Skip to content Skip to main navigation Report an accessibility issue

Estimating Wireless Mesh Network Vulnerability

Dr. Hugh Medal
ISE Assistant Professor
University of Tennessee
Friday, April 5, 2019   2:30-3:30pm
JDT 410

Abstract

This paper studies the problem of placing a set of jammers in 3-D space to minimize the throughput of a wireless communication network. The main goal of this paper is to study the effects of jamming under the following models of interference: physical, capture, protocol, and interference range. This paper presents a mixed-integer programming model and branch-and-cut procedure for the jammer location problem under several models of interference. We implement multiple valid inequalities including clique and odd-cycle inequalities to speed-up the branch-and-cut algorithm. Numerical experiments demonstrate the effect of different interference models on runtime and solution tractability.

Bio

Dr. Hugh Medal is an assistant professor in the Department of Industrial and Systems Engineering at the University of Tennessee. His research and teaching interests are in optimization, with an emphasis on stochastic optimization and black-box/derivative-free optimization. He has applied optimization methodologies to a variety of problems such as preparing for wildfires, measuring the vulnerability of wireless networks, and mitigating risks in supply chains and has published articles in journals such as Naval Research Logistics, IISE Transactions, Transportation Research Part B, and Networks. His research has been funded by agencies such as the U.S. Army Engineering Research and Development Center, the U.S. Joint Fire Science Program, and the U.S. Department of Homeland Security. He is a member of the Institute for Operations Research and the Management Sciences and currently serves on the board of directors for the Operations Research division of the Institute for Industrial and Systems Engineering.