Radio Communications Interdiction Problem under deterministic and probabilistic jamming

buir.contributor.authorTanergüçlü, Türker
buir.contributor.authorKaraşan, Oya Ekin
buir.contributor.authorKaraşan, Ezhan
dc.citation.epage217en_US
dc.citation.spage200en_US
dc.citation.volumeNumber107en_US
dc.contributor.authorTanergüçlü, Türkeren_US
dc.contributor.authorKaraşan, Oya Ekinen_US
dc.contributor.authorAkgün, I.en_US
dc.contributor.authorKaraşan, Ezhanen_US
dc.date.accessioned2020-01-28T08:04:03Z
dc.date.available2020-01-28T08:04:03Z
dc.date.issued2019
dc.departmentDepartment of Electrical and Electronics Engineeringen_US
dc.departmentDepartment of Industrial Engineeringen_US
dc.description.abstractThe Radio Communications Interdiction Problem (RCIP) seeks to identify the locations of transmitters on the battlefield that will lead to a robust radio communications network by anticipating the effects of intentional radio jamming attacks used by an adversary during electronic warfare. RCIP is a sequential game defined between two opponents that target each other’s military units in a conventional warfare. First, a defender locates a limited number of transmitters on the defender’s side of the battlefield to optimize the relay of information among its units. After observing the locations of radio transmitters, an attacker locates a limited number of radio jammers on the attacker’s side to disrupt the communication network of the defender. We formulate RCIP as a binary bilevel (max–min) programming problem, present the equivalent single level formulation, and propose an exact solution method using a decomposition scheme. We enhance the performance of the algorithm by utilizing dominance relations, preprocessing, and initial starting heuristics. To reflect a more realistic jamming representation, we also introduce the probabilistic version of RCIP where a jamming probability is associated at each receiver site as a function of the prevalent jamming to signal ratios leading to an expected coverage of receivers as an objective function. We approximate the nonlinearity in the jamming probability function using a piecewise linear convex function and solve this version by adapting the decomposition algorithm constructed for RCIP. Our extensive computational results on realistic scenarios show the efficacy of the solution approaches and provide valuable tactical insights.en_US
dc.description.provenanceSubmitted by Onur Emek (onur.emek@bilkent.edu.tr) on 2020-01-28T08:04:03Z No. of bitstreams: 1 Bilkent-research-paper.pdf: 268963 bytes, checksum: ad2e3a30c8172b573b9662390ed2d3cf (MD5)en
dc.description.provenanceMade available in DSpace on 2020-01-28T08:04:03Z (GMT). No. of bitstreams: 1 Bilkent-research-paper.pdf: 268963 bytes, checksum: ad2e3a30c8172b573b9662390ed2d3cf (MD5) Previous issue date: 2019en
dc.embargo.release2022-07-01
dc.identifier.doi10.1016/j.cor.2019.03.013en_US
dc.identifier.issn0305-0548
dc.identifier.urihttp://hdl.handle.net/11693/52866
dc.language.isoEnglishen_US
dc.publisherElsevieren_US
dc.relation.isversionofhttps://dx.doi.org/10.1016/j.cor.2019.03.013en_US
dc.source.titleComputers and Operations Researchen_US
dc.subjectDefender–attacker problemen_US
dc.subjectInterdictionen_US
dc.subjectBilevel programmingen_US
dc.subjectElectronic warfareen_US
dc.subjectTactical military radio communicationsen_US
dc.titleRadio Communications Interdiction Problem under deterministic and probabilistic jammingen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Radio_Communications_Interdiction_Problem_under_deterministic_and_probabilistic_jamming.pdf
Size:
1.15 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: