Encyclopedia of Algorithms

2016 Edition
| Editors: Ming-Yang Kao

Jamming-Resistant MAC Protocols for Wireless Networks

  • Andréa W. Richa
  • Christian Scheideler
Reference work entry
DOI: https://doi.org/10.1007/978-1-4939-2864-4_593

Years and Authors of Summarized Original Work

  • 2008; Awerbuch, Richa, Scheideler

  • 2010; Richa, Scheideler, Schmid, Zhang

  • 2011; Richa, Scheideler, Schmid, Zhang

  • 2012; Richa, Scheideler, Schmid, Zhang

  • 2014; Ogierman, Richa, Scheideler, Schmid,Zhang

Motivation

The problem of coordinating the access to a shared medium is a central challenge in wireless networks. In order to solve this problem, a proper medium access control (MAC) protocol is needed. Ideally, such a protocol should not only be able to use the wireless medium as effectively as possible, but it should also be robust against a wide range of interference problems including jamming attacks. Interference problems from outside sources are usually ignored in theory but in practice it is important to take these into account, particularly because the ISM frequency band, which is the standard band used for wireless communication, is one of the most dirty frequency bands as it is affected by many devices like microwaves.

Problem...

Keywords

Adversarial models Competitive analysis Jamming MAC protocol Wireless communication 
This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    Awerbuch B, Richa A, Scheideler C (2008) A jamming-resistant MAC protocol for single-hop wireless networks. In: Proc. of the 27th ACM Symp. on Principles of Distributed Computing (PODC), pp. 45–54, Toronto, Canada, 2008.Google Scholar
  2. 2.
    Bayraktaroglu E, King C, Liu X, Noubir G, Rajaraman R, Thapa B (2008) On the performance of IEEE 802.11 under jamming. In. Proc. of the 27th IEEE Conf. on Computer Communications (INFOCOM), pp. 1265–1273, Phoenix, AZ, USA, 2008.Google Scholar
  3. 3.
    Dolev S, Gilbert S, Guerraoui R, Newport C (2007) Gossiping in a multi-channel radio network: an oblivious approach to coping with malicious interference. In: Proc. of the 21st Intl. Symp. on Distributed Computing (DISC), pp. 208–222, 2007.Google Scholar
  4. 4.
    Dolev S, Gilbert S, Guerraoui R, Newport C (2008) Secure communication over radio channels. In: Proc. of the 27th ACM Symp. on Principles of Distributed Computing (PODC), pp. 105–114, Toronto, Canada, 2008.Google Scholar
  5. 5.
    Gilbert S, Guerraoui R, Kowalski D, Newport C (2009) Interference-resilient information exchange. In: Proc. of the 28th IEEE Conf. on Computer Communication (INFOCOM), pp. 2249–2257, Rio de Janeiro, Brazil.Google Scholar
  6. 6.
    Richa A, Scheideler C, Schmid S, Zhang J (2010) A jamming-resistant MAC protocol for multi-hop wireless networks. In: Proc. of the 24th Intl. Symp. on Distributed Computing (DISC), pp. 179–193, Cambridge, MA, USA, 2010.Google Scholar
  7. 7.
    Richa A, Scheideler C, Schmid S, Zhang J (2011) Competitive and fair medium access despite reactive jamming. In: Proc. of the 31st Intl. Conf. on Distributed Computing Systems (ICDCS), pp. 507–516, Minneapolis, MN, USA.Google Scholar
  8. 8.
    Richa A, Scheideler C, Schmid S, Zhang J (2012) Competitive and fair throughput for co-existing networks under adversarial interference. In: Proc. of the 31st ACM Symp. on Principles of Distributed Computing (PODC), pp. 291–300, Madeira, Portugal, 2012.Google Scholar
  9. 9.
    Richa A, Scheideler C, Schmid S, Zhang J (2014) Competitive MAC under adversarial SINR. In: Proc. of the 33rd IEEE Conf. on Computer Communication (INFOCOM), pp. 2751–2759, Toronto, Canada, 2014.Google Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Andréa W. Richa
    • 1
  • Christian Scheideler
    • 2
  1. 1.School of Computing, Informatics, and Decision Systems Engineering, Ira A. Fulton Schools of EngineeringArizona State UniversityTempeUSA
  2. 2.Department of Computer ScienceUniversity of PaderbornPaderbornGermany