Medium Access Control for Adversarial Channels with Jamming
نویسندگان
چکیده
We study broadcasting on multiple access channels with dynamic packet arrivals and jamming. The presented protocols are for the medium-access-control layer. The mechanisms of timing of packet arrivals and determination of which rounds are jammed are represented by adversarial models. Packet arrivals are constrained by the average rate of injections and the number of packets that can arrive in one round. Jamming is constrained by the rate with which the adversary can jam rounds and by the number of consecutive rounds that can be jammed. Broadcasting is performed by deterministic distributed protocols. We give upper bounds on worst-case packet latency of protocols in terms of the parameters defining adversaries. Experiments include both deterministic and randomized protocols. A simulation environment we developed is designed to represent adversarial properties of jammed channels understood as restrictions imposed on adversaries.
منابع مشابه
Packet Latency of Deterministic Broadcasting in Adversarial Multiple Access Channels
We study broadcasting on multiple access channels with dynamic packet arrivals and jamming. The communication environments is represented by adversarial models which specify constraints on packet arrivals and jamming. We consider deterministic distributed broadcast algorithms and give upper bounds on the worst-case packet latency and the number of queued packets in relation to the parameters de...
متن کاملA Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks
This paper presents a simple local medium access control protocol, called Jade, for multi-hop wireless networks with a single channel that is provably robust against adaptive adversarial jamming. The wireless network is modeled as a unit disk graph on a set of nodes distributed arbitrarily in the plane. In addition to these nodes, there are adversarial jammers that know the protocol and its ent...
متن کاملA Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks
One critical issue in multihop ad hoc networks is the medium access control (MAC). The IEEE 802.11 MAC protocol is originally designed for fully connected, one-hop ad hoc networks but not for multihop ad hoc networks. In addition to the well known hiddenterminal problem, we found that IEEE 802.11 also suffers from an erroneous reservation problem which occurs when RTS-CTS exchange fails but the...
متن کاملMaster Thesis : “ Energy - Efficient Jamming and Countermeasures ”
Since wireless networks use a shared medium they are exposed to jamming attacks. Such attacks are carried out by an adversary emitting radio frequency signals. They can severely interfere with the normal operation of wireless networks and, consequently, mechanisms are needed that can cope with jamming attacks. However, unless the adversary has unlimited capacities, it cannot jam all communicati...
متن کاملA jamming-based MAC protocol to improve the performance of wireless multihop ad-hoc networks
One critical issue in multihop ad hoc networks is the medium access control (MAC). The IEEE 802.11 MAC protocol is originally designed for fully connected, one-hop ad hoc networks but not for multihop ad hoc networks. In addition to the well known hidden-terminal problem, we found that IEEE 802.11 also suffers from an erroneous reservation problem which occurs when RTS-CTS exchange fails but th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011