YEONG-SUNG LINWang, Y.-SY.-SWangWang, J.-WJ.-WWangChan, C.-H.C.-H.Chan2020-02-112020-02-112012https://scholars.lib.ntu.edu.tw/handle/123456789/457468Continuity of wireless networks is a critical issue for wireless networks. Unfortunately, there is a category of attacks that seriously threatens the continuity of wireless networks: the jamming attack. The open nature of wireless mediums makes them vulnerable to any wireless capable devices. However, there have not been any studies that address the issue of how the service providers should deploy its topology or allocate its resources to minimize the impact of jamming attacks launched by malicious attackers. In this paper, a mathematical model formulating an attack-defense scenario of the problem is proposed. The results show when deploying defense resources, considering hops from the core node is more useful than link degrees. With the advantage of simulations, the concept of incomplete information can be taken into account which, while increasing the difficulty of the problem, makes the problem closer to reality. © 2012 IEEE.Honeypots; Incomplete Information; Jamming Attack; Mathematical Programming; Network Attack and Defense; Network Survivability; Resource Allocation; Wireless Mesh Networks[SDGs]SDG16Honeypots; Incomplete information; Jamming attacks; Network attack; Network survivability; Jamming; Mathematical models; Mathematical programming; MESH networking; Resource allocation; Social networking (online); Wireless mesh networks (WMN); Computer crimeEffective network defense strategies to maximize system survivability of wireless mesh networks under malicious and jamming attacksconference paper10.1109/CASoN.2012.64124182-s2.0-84874081606https://www.scopus.com/inward/record.uri?eid=2-s2.0-84874081606&doi=10.1109%2fCASoN.2012.6412418&partnerID=40&md5=6ec66c3229eea3ee7d3c08a206727ebd