at blocks 3b)(i) and 3b)(ii) respectively. At block 3b)(iii), the process quantifies the objective function Z(λ,χ) using the Zcoverage (λ,χ), the Zflow (λ,χ), and the scalar w. At block 3c), the quantified Z(λ,χ) just determined at 3b)(iii) is compared against previously quantified objective function values for the current set of AP locations λ, and if the quantified Z(λ,χ) determined at 3b)(iii) is the most disruptive jammer configuration χ encountered thus far for the current set of AP locations λ, the quantified Z(λ,χ) is established as the incumbent χ solution. At block 3d), the process returns to block 3) and selects a second set of jammers locations χ at block 3a), and evaluates that second set against the current set of AP locations λ by performing blocks 3b)(i), 3b)(ii), 3b)(iii), and 3c) as before. This inner loop of blocks 3), 3a), 3b)(i), 3b)(ii), 3b)(iii), 3c) and 3d) is repeated for the current set of AP locations λ until the second stopping criterion is satisfied. In a particular embodiment, the second stopping criteria is a specified number of iterations of the operations of blocks 3), 3a), 3b)(i), 3b)(ii), 3b)(iii), 3c), and 3d). In another embodiment, the second stopping criteria is based on the difference between quantified objective functions in successive iterations. After conducting the operations of blocks 3), 3a), 3b)(i), 3b)(ii), 3b)(iii), 3c), and 3d) iteratively for the current set of AP locations λ, the process determines the most disruptive jammer locations χ for the current set of AP locations λ based on the associated quantified objective function.


At the conclusion of the inner loop of blocks 3), 3a), 3b)(i), 3b)(ii), 3b)(iii), 3c), and 3d), at block 4), the resulting incumbent solution for the current set of AP locations λ determined at block 3c) is compared against all previously determined incumbent solutions based on the respective quantified objective function values, and if the resulting incumbent solution is the best AP configuration encountered thus far for all sets of AP locations λ evaluated, the resulting incumbent solution is established as the overall incumbent solution.


At block 5) the process evaluates the stopping criteria, and if the stopping criteria is not satisfied, the process returns to block 1), selects a second set of AP locations λ at block 2), and subsequently conducts the inner loop of operations of blocks 3), 3a), 3b)(i), 3b)(ii), 3b)(iii), 3c), and 3d) in order to determine the maximally disruptive jammer locations χ for the next set of AP locations λ, before continuing to blocks 4) and 5). This outer loop of blocks commencing at 1) and concluding at 5) is repeated for each set of AP locations λ, until the stopping criterion is satisfied. In a particular embodiment, the stopping criteria is a specified number of iterations of the operations of blocks 1), 2), 4), and 5). In another embodiment, the stopping criteria is based on the difference between quantified objective functions in successive iterations.


Typically, at block 2), the process selects a subsequent set of AP locations λ by receiving the most disruptive jammer configuration χ which generated the overall incumbent solution, and determining the subsequent set of AP locations λ to be analyzed by finding the set of AP locations λ which is maximally effective in terms of the objective function against the current most disruptive jammer configuration χ, such that, given the most disruptive jammer configuration χ at a given point in the process, the subsequent set of AP locations λ selected at block 2) minimizes coverage shortfall and maximizes delivered backhaul network flow.


The attacker and designer's problems (like the SRRA+C problem) are nondifferentiable, nonconvex, nonlinear optimization problems. The difficulty of finding exact solutions to such problems increases the desirability of using heuristic computational techniques, such as genetic or simulated annealing algorithms, and sampling algorithms, such as mesh adaptive direct search (MADS). In a particular embodiment, the computer-based apparatus utilizes the DIviding RECTangles (DIRECT) algorithm to sample the SRRA+C solution space (i.e., the designer's problem with no jammers) to quickly find solutions. This same approach may be utilized for the attacker's problem ZAD (given fixed AP nodes), and for the designer's problem ZDD (given fixed jammers).


DIRECT is a sampling optimization algorithm based on Lipschitzian optimization The algorithm iteratively samples from the solution space, where the number of dimensions is 2m (attacker's problem) or 2 (n−1) (designer's problem), the length of each dimension is proportional to the operating area length or width, and a single point in the solution space represents the locations of all the nodes being placed (whether AP locations λ in the designer's problem, or jammer locations χ in the attacker's problem). The algorithm progressively samples from and divides the space into smaller hyper-rectangles. At each step, it chooses to explore a particular sub-hyper-rectangle based on both the solution value of the center point and the total volume of the given shape, where larger volumes are more desirable because they indicate greater unexplored territory and hence greater potential for an improved incumbent solution. The DIRECT algorithm is continuous, i.e., it can place APs or jammers at any location within the user-specified operating area. The DIRECT algorithm is guaranteed to eventually converge to the optimum solution, as it will eventually sample within an arbitrary distance of any point in the solution space. See e.g. Jones et al., “Lipschitzian optimization without the Lipschitz constant,” Journal of Optimization Theory and Applications, 79(1), (1993). For example, the DIRECT algorithm running on a laptop computer quickly finds good solutions to the attacker and designer's problems for networks consisting of up to at least 10 APs where the operating area is discretized into r=6,000 regions.


In an embodiment, the computer-based apparatus utilizes the following pseudo-code for the nested DIRECT algorithm:


Algorithm DIRECT for SRRA+C DAD


Input: Full SRRA problem data (number and operating characteristics of APs and jammers, HQ node location, and elevation and coverage requirements for each rεR and desired number of iterations max_master_iterations and max_sub_iterations.


Output: Best estimate of optimal AP locations λ*=(λ*1, λ*2, . . . , λ*n) and χ*=(χ*1, χ*2, . . . , χ*m), and operator solution ZD(λ*,χ*).

















begin




 Store map data




 Initialize u ← 1




 Master Problem (Designer)




 while (u < max_master_iterations) do




  Calculate AP locations λu using DIRECT




  Initialize v ← 1




  Subproblem (Attacker)




  while (v < max_sub_iterations) do




  Calculate EMI locations χv using DIRECT




   Solve operator's problem for ZD for λu and χv




   if ZDu, χv) > ZDu, {circumflex over (χ)} ) /* If this is the best attack yet, store




   as incumbent */




    {circumflex over (χ)} ← χk




    ZDu, {circumflex over (χ)}) ← ZDu, χv)




   endif;




   v ← v + 1




  end;




  if ZDu, {circumflex over (χ)}) < ZD (λ*, χ*) /* If this is the best design yet, store




  as incumbent */




   λ* ← λu




   χ* ← {circumflex over (χ)}




   ZD (λ*, χ*) ← ZDu, {circumflex over (χ)} )




  endif;




  u ← u + 1




 end;




 Return best AP locations λ*, EMI locations χ* , and operator's




 solution




 ZD (λ*, χ*)




end;










For given AP locations λu and given enough iterations, DIRECT will eventually find a solution within an arbitrary distance of the solution space point defining the optimal jamming attack.


Quantifying Particular WMN Topologies:


The computer-based apparatus quantifies the value of a particular WMN topology in the presence of EMI by calculating the value of coverage provided to client devices Zcoverage, and calculating the value of delivered backhaul network flow Zflow:


Calculating Client Coverage:


The client coverage provided by a WMN topology is a function of its AP and jammer locations. Given these locations, the computer-based apparatus quantifies the value of client coverage by first calculating the received signal strength (RSS) in Decibel-milliwatts (dBm from each discrete coverage region rεR from each AP node i or jammer node k (and the reverse path) using the standard link budget formula:

RSS=powertx+gtx−ltx−lpath−lmisc+grs−lrx,

where powertx is transmission power in dBm, gtx and grx are, respectively, the gains of the transmitter and receiver in dBi, ltx and lrx are, respectively, the losses (i.e., from cables, connectors, etc.) of the transmitter and receiver in dB, lpath is the total path loss in Decibels (dB), and lmisc is the miscellaneous loss (such as fade margin) in dB. See e.g., Olexa, R., Implementing 802.11, 802.16, and 802.20 wireless networks: Planning, troubleshooting and operations (2005). Using the standard link budget formula, the computer-based apparatus defines ρir ri) as the received signal strength from (to) a transmitting AP node i to (from) coverage region r, and ηkr ri) as the received signal strength from a transmitting jammer node k to coverage region r (AP i). All of the terms in the standard link budget formula are input data, determined by the equipment technical characteristics, except for the total path loss lpath, which depends on the position of the transmitting device (a client device, AP node λi, or jammer node χk)


Various methods may be utilized for computing lpath, such as a simple inverse-square calculation, the Irregular Terrain Model (ITM), or Hata-COST 231 (COST, 1999). See Longley, A. G., & Rice, P. L. (1968). Prediction of tropospheric radio transmission loss over irregular terrain. A computer method-1968 (1968); and see COST (European Cooperation in the Field of Scientific and Technical Research) Digital mobile radio towards future generation systems: COST 231 (1999). In an embodiment, the computer-based apparatus utilizes the Terrain Integrated Rough Earth Model (TIREM). This model computes path loss by sampling terrain elevation at fixed points between transmitter and receiver. It considers the effects of free space loss, diffraction, and atmospheric absorption and reflection, but does not consider foliage, buildings, or other nonterrain obstructions. While TIREM is computationally more expensive than simpler models, it provides fairly accurate results.


In an embodiment, to quantify the value of client coverage, the computer-based apparatus calculates in dBm the total interference received at region rεR and AP node iεN using:











Interference
r



10







log
10



(

1000









k

M





10



η
kr

10


1000



)




=

10






log
10






k

M




10







η
kr

10










r

R















Interference
i



10







log
10



(

1000









k

M





10



η
ki

10


1000



)




=

10






log
10






k

M




10







η
ki

10










i

N








The computer-based apparatus calculates in dB the signal-to-interference ratio (SIR) σ between each region rεR and AP node iεN. SIR is calculated in both directions (i to r and r to i), as two-way communication is necessary for a client device to successfully exchange traffic with an AP, and terrain, obstructions, and the effects of EMI may cause these quantities to be very different.

(Signal to Interference Ratio)irir≡ρir−interferencer∀iεN,∀rεR
(Signal to Interference Ratio)riri≡ρri−interferencei∀rεR,∀iεN


The computer-based apparatus defines or receives as input a minimum allowable SIR or sensitivity threshold τ in dB for each region rεR and AP node iεN. Higher τ values indicate a higher priority or a requirement for a higher quality signal and thus greater data transfer rates. In a typical embodiment, the computer-based apparatus uses a value of 10 dB. A positive difference of τ and σ indicates insufficient signal quality. The computer-based apparatus calculates this client coverage shortfall between region r and AP node i and penalizes the weakest component of the bidirectional link between the AP and region (i.e., the link with the greatest coverage shortfall):








(

Coverage





Shortfall

)

ir




max


i

N

,

r

R





(



(


τ
r

-

σ
ir


)

+

,


(


τ
i

-

σ
ri


)

+


)







where ( )+ denotes the projection onto the nonnegative real line. Because a positive difference represents inadequate client coverage, the computer-based apparatus acts to minimize this quantity. In an embodiment, it considers only the minimum coverage shortfall from each AP node iεN and assumes each client device will connect only to that AP with the strongest available σir. The computer-based apparatus sums over all rεR to calculate total coverage shortfall, denoted Zcoverage:








z
coverage



(

λ
,
χ

)


=


(

Total





Coverage





Shortfall

)






r

R





min

i

N




{

max


(



(


τ
r

-

σ
ir


)

+

,


(


τ
i

-

σ
ri


)

+


)


}








The total coverage shortfall is a function of AP node locations λ and EMI node locations χ. By allowing only positive terms, this disallows the benefit of transmitting received power to any given coverage region.


Calculating Network Flow:


To assess the value of network flow, arc capacities for the arc paths between each node are calculated. In an embodiment, the computer-based apparatus utilizes the Shannon capacity formula, which establishes a theoretical upper bound on transmission capacity in bits per second (bps), and the capacity from AP node i to j in bps is:








(
Capacity
)

ij

=

bandwidth







log
2



(

1
+



gain
ij



interference
j



loss
ij





P
ij



)







(

i
,
j

)


A








where bandwidth is channel bandwidth in Hertz and gainij is the sum of the antilog gain terms (gtx and grx). Lossij is the sum of the antilog loss terms (ltx, lrx, lpath, and lmisc) from AP node i to j. Note interferencej is converted to watts with simplified notation for clarity. These input data are calculated by the known locations of AP node locations λ and jammer node locations χ. In this embodiment, each AP has limited total transmission power denoted pi (in watts), and the computer-based apparatus defines Pij to be the fraction of pi used to transmit from i to j. Thus, each AP is additionally constrained by










j
:


(

i
,
j

)


A





P
ij




p
i





Here, Pij is a decision variable representing the AP-to-AP transmission power from node I to node j, whereas the transmission powers for AP-to-client, jammer-to-client, and jammer-to-AP powertx is a (constant) input parameter.


The computer-based apparatus measures each individual traffic flow in bps and quantifies the value of total network flow according to a log-utility function that places a zero value on unit flow, positive values on flows greater than one, and negative values on flows less than one. Note that a zero flow has an infinite penalty, and therefore there is strong incentive to ensure that each source-destination pair receives some flow. Defining Sid to be the total flow originating at node i and destined for node d:












(

Utility





of





Total





Network





Flow

)





d






i

d





log
2



(

S
i
d

)









Collectively, the computer-based apparatus calculates the value of network flow, denoted Zflow. In an embodiment, the computer-based apparatus utilizes a Simultaneous Routing and Resource Allocation (SRRA) technique to calculate Zflow using the relationships and constraints:


SRRA Formulation


Index Use






    • iεN AP node (alias j)

    • kεM jammer node

    • (i,j)εA directed arc (link)

    • dεDN destination node


      Input Data

    • {circumflex over (λ)}i locations of AP nodes, {circumflex over (λ)}={{circumflex over (λ)}i, iεN} [none]

    • {circumflex over (χ)}k locations of jammer nodes, {circumflex over (λ)}={{circumflex over (χ)}k, kεM} [none]

    • pi maximum total transmission power per AP node, iεN [watts]

    • bandwidth channel bandwidth [hertz]


      Calculated Data

    • gainij product of analog gain terms from iεN to jεN [none]

    • lossij product of analog gain terms from iεN to jεN [none]

    • interferencej Total received EMI and background noise power
      • at jεN [watts]


        Decision Variables

    • Sid total flow of traffic from origin iεN to destination dεD [bps]

    • Fijd traffic flow along arc (i, j)εA to destination dεD [bps]

    • Tij total flow along arc (i, j)εA [bps]

    • Pij total transmission power along arc (i, j)εA [watts]


      Formulation



















Z
flow



(


λ
^

,

χ
^


)


=


max

S
,
F
,
T
,
P






d






i

d





log
2



(

S
i
d

)










(

S





0

)
















s
.
t
.








i
:


(

j
,
i

)


A





F
ji
d



-




i
:


(

i
,
j

)


A





F
ij
d



=

S
j
d









j

N


,



d

D









(

S





1

)















T
ij

=



d



F
ij
d










(

i
,
j

)


A








(

S





2

)











T
ij

-

bandwidth







log
2



(

1
+



gain
ij



interference
j



loss
ij





P
ij



)





0







(

i
,
j

)


A








(

S





3

)


















j
:


(

i
,
j

)


A





P
ij




p
i







i

N









(

S





4

)









S
i
d≧0i≠d  (S5)
Fijd≧0∀(i,jA,∀dεD  (S6)
Tij≧0∀(i,jA  (S7)
Pij≧0∀(i,jA  (S8)


Given AP locations {circumflex over (λ)} and jammer locations {circumflex over (χ)}, this is a multicommodity network flow problem. The objective function (S0) maximizes the total utility of traffic flow between each source-destination pair. Constraints (S1) ensure balance of flow at each AP node. Constraints (S2) define the total flow along any arc as the sum of all traffic flows along that arc. Constraints (S3) ensure that total flow along any arc is less than or equal to the arc capacity. Constraints (S4) restrict total transmission power at each AP. Constraints (S5-S8) ensure nonnegativity.


As stated, the overall jammer-cognizant SRRA+C objective function is obtained using a linear combination of client coverage (calculated as client coverage shortfall) and network flow (calculated via the SRRA problem):

Z({circumflex over (λ)},{circumflex over (χ)})≡Zcoverage({circumflex over (λ)},{circumflex over (χ)})−wZflow({circumflex over (λ)},{circumflex over (χ)}).


Here, w is a positive scalar representing the relative importance of network flow. Larger values of w indicate network flow is of greater importance and, in general, increase network flow by valuing more compact network topologies.


Exemplary Results:


The attacker's problem is illustrated by finding the optimal single jammer attack against a network of two fixed APs. Consider a one square kilometer operating area (gridded into 100×100 regions) with flat terrain with an AP placed near the top and bottom of the region. This is illustrated at FIG. 4 with no jammer present, where the two APs (depicted as open circles) provide the client coverage shown in white and deliver network traffic to each other at a maximum rate of 419 kilobits per second (kbps). The computer-based apparatus generally penalizes solutions based on the degree of insufficient client coverage, depicted in FIG. 5 as darker areas. In a single-channel jamming attack, the optimal attack is to simply place the single jammer directly on top of either AP, depicted as an “X” on the bottom AP at FIG. 5. This direct-AP attack eliminates the client coverage by the bottom AP, and reduces network traffic flow between the APs to essentially zero. In barrage jamming, the optimal attack is to place the jammer in between the two APs in a between-AP attack, illustrated at FIG. 6. In such a location, the barrage jammer is able to significantly reduce the client coverage provided by both APs, and reduce the delivered network traffic flow to both devices to essentially zero. Because the computer-based apparatus penalizes the degree of coverage shortfall, a jammer in between each AP maximizes this penalty by making the centerline region receive worse client coverage than would be provided if the jammer was placed directly on top of either AP. Likewise, network flow is maximally disrupted in a barrage jamming attack by placing the jammer between each AP because this reduces delivered flow to both APs.



FIG. 7 shows the optimal y location(s) for one barrage jammer placed between the two APs at locations (50, 20) and (50, 80) at FIGS. 4-6 to minimize client coverage, as a function of jammer transmission power relative to client device power. The solid line 705 indicates client coverage shortfall. FIG. 8 presents the same analysis for a barrage jammer to minimize backhaul network flow, represented by solid line 806. Equivalent solutions in each figure are shown by two points at a given power ratio. When jamming power relative to AP and client transmission power is low enough, the optimal barrage jamming strategy may become a direct-AP attack. The sudden jump in FIG. 7 is an artifact of continuous client service—which, on perfectly flat terrain, is essentially a circle around each AP—being discretized into the gridded operating area. As the relative transmission power of an AP changes, the “circle” of client coverage around each AP will change in a discontinuous fashion, occasionally jumping in value. In this case, it occurs when the area receiving adequate client service no longer overlaps the upper and lower boundaries of the operating area. The calculation of network flow (i.e., FIG. 8) is not affected by the discretization of the operating area, so these jumps are not present. FIGS. 7 and 8 illustrate that an optimal jamming strategy (i.e., direct-AP or between-AP attack) for attacking client coverage and network flow occurs at different power ratio levels. That is, the best location to place a jammer to maximize client coverage shortfall may not always be the best place to minimize network flow. The best overall location will be a function of w, the positive scalar indicating the value of network flow in the SRRA+C objective function (6).


In the designer's problem, the designer is faced with of finding optimal locations for APs with jammers at fixed locations. While attempting to minimize the effects of jamming, the designer must consider the competing objectives of client coverage and network flow: network flow can be maximized by simply placing the APs as far as possible from the jammers (i.e., on the farthest border of the operating area), but such placement will likely provide very little client coverage. The optimal solution to the designer's problem balances these competing concerns. For example, with a single-channel jammer, the best strategy may be to place the jammed AP far from the jammer and place the unjammed AP near the jammer, maximizing the utility of providing client coverage in the unjammed area. With a barrage jammer, the best strategy may be to move the APs away from the jammer to a point that maximizes client coverage while balancing the competing requirement of network flow. In this scenario, these locations are in the corners of the operating area.


For the full DAD problem, the computer-based apparatus determines the optimal strategy for minimizing the damage caused by the optimal jamming attack. Many variables may affect the optimal solution to the operator's, attacker's, and designer's problems. In these examples, the AP and jammer radio characteristics are modeled on the Cisco Aironet 1550 WMN AP, and client devices are modeled on a generic internal 802.11n wireless interface card. Results for two exemplary situations are presented at FIGS. 9-14 in a tri-panel format, where the left panel (FIGS. 9 and 12) depicts the best unjammed solution found (i.e., the designer's problem without jammers); the middle panel (FIGS. 10 and 13) depicts the best undefended solution found when the attacker now jams the unjammed solution (i.e., the solution to the attacker's problem (3)); and the right panel (FIGS. 11 and 14) depicts the best defended solution found when the designer chooses that network topology which minimizes the effects of the best jamming attack found (i.e., the DAD solution (5)). In these examples, the computer-based apparatus utilizes the nested DIRECT optimization, which samples many different jamming attacks for many different network designs. For each solution panel, the thickness of the lines between APs is directly proportional to delivered network flow. The computer-based apparatus runs DIRECT until the solution objective values have not changed significantly for more than 10 function evaluations, or 20 master and subproblem iterations of DIRECT (whichever occurs first).



FIGS. 9, 10, and 11 illustrate the operations of the computer-based apparatus with a network of four APs being attacked by one barrage jammer, with the fixed HQ node located in the lower left of the operating area. At FIGS. 9, 10, and 11, APs are shown as circles. At FIG. 9, the designer places four APs to cover most of the operating area. Given this fixed design, at FIG. 10, the attacker places a barrage jammer 1007 in the middle of the operating area, greatly increasing client coverage shortfall and decreasing total delivered network flow. Finally, at FIG. 11, the designer chooses a more dispersed network topology that minimizes the damage of the worst attack (generated by barrage jammer 1107), generating reduced client coverage shortfall.



FIGS. 12, 13, and 14 illustrate a similar progression of the computer-based apparatus with a network of four APs being attacked by two barrage jammers. At FIG. 12, the designer has placed four APs to cover most of the operating area. At FIG. 13, the attacker now places barrage jammers 1308 and 1309 each near an AP, rather than directly between the APs. In the DAD solution at FIG. 14, the designer again chooses an AP topology that minimizes the effectiveness of a between-AP attack. The DAD solution decreases coverage shortfall and increases network flow over the undefended solution.


Thus, provided here is a computer-implemented system for establishing a wireless mesh network resistant to degradation induced by deliberate jamming or other electromagnetic interference emanating from point sources within an operating area. The computer-implemented system provides WMN AP locations that minimize disruptions to client coverage caused by jammers, subject to constraints on network service. The computer-implemented system considers jammers placed by an intelligent adversary and identifies the AP locations λ through quantification of an objective function of the general form Z(λ,χ)=Zcoverage(λ,χ)−w Zflow(λ,χ), where Zcoverage(λ,χ) reflects resulting coverage shortfall, Zflow(λ,χ) reflects traffic flow within the WMN, and w is a scalar reflecting the relative weight of the two terms. The final set of AP locations λ identifies the locations of APs to create a WMN that is the most robust to potential degradation induced by deliberate jamming or other electromagnetic interference (EMI) emanating from point sources within an operating area.


It is to be understood that the above-described arrangements are only illustrative of the application of the principles of the present invention and it is not intended to be exhaustive or limit the invention to the precise form disclosed. Numerous modifications and alternative arrangements may be devised by those skilled in the art in light of the above teachings without departing from the spirit and scope of the present invention. It is intended that the scope of the invention be defined by the claims appended hereto.


In addition, the previously described versions of the present invention have many advantages, including but not limited to those described above. However, the invention does not require that all advantages and aspects be incorporated into every embodiment of the present invention.


All publications and patent documents cited in this application are incorporated by reference in their entirety for all purposes to the same extent as if each individual publication or patent document were so individually denoted.

Claims
  • 1. A computer-implemented system for forming a wireless mesh network comprising: a plurality of wireless access points comprising the wireless mesh network, where each wireless access point comprises a radio and a power source, and where each wireless access point is located on one AP location comprising a final plurality of access point locations, where the one AP location is a location on a geographic area and where the one AP location is associated with a two-dimensional coordinate (x,y) describing the location on the geographic area, and at least one wireless access point in radio communication with at least one other wireless access point; anda computer-based apparatus comprising non-transitory computer readable code for a method of determining the final plurality of access point locations when implemented by the computer-based apparatus, the method comprising: receiving an input of an operating-region where the input of the operating region comprises a two-dimensional topographic area representing the geographic area;dividing the operating region into a set of discrete coverage regions; andlocating access points on the operating region by, (a) generating a plurality of access point locations where each access point location is a single location on the operating region,(b) defining a plurality of arc paths, where the plurality of arcs paths includes an arc path from every access point location in the plurality of access point locations to every other access point location in the plurality of access point locations, such that every arc path originates at a first access point and terminates at a second access point,(c) generating a plurality of jammer locations where each jammer location is an individual location on the operating region, (c)(1) quantifying a client coverage Zcoverage (λ,χ) for the plurality of access point locations and the plurality of jammer locations, where the client coverage Zcoverage (λ,χ) determines a coverage shortfall for each discrete coverage region in the set of discrete coverage regions by comparing a received signal strength from every access point location in the plurality of access point locations to the each discrete coverage region, an interference from every jammer location in the plurality of jammer locations to the each discrete coverage region, and a minimum coverage threshold for the each discrete coverage region, and where the client coverage Zcoverage (λ,χ) provides a summation over all discrete coverage regions in the set of discrete coverage regions, thereby generating a quantified Zcoverage (λ,χ),(c)(2) quantifying a network flow Zflow (λ,χ) for the plurality of access point locations and the plurality of jammer locations, where the network flow Zflow (λ,χ) determines a total flow of traffic through each access point location in the plurality of access point locations based on a transmission power at every access point location in the plurality of access point locations and an arc capacity for every arc path in the plurality of arc paths which originates or terminates at the each access point location, and where the network flow Zflow (λ,χ) provides a summation over all access point locations in the plurality of access point locations, thereby generating a quantified Zflow (λ,χ),(c)(3) generating a quantified objective function Z(λ,χ) using the quantified client coverage Zcoverage (λ,χ) and the negative of the quantified network flow Zflow (λ,χ),(c)(4) determining if a stopping criterion is met, and wherein if the stopping criterion is not met, generating a second plurality of jammer locations and repeating operations (c)(1), (c)(2), and (c)(3) using the second plurality of jammer locations as the plurality of jammer locations, and wherein if the stopping criterion is met, selecting a maximum value among the quantified objective functions Z(λ,χ) generated for the plurality of access point locations, designating the maximum value of the quantified objective functions Z(λ,χ) generated for the plurality of access point locations as a benchmark objective function Z(λ,χ), and associating the benchmark objective function Z(λ,χ) with the plurality of access point locations,(d) determining if a second stopping criterion is met, and wherein if the second stopping criterion is not met, generating a second plurality of access point locations and repeating operations (b), (c), (c)(1), (c)(2), (c)(3), and (c)(4) using the second plurality of access point locations as the plurality of access point locations, and wherein if the second stopping criteria is met, selecting a minimum value among the benchmark objective functions Z(λ,χ) and establishing the plurality of access point locations associated with the minimum value of the benchmark objective functions Z(λ,χ) as the final plurality of access point locations, and providing as output the final plurality of access point locations.
  • 2. The computer-implemented system of claim 1 where the quantified objective function Z(λ,χ) is determined by: Z(λ,χ)=Zcoverage(λ,χ)−wZflow,where Z(λ,χ) is the quantified objective function Z(λ,χ), Zcoverage (λ,χ) is the quantified client coverage Zcoverage (λ,χ), w is a positive scalar, and Zflow is the quantified network flow Zflow (λ,χ).
  • 3. The computer-implemented system of claim 2 where the client coverage Zcoverage (λ,χ) compares the received signal strength from every access point location in the plurality of access point locations to each discrete coverage region, the interference from every jammer location in the plurality of jammer locations to the each discrete coverage region, and the minimum coverage threshold for the each discrete coverage region by: determining a signal-to-interference ratio for the each discrete coverage region according to σ=ρ−I, where ρ is the received signal strength from every access point location in the plurality of access point locations to the each discrete coverage region, I is the interference from every jammer location in the plurality of jammer locations to the each discrete coverage region, and σ is the signal-to-interference ratio for the each discrete coverage region; anddetermining a coverage shortfall for the each discrete coverage region according to CS=τ−σ, where τ is the minimum coverage threshold for the each discrete coverage region and CS is the coverage shortfall for the each discrete coverage region.
  • 4. The computer-implemented system of claim 2 where the network flow Zflow (λ,χ) determines the total flow of traffic through each access point location in the plurality of access point locations by determining an Fj for the each access point location, where the Fj is a traffic flow through every arc path in the plurality of arc paths which originates or terminates at the each access point location, and where Fj is dependent on at least the transmission power at every access point location in the plurality of access point locations and the arc capacity for every arc path in the plurality of arc paths which originates or terminates at the each access point location.
  • 5. The computer-implemented system of claim 1 where the computer-based apparatus selects the second plurality of access point locations by: identifying a specific plurality of jammer locations, where the specific plurality of jammer locations is the plurality of jammer locations which generated the benchmark objective function Z(λ,χ);defining multiple pluralities of interim access point locations, where every plurality of interim access point locations in the multiple pluralities of interim access point locations is a plurality of individual locations on the operating region;performing, operation (b), operation (c)(1), operation (c)(2), and operation (c)(3) of claim 1 for each plurality of interim access point locations in the multiple pluralities of interim access point locations by using the each plurality of interim access point locations as the plurality of access point locations and using the specific plurality of jammer locations as the plurality of jammer locations, thereby generating an interim quantified objective function Z(λ,χ) for the each plurality of interim access point locations, where the interim quantified objective function Z(λ,χ) for the each plurality of interim access point locations is the quantified objective function Z(λ,χ) of operation (c)(3) of claim 1;identifying a minimum interim objective function Z(λ,χ) among the interim quantified objective functions Z(λ,χ); andidentifying the second plurality of access point locations, where the second plurality of access point locations is the plurality of interim access point locations which generated the minimum interim objective function Z(λ,χ) among the interim quantified objective functions Z(λ,χ).
  • 6. The computer-implemented system of claim 1 further comprising a two-dimensional display in data communication with the computer-based apparatus, where the two-dimensional display receives the input of the operating region from the computer-based apparatus and displays the two-dimensional topographic area, and where the two-dimensional display receives the output of the computer-based apparatus and displays the final plurality of access point locations on the two-dimensional topographic area.
  • 7. The computer-implemented system of claim 6 where the two-dimensional display further receives the set of discrete coverage regions from the computer-based apparatus and the coverage shortfall for every discrete coverage region in the set of discrete coverage regions from the computer-based apparatus, and further displays the set of discrete coverage regions and the coverage shortfall for every discrete coverage region on the two-dimensional topographic area.
  • 8. The computer-implemented system of claim 1 where the stopping criterion is a selected number of iterations of operations (c)(1), (c)(2), (c)(3), and (c)(4).
  • 9. The computer-implemented system of claim 1 where the stopping criterion is a maximum elapsed time allowed for the computer-based apparatus to iteratively conduct operations (c)(1), (c)(2), (c)(3), and (c)(4).
  • 10. The computer-implemented system of claim 1 where the stopping criterion is a minimum difference between the quantified objective function Z(λ,χ) for the plurality of jammer locations and the quantified objective function Z(λ,χ) for the second plurality of jammer locations.
  • 11. A computer-implemented system for forming a wireless mesh network where the wireless mesh network includes a plurality of access points arranged to provide radio communications with a plurality of client devices comprising: a plurality of wireless access points comprising the wireless mesh network, where each wireless access point comprises a radio and a power source, and where each wireless access point is located on one AP location comprising a final plurality of access point locations, where the one AP location is a location on a geographic area and where the one AP location is associated with a two-dimensional coordinate (x,y) describing the location on the geographic area, and at least one wireless access point in radio communication with at least one other wireless access point; anda computer-based apparatus including non-transitory computer readable code for a method of determining the final plurality of access point locations when implemented by the computer-based apparatus, the method comprising: receiving an input of an operating region where the input of the operating region comprises a two-dimensional topographic area representing the geographic area;dividing the operating region into a set of discrete coverage regions;establishing a minimum coverage threshold τ for each coverage region in the set of discrete coverage regions;defining an objective function Z(λ,χ) by, defining a measure of access point locations, where the measure of access point locations is defined as a set of λ, where the set of λ comprises a plurality of λi where i is an integer from 1 to n and n is an integer greater than or equal to i and greater than 1, and where each λi is a single access point location on the operating region,defining a measure of jammer locations, where the measure of jammer locations is defined as a set of χ, where the set of χ comprises a plurality of χk where k is an integer from 1 to m and m is an integer greater than or equal to k, greater than 1, and less than n, and where each χk in the set of χ is a single jammer location on the operating region,defining a measure of client coverage Zcoverage (λ,χ), where the measure of client coverage Zcoverage (λ,χ) includes a sensitivity threshold for each coverage region, where the sensitivity threshold reflects a signal-to-interference ratio σ for the each coverage region subtracted from the minimum coverage threshold τ for the each coverage region, where the signal-to-interference ratio σ for the each coverage region is determined by a received signal strength and an interference, where received signal strength comprises a transmission power from every λi comprising the set of λ to the each coverage region, and the interference comprises a transmission power from every χk comprising the set of χ to the each coverage region, and where the measure of client coverage Zcoverage (λ,χ) provides a summation over all discrete coverage regions in the set of discrete coverage regions,defining a measure of arc paths, where the measure of arc paths is a plurality of arcs (i,j), where each arc (i,j) represents a communication path, and where the plurality of arcs (i,j) includes an arc (i,j) from every λi comprising the set of λ to every other λi comprising the set of λ,defining a measure of network flow Zflow (λ,χ), where the measure of network flow Zflow (λ,χ) includes, for each λi comprising the set of λ, an Sid for the each λi, and, for each arc (i,j) in the plurality of arcs (i,j), an Fijd for the each arc (i,j), a Tij for the each arc (i,j), and a Pij for the each arc (i,j), where the Sid for the each λi is a total flow of traffic from the each λi, the Fijd for the each arc (i,j) is a traffic flow for the each arc (i,j), the Tij for the each arc (i,j) is a total flow for the each arc (i,j), and the Pij for the each arc (i,j) is a total transmission power for the each arc (i,j), and where the measure of network flow Zflow (λ,χ) provides a summation over all λi comprising the set of λ and,defining the objective function Z(λ,χ) as Z(λ,χ)=Zcoverage (λ,χ)−w Zflow, where Z(λ,χ) is the objective function Z(λ,χ), Zcoverage (λ,χ) is the measure of client coverage Zcoverage (λ,χ), w is a positive scalar, and Zflow is the measure of network flow Zflow (λ,χ);locating access points on the operating region by, (a) generating a trial set of λ by quantifying the measure of access point locations by assigning an individual location on the operating region to each λi in the set of λ, thereby generating the trial set of λ,(b) generating a trial set of χ for the trial set of λ by quantifying the measure of jammer locations by assigning a specific location on the operating region to each χk in the set of χ, (b)(1) calculating a value of the objective function Z(λ,χ) by quantifying the measure of client coverage Zcoverage (λ,χ) and the measure of network flow Zflow (λ,χ) using the trial set of λ as the set of λ and the trial set of χ as the set of χ, and by quantifying the scalar w; (b)(2) storing the value of the objective function Z(λ,χ) and, (b)(3) determining if a stopping criterion is met, and wherein if the stopping criterion is not met, repeating operations (b), (b)(1), and (b)(2), and wherein if the stopping criterion is met, selecting the maximum value among the quantified objective functions Z(λ,χ) calculated for the trial set of λ, designating the maximum value of the quantified objective function Z(λ,χ) generated for trial set of λ as a benchmark objective function Z(λ,χ), and associating the benchmark objective function Z(λ,χ) with the trial set of λ,(c) determining if a second stopping criterion is met, and wherein if the second stopping criterion is not met, repeating operations (a), (b), (b)(1), (b)(2), and (b)(3), and wherein if the second stopping criteria is met, selecting the minimum value among the benchmark objective functions Z(λ,χ) and establishing the trial set of λ associated with the minimum value among the benchmark objective functions Z(λ,χ) as the final plurality of access point locations, and providing as output the final plurality of access point locations.
  • 12. The computer-implemented system of claim 11 further comprising a two-dimensional display in data communication with the computer-based apparatus, where the two-dimensional display receives the input of the operating region from the computer-based apparatus and displays the two-dimensional topographic area, and where the two-dimensional display receives the output of the computer-based apparatus and displays the final plurality of access point locations on the two-dimensional topographic area.
  • 13. The computer-implemented system of claim 12 where the two-dimensional display further receives the set of discrete coverage regions from the computer-based apparatus and the sensitivity threshold for every discrete coverage region in the set of discrete coverage regions from the computer-based apparatus, and further displays the set of discrete coverage regions and the sensitivity threshold for every discrete coverage region on the two-dimensional topographic area.
  • 14. The computer-implemented system of claim 11 where the stopping criterion is a selected number of iterations of operations (b), (b)(1), (b)(2), and (b)(3).
  • 15. The computer-implemented system of claim 11 where the stopping criterion is a maximum elapsed time allowed for the computer-based apparatus to iteratively conduct (b), (b)(1), (b)(2), and (b)(3).
  • 16. The computer-implemented system of claim 11 where the stopping criterion is a minimum difference between successive values of the objective function Z(λ,χ).
CROSS-REFERENCE TO RELATED PATENT APPLICATIONS

This application is a non-provisional application of and claims priority to U.S. Patent Application 62/097,938, filed on Dec. 30, 2014, which is hereby incorporated by reference in its entirety.

US Referenced Citations (2)
Number Name Date Kind
8654672 Nicholas et al. Feb 2014 B1
20140057638 Carey Feb 2014 A1
Non-Patent Literature Citations (13)
Entry
Nicholas, P., Optimal transmitter placement in wireless mesh networks, (masters thesis, Naval Postgraduate School, 2009).
Wood et al., JAM: A jammed-area mapping service for sensor networks, Proceedings of the 24th IEEE International Real-Time Systems Symposium (RTSS'03) (2003).
Ku et al., The feasibility of launching and detecting jamming attacks in wireless networks, MobiHoc 05 (2005).
Ståhlberg, Radio jamming attacks against two popular mobile networks, Seminar on Network Security, (2002).
Lazos et al, “Selective jamming/dropping insider attacks in wireless mesh networks.” IEEE Network, 25(1) (2011).
Xu et al., On adjusting power to defend wireless networks from jamming. Proceedings of the 1st ACM Conference on Wireless Security, (2008).
Wood et al., DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. 4th Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks, (2007).
Xu et al., Channel surfing and spatial retreats: defenses against wireless denial of service, Proceedings of 3rd ACM Workshop on Wireless Security (2004).
Ma et al., Mobile network management and robust spatial retreats via network dynamics, Mobile Adhoc and Sensor Systems Conference, 2005 (2005).
Thamilarasu et al., Game theoretic modeling of jamming attacks in ad hoc networks, Proceedings of the 18th International Conference on Computer Communications and Networks, (2009).
Shankar, Optimal jammer placement to interdict wireless network services, (masters thesis, Naval Postgraduate School, 2008).
Alderson et al., Solving Defender-Attacker-Defender Models for Infrastructure Defense, 12th INFORMS Computing Society Conference (2011).
Nicholas et al., “Fast, Effective Transmitter Placement in Wireless Mesh Networks,” Military Operations Research, V17 N4 (2012).
Provisional Applications (1)
Number Date Country
62097938 Dec 2014 US