Years and Authors of Summarized Original Work
2008; Awerbuch, Richa, Scheideler
2010; Richa, Scheideler, Schmid, Zhang
2011; Richa, Scheideler, Schmid, Zhang
2012; Richa, Scheideler, Schmid, Zhang
2014; Ogierman, Richa, Scheideler, Schmid,Zhang
Motivation
The problem of coordinating the access to a shared medium is a central challenge in wireless networks. In order to solve this problem, a proper medium access control (MAC) protocol is needed. Ideally, such a protocol should not only be able to use the wireless medium as effectively as possible, but it should also be robust against a wide range of interference problems including jamming attacks. Interference problems from outside sources are usually ignored in theory but in practice it is important to take these into account, particularly because the ISM frequency band, which is the standard band used for wireless communication, is one of the most dirty frequency bands as it is affected by many devices like microwaves.
Problem...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Awerbuch B, Richa A, Scheideler C (2008) A jamming-resistant MAC protocol for single-hop wireless networks. In: Proc. of the 27th ACM Symp. on Principles of Distributed Computing (PODC), pp. 45–54, Toronto, Canada, 2008.
Bayraktaroglu E, King C, Liu X, Noubir G, Rajaraman R, Thapa B (2008) On the performance of IEEE 802.11 under jamming. In. Proc. of the 27th IEEE Conf. on Computer Communications (INFOCOM), pp. 1265–1273, Phoenix, AZ, USA, 2008.
Dolev S, Gilbert S, Guerraoui R, Newport C (2007) Gossiping in a multi-channel radio network: an oblivious approach to coping with malicious interference. In: Proc. of the 21st Intl. Symp. on Distributed Computing (DISC), pp. 208–222, 2007.
Dolev S, Gilbert S, Guerraoui R, Newport C (2008) Secure communication over radio channels. In: Proc. of the 27th ACM Symp. on Principles of Distributed Computing (PODC), pp. 105–114, Toronto, Canada, 2008.
Gilbert S, Guerraoui R, Kowalski D, Newport C (2009) Interference-resilient information exchange. In: Proc. of the 28th IEEE Conf. on Computer Communication (INFOCOM), pp. 2249–2257, Rio de Janeiro, Brazil.
Richa A, Scheideler C, Schmid S, Zhang J (2010) A jamming-resistant MAC protocol for multi-hop wireless networks. In: Proc. of the 24th Intl. Symp. on Distributed Computing (DISC), pp. 179–193, Cambridge, MA, USA, 2010.
Richa A, Scheideler C, Schmid S, Zhang J (2011) Competitive and fair medium access despite reactive jamming. In: Proc. of the 31st Intl. Conf. on Distributed Computing Systems (ICDCS), pp. 507–516, Minneapolis, MN, USA.
Richa A, Scheideler C, Schmid S, Zhang J (2012) Competitive and fair throughput for co-existing networks under adversarial interference. In: Proc. of the 31st ACM Symp. on Principles of Distributed Computing (PODC), pp. 291–300, Madeira, Portugal, 2012.
Richa A, Scheideler C, Schmid S, Zhang J (2014) Competitive MAC under adversarial SINR. In: Proc. of the 33rd IEEE Conf. on Computer Communication (INFOCOM), pp. 2751–2759, Toronto, Canada, 2014.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media New York
About this entry
Cite this entry
Richa, A.W., Scheideler, C. (2016). Jamming-Resistant MAC Protocols for Wireless Networks. In: Kao, MY. (eds) Encyclopedia of Algorithms. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-2864-4_593
Download citation
DOI: https://doi.org/10.1007/978-1-4939-2864-4_593
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-2863-7
Online ISBN: 978-1-4939-2864-4
eBook Packages: Computer ScienceReference Module Computer Science and Engineering