I have also used network interdiction modeling to study the vulnerability of wireless networks. Although the field of network interdiction has produced a mature set of modeling and algorithmic tools, these models and algorithms are tailored for “wired” networks, such as supply chains and road networks, and not for wireless ones. Thus, there is a need to extend the concept of interdiction modeling to the wireless domain.
One of my former Ph.D. students has developed a Bender’s decomposition approach for optimally locating jamming devices during a flow jamming attack on a wireless communication network. Another student has studied how to compute the optimal placement of jamming devices within an array of access points as well as how to optimally design such an array that is subject to jamming attacks.
I have also developed a branch-and-cut approach for optimally locating jamming devices given that the wireless network is subject to protocol interference. I am also working on a variation of this approach for studying the version of the problem in which the network is subject to physical interference as well as a study of how directional antennas and limited battery capacity influences vulnerability to jamming. These studies give insight into how to protect wireless networks and how to disable malicious wireless networks. This work is funded by the U.S. Army Engineering Research and Development Center.
Selected Publications
-
The wireless network jamming problem subject to protocol interference using directional antennas and with battery capacity constraints
JD Huff, WB Leonard, HR Medal. (2022). International Journal of Critical Infrastructure Protection 39, 100572
Publication Year: 2022
[Link to Article] Abstract -
A mixed-integer programming approach for optimizing flow jamming attacks
Satish Vadlamani, Hugh Medal, David Schweitzer, Apurba Nandi, Burak Ekşioğlu. Vadlamani, S., Schweitzer, D., Medal, H., Nandi, A., & Eksioglu, B. (2018). A mixed-integer programming approach for locating jamming devices in a flow-jamming attack. Computers & Operations Research, 95, 83-96.
Publication Year: 2018
[PDF] [Link to Article] Abstract -
Allocating Protection Resources to Facilities When the Effect of Protection is Uncertain
Hugh R. Medal, Edward A. Pohl, Manuel D. Rossetti. IIE Transactions 48(3), 220–234.
Publication Year: 2016
[PDF] [Link to Article] Abstract -
The wireless network jamming problem subject to protocol interference
Hugh R. Medal. Networks 67(2), 111–125
Publication Year: 2016
[PDF] [Link to Article] Abstract
Using high-performance computing to simulate the vulnerability of wireless communication networks to jamming attacks
/0 Comments/in Funding - Wireless Network Security /by Academic Web PagesAgency: Engineer Research and Development Center (U.S. Army)
Researcher: Medal, H.R. (PI)
Amount: $106,310
Abstract:
WD62 (HPC-based Sensor Analytics) Task 5: Modeling and Simulation of Wireless Sensor Networks
/0 Comments/in Funding - Wireless Network Security, Wireless Network Security /by Academic Web PagesAgency: United States Army Tank Automotive and Armaments Command
Researcher: Medal, H.R. (PI)
Amount: $254,384
Abstract: