Adaptive packet scheduling over a wireless channel under constrained jamming

نویسندگان

  • Antonio Fernández
  • Chryssis Georgiou
  • Dariusz R. Kowalski
  • Elli Zavou
چکیده

In this work we consider the communication over a wireless link, between a sender and a receiver, being disrupted by a jammer. The objective of the sender is to transmit as much data as possible to the receiver in the most efficient way. The data is sent as the payload of packets, and becomes useless if the packet is jammed. We consider a jammer with constrained power, defined by parameters ρ and σ, which represent the rate at which the adversary may jam the channel, and the length of the largest burst of jams it can cause, respectively. This definition translates to the Adversarial Queuing Theory (AQT) constraints, typically used for packet arrivals. We propose deterministic algorithms that decide the length of the packets sent in order to maximize the goodput rate; i.e., the amount of useful payload successfully transmitted over time. To do so, we first define and study a static version of the problem, which is used as a building block for the dynamic problem. We start by assuming packets of the same length and characterizing the corresponding quasi-optimal length. Then, we show that by adapting the length of the packets, the goodput rate can be improved. Hence, we develop optimal adaptive algorithms that choose the packet lengths depending on the jams that have occurred up to that point in time, in order to maximize the total payload transmitted successfully over a period T in the presence of up to f jams.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptive Scheduling Over a Wireless Channel Under Constrained Jamming

We consider a wireless channel between a single pair of stations (sender and receiver) that is being “watched” and disrupted by a malicious, adversarial jammer. The sender’s objective is to transmit as much useful data as possible, over the channel, despite the jams that are caused by the adversary. The data is transmitted as the payload of packets, and becomes useless if the packet is jammed. ...

متن کامل

Packet Scheduling over a Wireless Channel: AQT-Based Constrained Jamming

In this paper we consider a two-node setting with a sender transmitting packets to a receiver over a wireless channel. Unfortunately, the channel can be jammed, thus corrupting the packet that is being transmitted at the time. The sender has a specific amount of data that needs to be sent to the receiver and its objective is to complete the transmission of the data as quickly as possible in the...

متن کامل

Scheduling in wireless cellular networks under probabilistic channel information

As wireless networks continue to grow, users will be demanding more service diversity and differential quality-of-service (QoS). At the packet level, differential QoS is met by means of scheduling for channel access. Several algorithms have been proposed for packet scheduling over the wireless link. The main consideration in the design of these algorithms is the characteristics of the wireless ...

متن کامل

Jamming Attack Detection and Rate Adaptation Scheme for IEEE 802.11 Multi-hop Tactical Networks

In a tactical field, wireless communication is prevailed among military agents and vehicles, but it is fragile by jamming attack from an adversary because of the wireless shared medium. Jamming attack is easily achieved by emitting continuous radio signal and it can interfere with other radio communications within the network. Channel switching over multiple channels or route detouring have bee...

متن کامل

Adaptive Forwarding Rate Control for Network Coding in the Tactical MANET

Abstract—In this paper, we propose a novel multicast network coding protocol that is resilience to jamming attack in a tactical wireless ad hoc network. Wireless communication is prevailed in the tactical field between military agents and vehicles, but it is fragile by jamming attack from an adversary due to the wireless shared medium. A Jammer can easily disturb other wireless communications w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Theor. Comput. Sci.

دوره 692  شماره 

صفحات  -

تاریخ انتشار 2017