Research on Topologically Optimized Anti-jamming Technology for Tactical MANETs

LOU Li;FAN Jian-hua;XU Cheng

Acta Armamentarii ›› 2016, Vol. 37 ›› Issue (9) : 1662-1669. DOI: 10.3969/j.issn.1000-1093.2016.09.016
Paper

Research on Topologically Optimized Anti-jamming Technology for Tactical MANETs

  • LOU Li1, FAN Jian-hua1, XU Cheng2
Author information +
History +

Abstract

The military wireless communication network based on MANET architecture is characterized by a variety of communication modes and flexible self-organizations of nodes, but the multi-hop wireless transmission links are vulnerable to interference. In addition to using a series of traditional anti-jamming technologies at physical and link layers, the control and optimization means of network topology for getting better invulnerability and survivability become key issues in the research of anti-jamming policy of network layer. In dynamic electromagnetic interference environment, the tolerance of node or link failures is the basis of improving the survivability of the upper layer protocols, as well as the network recovery capability. According to the complex system theory, graph theory and random process theory, the influence of dynamic communication condition in battlefield is analyzed, and then a topology optimization method based on the measures of local stability is proposed in view of the importance of nodes and the connectivity of topology in order to construct a more reliable network. Simulated results show that the proposed method provides satisfactory efficiency and can improve the anti-jamming and self-optimizing performances of military communication networks under dynamic transmission.

Key words

ordnance science and technology / military wireless communication / tactical MANET / network anti-jamming / complex system theory / topology optimization

Cite this article

Download Citations
LOU Li, FAN Jian-hua, XU Cheng. Research on Topologically Optimized Anti-jamming Technology for Tactical MANETs. Acta Armamentarii. 2016, 37(9): 1662-1669 https://doi.org/10.3969/j.issn.1000-1093.2016.09.016

References

[1] MarttinenA, Wyglinski A M, Jantti R. Statistics-based jamming detection algorithm for jamming attacks against tactical MANETs[C]∥IEEE Military Communications Conference. Baltimore, Maryland, US:IEEE, 2014: 501-506.
[2] 金鑫,娄文忠,王辅辅. 基于Ad Hoc无线传感网络的三维智能组网优化算法设计研究[J].兵工学报.2015, 36(5):874-878.
JIN Xin, LOU Wen-zhong, WANG Fu-fu. Research on optimization algorithm design of 3D intelligent network based on Ad Hoc wireless sensor networks[J]. Acta Armamentarii, 2015,36(5):874-878. (in Chinese)
[3] 姚富强. 通信抗干扰工程与实践[M].北京:电子工业出版社,2012:15-21.
YAO Fu-qiang. Communication anti-jamming engineering and practice[M].Beijing: Publishing House of Electronics Industry,2012:15-21. (in Chinese)
[4] 李少谦,程郁凡,董彬虹,等. 智能抗干扰通信技术研究[J].无线电通信技术,2012, 38(11):1-4.
LI Shao-qian,CHENG Yu-fan,DONG Bin-hong,et al. Research on intelligent anti-jam communication technique[J]. Radio Communications Technology, 2012, 38(11):1-4.(in Chinese)
[5] Zhu C, Zheng C L, Shu L, et al. A survey on coverage and connectivity issues in wireless sensor networks[J]. Journal of Network and Computer Applications, 2012, 35(2):619-632.
[6] Sethu H, Gerety T. A new distributed topology control algorithm for wireless environments with non-uniform path loss and multipath propagation[J]. Ad Hoc Networks, 2010, 8(3):280-294.
[7] Yavuz F, Zhao J, Yagan O, et al. On secure and reliable communications in wireless sensor networks: towards k-connectivity under a random pairwise key predistribution scheme[C]∥2014 IEEE International Symposium on Information Theory. Hawaii, US:IEEE,2014:2381-2385.
[8] Miyao K, Nakayama H, Ansari N, et al. LTRT: an efficient and reliable topology control algorithm for ad-hoc networks[J]. IEEE Transactions on Wireless Communications, 2009, 8(12):6050-6058.
[9] GuptaP,Kumar P R.Towards an information theory of large networks:an achievable rate region[J].IEEE Transactions on Information Theory,2003,49(8):1877-1894.
[10] Li N, Hou J C, Sha L. Design and analysis of an MST-based topology control algorithm[J]. IEEE Transactions on Wireless Communications, 2005, 4(3):1195-1206.
[11] Douglas B. West. Introduction to Graph Theory[M].Berkeley:Pearson Education LTD, 2000.
[12] 安辉耀,王新安,李挥,等. 移动自组网中的先进路由算法与路由协议[M].北京:科学出版社,2009.
AN Hui-yao, WANG Xin-an, LI Hui, et al.Advanced routing algorithm and routing protocol in mobile ad hoc networks[M]. Beijing: Science Press, 2009. (in Chinese)
[13] Pei G. Wireless hierarchical routing protocol with group mobility[C]∥ IEEE Wireless Communications andNetworking Conference. New Orleans,US:IEEE, 1999.
[14] Rajaram S M. An enhanced clustering algorithm for mobile ad hoc networks to improve the throughput[J]. International Journal of Mobile Network Design & Innovation, 2011, 3(3):191-197.
[15] Singhal S, Daniel A K. Cluster head selection protocol under node degree, competence level and goodness factor for mobile ad hoc network using AI technique[C]∥International Conference on Advanced Computing and Communication Technologies. Rohtak, India:ICAC,2014,2014:415-420 .
[16] Mir Z H, Ko Y B. Adaptive neighbor-based topology control protocol for wireless multi-hop networks[J]. EURASIP Journal on Wireless Communications and Networking, 2012(1):1-17.
[17] Newman M E J. The structure and function of complex networks [J]. SIAM Review, 2002,45(2):167-256.
[18] 高随祥.图论及网络流理论[M].北京:高等教育出版社,2009.
GAO Sui-xiang. Graph theory and network flow theory[M].Beijing: Higher Education Press, 2009. (in Chinese)
[19] 谭跃进,吴俊,邓宏钟. 复杂网络抗毁性研究进展[J].上海理工大学学报, 2011,33(6):653-668.
TAN Yue-jin, WU Jun, DENG Hong-zhong. Progress in invulnerability of complex networks [J]. University of Shanghai for Science and Technology,2011, 33(6):653-668.(in Chinese)
[20] Cohen R, Havlin S. Complex networks: structure, robustness and function[M].New York:Cambridge University Press,2014.

405

Accesses

0

Citation

Detail

Sections
Recommended

/