Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014, Article ID 713430, 8 pages
http://dx.doi.org/10.1155/2014/713430
Research Article

Triangle and GA Methods for UAVs Jamming

1College of Communication Engineering, Chongqing University, Chongqing 400030, China
2Center of Communication & Tracking Telemetering Command, Chongqing 400030, China

Received 7 May 2014; Accepted 6 July 2014; Published 5 August 2014

Academic Editor: Qingsong Xu

Copyright © 2014 Yu Zhang and Lisheng Yang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. K. Hartmann and C. Steup, “The vulnerability of UAVs to cyber attacks—an approach to the risk assessment,” in Proceedings of the 5th International Conference on Cyber Conflict (CyCon '13), pp. 1–23, 2013.
  2. P. Cevik, I. Kocaman, A. S. Akgul, and B. Akca, “The small and silent force multiplier: a swarm UAV-electronic attack,” Journal of Intelligent and Robotic Systems: Theory and Applications, vol. 70, no. 1–4, pp. 595–608, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa, “Performance of IEEE 802.11 under Jamming,” Mobile Networks and Applications, vol. 18, no. 5, pp. 678–696, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. S. Bhattacharya and T. Basar, “Game-theoretic analysis of an aerial jamming attack on a UAV communication network,” in Proceedings of the American Control Conference (ACC '10), pp. 818–823, July 2010. View at Scopus
  5. S. Bhattacharya and T. Başar, “Differential game-theoretic approach to a spatial jamming problem,” in Advances in Dynamic Games, vol. 12 of Annals of the International Society of Dynamic Games, pp. 245–268, Birkhäuser, Boston, Mass, USA, 2013. View at Publisher · View at Google Scholar · View at MathSciNet
  6. M. J. Mears, “Cooperative electronic attack using unmanned air vehicles,” in Proceedings of American Control Conference, pp. 3339–3347, 2005.
  7. Y. M. Chen and W.-Y. Wu, “Cooperative electronic attack for groups of unmanned air vehicles based on multi-agent simulation and evaluation,” International Journal of Computer Science Issues, vol. 9, no. 2, p. 1, 2012. View at Google Scholar
  8. W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks: attack and defense strategies,” IEEE Network, vol. 20, no. 3, pp. 41–47, 2006. View at Publisher · View at Google Scholar · View at Scopus
  9. A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou, “A survey on jamming attacks and countermeasures in WSNs,” IEEE Communications Surveys and Tutorials, vol. 11, no. 4, pp. 42–56, 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. M. Li, I. Koutsopoulos, and R. Poovendran, “Optimal jamming attack strategies and network defense policies in wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 9, no. 8, pp. 1119–1133, 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. B. Lee, E. Jeong, and S. Choe, “Simulator for tactical data link system with anti-jamming capability,” in Proceedings of the 15th International Conference on Advanced Communication Technology (ICACT '13), pp. 789–793, January 2013. View at Scopus
  12. R. Poisel, Modern Communications Jamming Principles and Techniques, Artech House, 2011.
  13. B. Skinner, S. Yuan, S. Huang et al., “Optimisation for job scheduling at automated container terminals using genetic algorithm,” Computers and Industrial Engineering, vol. 64, no. 1, pp. 511–523, 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. R. Sivaraj and T. Ravichandran, “A review of selection methods in genetic algorithm,” International Journal of Engineering Science & Technology, vol. 3, no. 5-6, pp. 3792–3797, 2011. View at Google Scholar