Spread spectrum communications handbook (revised ed.)
Spread spectrum communications handbook (revised ed.)
Chernoff-Hoeffding Bounds for Applications with Limited Independence
SIAM Journal on Discrete Mathematics
Analysis of Backoff Protocols for Mulitiple AccessChannels
SIAM Journal on Computing
Stochastic Contention Resolution With Short Delays
SIAM Journal on Computing
Contention resolution with constant expected delay
Journal of the ACM (JACM)
Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Performance analysis of exponential backoff
IEEE/ACM Transactions on Networking (TON)
Feasibility and complexity of broadcasting with random transmission failures
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
Constant density spanners for wireless ad-hoc networks
Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures
Adversarial contention resolution for simple channels
Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Jamming and sensing of encrypted wireless ad hoc networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Adversarial queuing on the multiple-access channel
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
Reliable broadcast in radio networks: the bounded collision case
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
Broadcasting algorithms in radio networks with unknown topology
Journal of Algorithms
Cross-layer jamming detection and mitigation in wireless broadcast networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
A multi-channel defense against jamming attacks in wireless sensor networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Intelligent jamming in wireless networks with applications to 802.11b and other networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
OPODIS'06 Proceedings of the 10th international conference on Principles of Distributed Systems
Jamming sensor networks: attack and defense strategies
IEEE Network: The Magazine of Global Internetworking
Zero pre-shared secret key establishment in the presence of jammers
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Reliable distributed computing on unreliable radio channels
Proceedings of the 2009 MobiHoc S3 workshop on MobiHoc S3
DCOSS '09 Proceedings of the 5th IEEE International Conference on Distributed Computing in Sensor Systems
Adversarial Multiple Access Channel with Individual Injection Rates
OPODIS '09 Proceedings of the 13th International Conference on Principles of Distributed Systems
Securing every bit: authenticated broadcast in radio networks
Proceedings of the twenty-second annual ACM symposium on Parallelism in algorithms and architectures
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
IEEE Journal on Selected Areas in Communications
Brief announcement: towards robust medium access in multi-hop networks
Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing
A jamming-resistant MAC protocol for multi-hop wireless networks
DISC'10 Proceedings of the 24th international conference on Distributed computing
Trusted computing for fault-prone wireless networks
DISC'10 Proceedings of the 24th international conference on Distributed computing
Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks
Journal of Network and Computer Applications
Design of network topology in an adversarial environment
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
MAC layer jamming mitigation using a game augmented by intervention
EURASIP Journal on Wireless Communications and Networking
Conflict on a communication channel
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming
Proceedings of the fourth ACM conference on Wireless network security
Towards jamming-resistant and competitive medium access in the SINR model
S3 '11 Proceedings of the 3rd ACM workshop on Wireless of the students, by the students, for the students
Medium access control for adversarial channels with jamming
SIROCCO'11 Proceedings of the 18th international conference on Structural information and communication complexity
Self-stabilizing leader election for single-hop wireless networks despite jamming
MobiHoc '11 Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
On the capacity of rate-adaptive packetized wireless communication links under jamming
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Jamming aware routing for MHWN with dynamic measurement
Computers and Electrical Engineering
Making evildoers pay: resource-competitive broadcast in sensor networks
PODC '12 Proceedings of the 2012 ACM symposium on Principles of distributed computing
Dynamic packet scheduling in wireless networks
PODC '12 Proceedings of the 2012 ACM symposium on Principles of distributed computing
Competitive and fair throughput for co-existing networks under adversarial interference
PODC '12 Proceedings of the 2012 ACM symposium on Principles of distributed computing
Resource-competitive analysis: a new perspective on attack-resistant distributed computing
FOMC '12 Proceedings of the 8th International Workshop on Foundations of Mobile Computing
SimpleMAC: a jamming-resilient MAC-layer protocol for wireless channel coordination
Proceedings of the 18th annual international conference on Mobile computing and networking
Counter-jamming using mixed mechanical and software interference cancellation
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
SybilCast: broadcast on the open airwaves (extended abstract)
Proceedings of the twenty-fifth annual ACM symposium on Parallelism in algorithms and architectures
Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming
Proceedings of the 11th ACM international symposium on Mobility management and wireless access
An efficient and fair MAC protocol robust to reactive interference
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
In this paper we consider the problem of designing a medium access control (MAC) protocol for single-hop wireless networks that is provably robust against adaptive adversarial jamming. The wireless network consists of a set of honest and reliable nodes that are within the transmission range of each other. In addition to these nodes there is an adversary. The adversary may know the protocol and its entire history and use this knowledge to jam the wireless channel at will at any time. It is allowed to jam a (1-epsilon)-fraction of the time steps, for an arbitrary constant epsilon0, but it has to make a jamming decision before it knows the actions of the nodes at the current step. The nodes cannot distinguish between the adversarial jamming or a collision of two or more messages that are sent at the same time. We demonstrate, for the first time, that there is a local-control MAC protocol requiring only very limited knowledge about the adversary and the network that achieves a constant throughput for the non-jammed time steps under any adversarial strategy above. We also show that our protocol is very energy efficient and that it can be extended to obtain a robust and efficient protocol for leader election and the fair use of the wireless channel.