Abstract
The broadcast nature of wireless links makes wireless communication extremely vulnerable to jamming attacks. There has been a significant body of research in the literature that addresses jamming attacks at different layers of the network, exploiting various layer-specific techniques. However, these separate efforts have never been integrated, examined and optimized in a cross-layer manner. In this paper, we propose a cross-layer anti-jamming system to achieve optimized network throughput in a multi-channel multi-hop multi-path wireless network. Specifically, we formulate the routing and scheduling problem as a linear programming problem, the solution of which provides an upper bound on the feasible effective network throughput for the joint routing, scheduling and traffic allocation protocols. Based on this solution, we further propose a learning based dynamic channel assignment scheme to approximate the achievable network throughput. Simulation studies are also performed to evaluate the performance of the proposed anti-jamming scheme under different jamming strategies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Strasser, M., Pöpper, C., Capkun, S., Cagalj, M.: Jamming-resistant key establishment using uncoordinated frequency hopping. In: Proc. of IEEE Symposium on Security and Privacy (May 2008)
Wang, Q., Xu, P., Ren, K., yang Li, X.: Delay-bounded adaptive ufh-based anti-jamming wireless communication. In: Proc. of IEEE INFOCOM (2011)
Su, H., Wang, Q., Ren, K., Xing, K.: Jamming-resilient dynamic spectrum access for cognitive radio networks. In: Proc. of IEEE ICC (2011)
Xu, W., Trappe, W., Zhang, Y.: Channel surfing: defending wireless sensor networks from interference. In: IPSN, pp. 499–508. ACM, New York (2007)
Richa, A.W., Scheideler, C., Schmid, S., Zhang, J.: A jamming-resistant mac protocol for multi-hop wireless networks. CoRR, vol. abs/1007.1189 (2010)
Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35(10), 54–62 (2002)
Tague, P., Nabar, S., Ritcey, J.A., Poovendran, R.: Jamming-aware traffic allocation for multiple-path routing using portfolio selection. IEEE/ACM Transactions on Networking 19, 184–194 (2011)
Jiang, S., Xue, Y.: Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks. Journal of Network and Computer Applications 34(2), 443–454 (2011)
Gupta, P., Kumar, P.: The capacity of wireless networks. IEEE Transactions on Information Theory 46(2), 388–404 (2000)
Kodialam, M.S., Nandagopal, T.: Characterizing the capacity region in multi-radio multi-channel wireless mesh networks. In: Proc. of IEEE MOBICOM (2005)
Auer, P., Cesa-Bianchi, N., Freund, Y., Schapire, R.E.: The nonstochastic multiarmed bandit problem. SIAM J. Comput. 32, 48–77 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Su, H., Wang, Q., Ren, K. (2011). Jamming-Resistant Communication in Multi-Channel Multi-hop Multi-path Wireless Networks. In: Cheng, Y., Eun, D.Y., Qin, Z., Song, M., Xing, K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2011. Lecture Notes in Computer Science, vol 6843. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23490-3_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-23490-3_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23489-7
Online ISBN: 978-3-642-23490-3
eBook Packages: Computer ScienceComputer Science (R0)