Denial of Service in Sensor Networks
Computer
Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
Understanding and mitigating the impact of RF interference on 802.11 networks
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Approximation algorithms for restless bandit problems
SODA '09 Proceedings of the twentieth Annual ACM-SIAM Symposium on Discrete Algorithms
Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
Adaptive ε-greedy exploration in reinforcement learning based on value differences
KI'10 Proceedings of the 33rd annual German conference on Advances in artificial intelligence
Multi-armed bandit algorithms and empirical evaluation
ECML'05 Proceedings of the 16th European conference on Machine Learning
An Anti-Jamming Stochastic Game for Cognitive Radio Networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
We address an anti-jamming strategy of channel access for secondary user in a cogntive radio network when some idle channels of the primary user are being jammed in each time slot. Given the secondary does not know what idle bands are under attack, using our method it tries to choose the best possible channel in each time slot to avoid the jammer. We show this problem can be formulated as a multi-armed bandit process and compare the results of different approaches for channel selection including ε-greedy, ε-first, and random. Simulatons verify that our method results in selecting channels with an average of almost 50% improved signal to noise ratio (SNR) over randomly selected channels.