Triangle and GA Methods for UAVs Jamming

We focus on how to jam UAVs network efficiently. The system model is described and the problem is formulated. Based on two properties and a theorem which helps to decide good location for a jammer, we present the Triangle method to find good locations for jammers. The Triangle method is easy to understand and has overall computational complexity of O (N). We also present a genetic algorithm(GA-) based jammingmethod, which has computational complex ofO (LMN). New chromosome, mutation, and crossover operations are redefined for the GA method. The simulation shows that Triangle and GA methods perform better than Random method. If the ratio of jammers’ number to UAVs’ number is low (lower than 1/5 in this paper), GA method does better than Triangle method. Otherwise, Triangle method performs better.


Introduction
Unmanned aerial vehicles (UAVs) are used for a wide range of missions [1]. They could be utilized within several kinds of warfare like reconnaissance, battle management, chemicalbiological warfare, information warfare, and so forth. They may also be included in other possible warfare such as command/control, force protection, suppression of enemy air defenses, and mine counter measures and psychological operations [2]. But with shared wireless communication media, they are highly sensitive to denial it of service attacks [3]. Jamming is one of these attacks. It is a malicious attack whose objective is to disrupt the communication of the victim network intentionally causing interference or collision at the receiver side [4].
Some defense strategies [4][5][6][7] are proposed by researchers against jamming in wireless networks. In [6], general concepts for use of multiple vehicles against RADAR systems are described in terms of cooperative path planning and resource allocation. The authors also present several approaches to solve the technical problems. The authors of [7] plan path for UAVs minimize exposure to threats. In [4,5] the UAVs jamming problem is formulated as a zero-sum pursuitevasion game and Isaacs' approach is used to obtain motion strategies for a pair of UAVs to evade the jamming attack.
Different from these works, we do research on jamming UAVs network effectively. Some general jamming attack techniques for wireless networks are described in [8,9]. Jamming attack and network defense strategies are introduced for wireless sensor networks in [10]. The authors of [5] provide motion strategies for a jammer to jam the communication between a pair of UAVs. However, in this paper we focus on jamming a UAVs network. Multijammers are used to work together to cause maximal damage to the UAVs network. We plan to solve the jamming problem in two steps.
Step 1 is jamming the UAVs network with a fixed topology. This topology is a snapshot of UAVs in motion at a specific time. The purpose of this step is to find good locations for jammers to disrupting more UAVs communication links. Step 2 is jamming the network for a period of time. Because UAVs are moving, the topology is continuously changing. The jamming problem is more complex than problem in Step 1. We plan to solve the problem of Step 2 after Step 1, and use the result of Step 1 to design strategies for Step 2. The work of Step 2 will not be carried out in this paper. Here, we just handle the problem of Step 1. We contribute to the UAVs jamming research as follows.
(1) We state the problem of jamming UAVs network and give out the problem formulation. (2) We introduce Triangle method and GA (genetic algorithm) based method for the jamming of UAVs network. They perform significantly better than Random method. (3) We analyze the simulation result and show how to choose the UAVs jamming method. With fewer jammers, GA method should be chosen. However, when more jammers are available, Triangle method should be considered firstly.
The rest of the paper is organized as follows. The UAVs jamming problem is introduced formulated and analyzed in Section 2. Based on the theorem proved, Triangle jamming method is presented in Section 3. Evolutionary algorithm of GA is introduced and modified for jamming UAVs network in Section 4. The simulation is carried out and the result is analyzed in Section 5. Finally, conclusion is drawn and our future work is planned in Section 6.

Jamming Problem Statement
2.1. UAVs System Architecture. We consider jamming the communication in a UAVs network as shown in Figure 1. The UAVs communicate with each other through data links like Link-16 [11]. The location of a UAV in the global coordinate frame is denoted as ( , , ), where , , and represent the UAV's longitude, latitude, and altitude, respectively. The set of all UAV locations is denoted as . Usually the UAVs locate in a restricted area according to their specific tasks. Figure 1 presents such a task area which is a cylinder. The cylinder's radius and height are set to 20 km and 9 km, respectively.

Jamming Power to Signal Power Ratios (JSR) Model.
The jamming power to signal power ratio at the receiver determines the degree to which jamming will be successful. For digital signals, the jammer's goal is to raise this ratio to a level such that the BER is above a certain threshold. For analog voice signals, the goal is to reduce the articulation performance so that the signals are difficult to understand. The following JSR models at the receiver's antenna are defined in [12].
(1) Model, (2) Ground reflection propagation, (3) Nicholson, where is the power of the jammer's transmitting antenna, is the power of the transmitter, is the antenna gain from transmitter to receiver, is the antenna gain from receiver to transmitter, is the antenna gain from jammer to receiver, is the antenna gain from receiver to jammer, ℎ is the height of the jammer antenna above the ground, ℎ is the height of the transmitter antenna above the ground, is the Euclidean distance between transmitter and receiver, and is the Euclidean distance between jammer and transmitter.
We use the Nicholson JSR model (3) in this paper. The value of each parameter may be different in different scenarios. We consider scenario in which parameters are set as follows: When we put parameters of (4) into (3), = ( / )10 4log 10 ( / ) = (3 × 1 × 1/1 × 1 × 1)10 4log 10 ( / ) = 1.2. We get / = 0.79527. If is less than /0.79527 = 1.25743 , then the receiver cannot get data from the sender successfully. Here, is the distance between a jammer and a UAV, and is the distance between a UAV and another UAV. The condition that a UAV's communication link for receiving data from another UAV is jammed can be represented as

Problem Formulation.
When formulating the UAVs jamming problem, the following notations are used. = {1, 2, . . . , } is the set of UAVs, is an integer and ≥ 1; = {1, 2, . . . , } is the set of jammers, is an integer and ≥ 1, is used to represent UAV , and and are the location of UAV and jammer . The location of UAV is assumed to be restricted into its task area . The valid location of UAV is ∈ .
All UAVs communicate with bidirectional communication links. UAV uses link Link → to send packets to . At the same time, UAV sends packets to through Link → . The jamming effect is denoted as JE . When JE = 1, UAV will not get packets from ; that is, Link → is jammed by jammer . Otherwise, Link → is not jammed by jammer . JE is represented as The total jamming effect can be computed through adding jamming effect of all links and is denoted as = ∑ ∈ ∑ , ∈ JE . Therefore, the objective function for jammers is to maximize . The jamming problem can be modeled as subject to: ∈ , ∈ . (7)

Problem Analysis.
A term of jamming area is used for representing an area in which UAVs' receiving links are disrupted by one or more jammers. Jamming area is defined as follows.
Definition 1 (jamming area). UAV is sending packets to through Link → . UAV is the sender and is the receiver. The jamming area JA is such an area in which UAV cannot get the packets from through Link → , because of the jamming effect of jammers.
As shown in Figure 2, when UAV 1 is sending packets, UAVs 2 and 3 cannot get its packets through Link 1 → 2 and Link 1 → 3 , because of the existence of jammer 1. For this case, UAV 1 locates such a point which belongs to the jamming area of UAVs 2 and 3. They are denoted as point ( 1 ) ∈ JA 21 and point ( 1 ) ∈ JA 31 , respectively. However, the point of UAV 1 does not belong to the jamming area of UAV 4, point ( 1 ) ∉ JA 41 .
Property 1 (asymmetry). When parameters are set as condition (4), if point ( ) ∈ JA , point of UAV may belong to JA or may not.
Proof. As shown in Figure 2, the distance between UAV 1 and 2 is Len 1 . When UAV 1 is the sender and UAV 2 is the receiver, UAV 2's jamming area includes all the points whose distance to UAV 2 is less than 1.25743Len 1 . When jammer 1 locates at Point 1, the distance between Point 1 and UAV 1 is less than 1.25743Len 1 , so Inequality (5) holds, point ( 1 ) ∈ JA 21 , and point ( 2 ) ∈ JA 12 . When jammer 1 locates at Point 2, the distance between Point 2 and UAV 1 is larger than 1.25743Len 1 , so Inequality (5) does no hold anymore. At this case, point ( 1 ) ∈ JA 21 , but point ( 2 ) ∉ JA 12 .
Property 2 (existence of good location). When parameters are set as condition (4), for any two UAV and , there exists location point good for a jammer to disrupt both Link → and Link → ; that is, point good ∈ JA and point good ∈ JA . When a jammer locates at point good , communication between UAV and will be blocked.
Proof. When the value of each parameter is set as condition (4), Inequality (5) holds. For any two UAV , , the jamming area of UAV will cover the point of UAV , and vice versa. Then there definitely exists an intersection between the two jamming areas. For example, there is an intersection between the jamming areas of UAV 4 and 5 in Figure 2. When a jammer is located at any one point in such an intersection, UAV / will not receive packets from UAV / ; that is, the communication between UAV , will be blocked.
Properties 1 and 2 show the fact that the jamming effect of a jammer is closely related to the jammer's location. Property 1 tells us we can find a location for a jammer to prevent a UAV from receiving packets from others, under condition (4). However the jammer may not prevent the UAV from sending packets successfully. Property 2 states that it is possible to find a location for a jammer to block any two UAVs' communication. Based on these, it is clearly that if we plan to maximize (7), we should focus on searching such locations for jamming.

Triangle Method
For achieving better jamming effect, jammers should be placed to appropriate locations. We present Triangle method to search locations for jammers. The idea of Triangle method is simple. It divides all UAVs into groups. Each group has three UAVs. The algorithm for forming such groups is descripted in Algorithm 2 from Steps (1) to (11). All UAVs are put into a temporary set UAV in Step (1). The total number of UAV groups is calculated in Step (2) and saved in gr num .
Steps (3) and (4) initialize all UAV groups to null. Function getrandom ( UAV ) in Step (7) returns a random UAV in UAV . Function neighbors ( 1 , UAV , 2 , 3 ) in Step (8) may return two closest neighbors of 1 in UAV and assign to 2 and 3 , respectively. If the number of neighbors in UAV is less than two, the function may return one neighbor or null. In Steps (9) and (10), 1 and its returned neighbors are added to a group, and then they are removed from UAV . The group forming process continues till all groups are formed.
Steps from (12) to (15) find locations for UAV groups. The function selectpoint ( ) works as follows.
(1) The group has three UAVs which usually form a triangle. (a) The function calculates the distances between each pair of two points; (b) it finds the two short sides; (c) it selects the point which connects the two short sides as the location for the group.
(2) The group has two UAVs which usually form a line. (a) The function calculates the midpoint between each pair of two points; (b) it returns the midpoint as the location for the group.
(3) The group has only one UAV. The function returns the location of the UAV as the location for the group.
The selecting process continues till all locations for groups are found. Function assignlocations ( select , ) assigns the locations found to jammers. If the number of jammer is equal to or less than gr num , then the first elements of select are assigned to jammers accordingly. If > gr num , then gr num jammers are assigned the locations of select , and − gr num jammers are assigned random locations.
The Triangle method is based on following theorem. (4), function selectpoint ( ) outputs an optimal location on which if a jammer is placed, all communications among UAVs in the group will be disrupted.

Theorem 3. When parameters are set as condition
Proof. (1) There are 3 UAVs in the group. As shown in Figure 3, the side length Len 3 is not less than Len 1 and Len 2 . So the jammer should be located at the point of UAV 1. When the values of parameters are set as condition (4), Inequality (5) holds. For any two UAV , , the jamming area of UAV will cover the point of UAV , and vice versa. So point ( 3 ) ∈ JA 23 , point ( 2 ) ∈ JA 32 , point ( 1 ) ∈ JA 21 , and point ( 1 ) ∈ JA 31 . Because Len 1 ≤ Len 3 and Len 2 ≤ Len 3 , point ( 1 ) ∈ JA 23 and point ( 1 ) ∈ JA 32 . Since the jammer is placed at the same location of UAV 1, → 0, point ( 1 ) ∈ JA 12 , and point ( 1 ) ∈ JA 13 . Therefore all communications among UAVs in the group will be disrupted by the jammer which locates at the point of UAV 1.
(2) There are 2 UAVs in the group. As shown in Figure 3, the jammer will be placed at the midpoint between UAVs 4 and 5. Obviously, point ( 4 ) ∈ JA 54 and point ( 5 ) ∈ JA 45 . For Len 4 ≤ Len 5 , point (Mid) ∈ JA 54 , and point (Mid) ∈ JA 45 . Therefore the communication between UAVs 4 and 5 will be disrupted by the jammer.
(3) There is only 1 UAV in the group. The location of the UAV is selected as the location for the jammer. At this case, → 0, > 0 in (6) always holds, and all communication links from and to the UAV will be blocked.
In Algorithm 2, the while loop (Step (6)) will run N times at most, and N is the number of UAVs. The function neighbors (Step (8)) search UAV's two neighbors, and each UAV will be visited at most two times. So the code from Steps (6) to (11) has computational complexity of (N 2 ). The code of Step (16) has computational complexity of (M), where M is the number of jammers. The overall computational complexity of Algorithm 2 is (N 2 ).

GA-Based Jamming Method
GAs are global optimization techniques that avoid many of the shortcomings that exist in classical local search techniques on difficult search spaces [13]. GAs use operators such as reproduction, crossover and mutation as means of preserving beneficial information with the overall goal of finding a better solution to the problem. In addition, genetic algorithms work using codification of the parameter space rather than the parameters themselves. The objective function can be easily defined as a measure of fitness for solution performance which allows the genetic algorithm to retain useful solutions and inhibit those which are less useful.
We propose a GA-based method to solve the UAV jamming problem, as shown in Algorithm 4. The key to finding a good solution using a GA lies in developing a good chromosome representation of candidate solutions to the problem. The chromosome we used includes three parts, , where , , and are of float type and represent a jammer's longitude, latitude, and altitude, respectively. When two chromosomes 1 1 1 and 2 2 2 cross over, a new chromosome is formed new new new . We define them as new = ( 1 + 2 )/2, new = ( 1 + 2 )/2, and new ( 1 + 2 )/2. A chromosome mutates with a probability of mutation . The mutation operation is defined as new = ±0.8 × old , new = ± 0.8 × old , and new = ± 0.8 × old .
A solution of the jamming problem consists of chromosomes, where is the number of jammers. The population has L solutions. Initially, a random parent population 0 is created. Then binary tournament selection [14], crossover, and mutation operators are used to create an offspring population 0 which has 2L solutions. The next parent population 1 is created by selecting L solutions from 0 with binary tournament method. The new offspring population 1 is formed through crossover and mutation operation. The process continues until the last population 1 is reached.
The procedure of evaluating the fitness (Step (3)) requires N×N×M computations, where N and M are the number of UAVs and jammers, respectively. Its computational complex is (MN 2 ). Since binary tournament solution is used, the procedure of selecting (Step (4)) has computational complex of (P). The new solutions creating procedure (Step (5)) have computational complex of (P + PN). Therefor the computational complex of Algorithm 4 is (LMN 2 ), and L is the number of evolution iterations.

Simulation
The methods provided by this paper are used to jam the communication among 20, 30, 40, and 50 UAVs with 1∼ 20 jammers, respectively. The simulation result is shown in Figure 4. We also include a Random method for comparing Triangle and GJM methods. The Random method works in a simple way. The jammers are located in random positions in this method. The Random method has computational complexity of (M), where M is the number of jammers.
We define a new metric to measure the performance of each jamming method.
We can see easily from Figure 4 that the number of jammers has tight relation to the overall jamming performance. In Triangle and GA methods, more jammers lead to higher jamming performance. In Figures 4(a) and 4(b), when 8 or more jammers are used, the RJTs of Triangle and GA reach 98% and 97%. In Figures 4(c) and 4(d), when 10 or more jammers are used, the RJTs of Triangle and GA reach 98% and 97%. When 11 or more jammers are used, the RJTs of both Triangle and GA reach 97%. For Random method, it is obvious that, at most time, more jammers yield higher performance. It is also clear that Triangle and GA methods give out better result than Random method. But there is an exception when 1 jammer is used to jam the communication network with 40 UAVs. All jammers are randomly placed in Random method. One of them happens to be assigned a good location. So the Random method performs better than the Triangle method as shown in Figure 4(c), when both methods use one jammer. This can be explained with the probability. Let the probability for one jammer assigned a good location be (0 < < 1). When there are two jammers, the probability becomes 2 . When there are jammers, the probability decreases to . So with the number of jammers increasing, the probability of all jammers assigned good locations is decreasing. That is why, in most cases, the jammers in Random method perform worse than jammers in Triangle and GA methods in Figure 4. Figure 4 shows that, with a small number of jammers, GA method has better performance than Triangle method. However, with the number of jammers increasing, the performance of Triangle method is improved more than GA method. The gap between these two methods is narrowed. When more jammers are used, Triangle method outputs similar results as GA method does and then does better than GA method. The reason is that GA is a global optimization algorithm, and Triangle method is a local optimization algorithm. When the number of jammers is small, GA can find better locations for jammers than Triangle method does. However, GA method has difficulties to find good locations for a big number of jammers, because of the significantly increased search space. Triangle method outperforms when more numbers of jammers are used. Because the local optimization location for each group is guaranteed, the overall performance (added performance of all jammers) can also be guaranteed. From the simulation, we get a roughly result that when the ratio of jammers' number to UAVs' number is lower than 1/5, GA method may perform better than Triangle method. Otherwise, Triangle method may outperform GA method.
It is also obvious that there is a threshold of the number of jammers . When is smaller than , with the increasing of the number of jammers, the overall jamming performance increases rapidly. When is larger than , with the number increasing, the overall jamming performance increases very slowly. As shown in Figure 4, the thresholds are 7, 9, 10, 11, 12, and 13 for jamming the network with 20, 30, 40, 50, 60, and 70 UAVs, respectively. To maximize the effect of jammers, should be set as equal to or smaller than . For example, when jamming the communication among 50 UAVs, using 11, 12, or 13 jammers outputs the same RJTs in Triangle, GA, or Random methods, respectively. Therefore, 11 jammers are enough for achieving such jamming results. So adding one or two more jammers is meaningless for improving the jamming performance. The thresholds are task dependent and may be decided according to different scenarios.

Conclusion
In this paper, we focus on jamming UAVs network efficiently. Firstly, the system architecture is described and the jamming problem is formulated. We analyze the system's two properties. Secondly, a theorem, which helps to decide locations for jammers, is proved. Based on this theorem, we introduce the Triangle method to solve the jamming problem. Triangle method divides all UAVs into groups. Each group has at most three UAVs. It finds the best location for jamming all UAVs in each group. The overall computational complexity of Triangle method is (N 2 ), where N is the number of UAVs. Thirdly, we present a GA-based jamming method. The chromosome consists of the longitude, latitude, and altitude of the jammer. New mutation and crossover operations are also redefined. GA method's computational complex is (LMN 2 ), where L, M, and N are the number of evolution iterations, jammers, and UAVs, respectively.
The two methods besides a Random method are simulated in the scenario given in Section 2. The simulation uses number of jammers range from 1 to 20 to jam the network with 20, 30, 40, and 50 UAVs, respectively. The chromosome mutation probability is set as mutation = 0.1. The result shows the following.
(2) At most cases, Triangle and GA methods are significantly better than Random method.
(3) With a small number of jammers, GA method has better performance than Triangle method. However, with the number of jammers increasing, the performance of Triangle method is improved more than GA method. When the ratio of jammers' number to UAVs' number is higher than 1/5, Triangle method does better than GA method.
(4) The overall computational complexity of Triangle method is (N 2 ) which is lower than (LMN 2 ) of GA method. If computing speed is required, especially for the real time application, Triangle method should be considered.
It should be noted that this paper just does the work of the first step. Here, we assume the topology of UAVs is fixed and does not change. The properties and theorem are deduced under condition (4). The condition can be relaxed to ≥ . It will be proved in our next step. We will consider jamming the UAVs networks with moving nodes, which have highly dynamic topologies. The work of this paper is the basis for the next step.