Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer

Sourabh Bhattacharya, Tamer Başar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this work, we analyze the problem of maintaining connectivity in a network of mobile agents in the presence of a jammer. This is a variation of the standard connectivity maintenance problem in which the issue arises due to limitations in communications and sensing model for each agent. In our work, the limitations in communications are due to the presence of a jammer in the vicinity of the mobile agents. First, we present a differential game-theoretic formulation of the problem and provide the necessary conditions for optimal controls for each agent. Then we present a model that constructs a state-dependent graph based on the state-space of the agents. We use tools from algebraic-graph theory on the state-dependent graph in order to provide locally optimal control laws for the agents in the formation. Finally, we present some simulations to validate the proposed control scheme.

Original languageEnglish (US)
Title of host publication2010 49th IEEE Conference on Decision and Control, CDC 2010
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages3560-3565
Number of pages6
ISBN (Print)9781424477456
DOIs
StatePublished - 2010
Event49th IEEE Conference on Decision and Control, CDC 2010 - Atlanta, United States
Duration: Dec 15 2010Dec 17 2010

Publication series

NameProceedings of the IEEE Conference on Decision and Control
ISSN (Print)0743-1546
ISSN (Electronic)2576-2370

Conference

Conference49th IEEE Conference on Decision and Control, CDC 2010
Country/TerritoryUnited States
CityAtlanta
Period12/15/1012/17/10

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Modeling and Simulation
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer'. Together they form a unique fingerprint.

Cite this