The Nonstochastic Multiarmed Bandit Problem
SIAM Journal on Computing
Denial of Service in Sensor Networks
Computer
Characterizing the capacity region in multi-radio multi-channel wireless mesh networks
Proceedings of the 11th annual international conference on Mobile computing and networking
Channel surfing: defending wireless sensor networks from interference
Proceedings of the 6th international conference on Information processing in sensor networks
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
A jamming-resistant MAC protocol for multi-hop wireless networks
DISC'10 Proceedings of the 24th international conference on Distributed computing
Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks
Journal of Network and Computer Applications
Jamming-aware traffic allocation for multiple-path routing using portfolio selection
IEEE/ACM Transactions on Networking (TON)
The capacity of wireless networks
IEEE Transactions on Information Theory
Hi-index | 0.00 |
The broadcast nature of wireless links makes wireless communication extremely vulnerable to jamming attacks. There has been a significant body of research in the literature that addresses jamming attacks at different layers of the network, exploiting various layer-specific techniques. However, these separate efforts have never been integrated, examined and optimized in a cross-layer manner. In this paper, we propose a cross-layer anti-jamming system to achieve optimized network throughput in a multi-channel multi-hop multi-path wireless network. Specifically, we formulate the routing and scheduling problem as a linear programming problem, the solution of which provides an upper bound on the feasible effective network throughput for the joint routing, scheduling and traffic allocation protocols. Based on this solution, we further propose a learning based dynamic channel assignment scheme to approximate the achievable network throughput. Simulation studies are also performed to evaluate the performance of the proposed anti-jamming scheme under different jamming strategies.