Spread spectrum communications handbook (revised ed.)
Spread spectrum communications handbook (revised ed.)
A rate-adaptive MAC protocol for multi-Hop wireless networks
Proceedings of the 7th annual international conference on Mobile computing and networking
An Introduction to Spread-Spectrum Communications
An Introduction to Spread-Spectrum Communications
IEEE 802.11 rate adaptation: a practical approach
MSWiM '04 Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
On link layer denial of service in data wireless LANs: Research Articles
Wireless Communications & Mobile Computing
Adversarial contention resolution for simple channels
Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Reliable broadcast in radio networks: the bounded collision case
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
Robust rate adaptation for 802.11 wireless networks
Proceedings of the 12th annual international conference on Mobile computing and networking
Channel surfing: defending wireless sensor networks from interference
Proceedings of the 6th international conference on Information processing in sensor networks
SecNav: secure broadcast localization and time synchronization in wireless networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Cross-layer jamming detection and mitigation in wireless broadcast networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Efficient channel-aware rate adaptation in dynamic environments
Proceedings of the 6th international conference on Mobile systems, applications, and services
Symphony: synchronous two-phase rate and power control in 802.11 wlans
Proceedings of the 6th international conference on Mobile systems, applications, and services
Defending wireless sensor networks from radio interference through channel adaptation
ACM Transactions on Sensor Networks (TOSN)
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
A jamming-resistant MAC protocol for single-hop wireless networks
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
Proceedings of the 14th ACM international conference on Mobile computing and networking
A coding-theoretic approach for efficient message verification over insecure channels
Proceedings of the second ACM conference on Wireless network security
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
Proceedings of the second ACM conference on Wireless network security
Efficient uncoordinated FHSS anti-jamming communication
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Zero pre-shared secret key establishment in the presence of jammers
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Cross-layer wireless bit rate adaptation
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
Frequency-aware rate adaptation and MAC protocols
Proceedings of the 15th annual international conference on Mobile computing and networking
ARES: an anti-jamming reinforcement system for 802.11 networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Randomized differential DSSS: jamming-resistant wireless broadcast communication
INFOCOM'10 Proceedings of the 29th conference on Information communications
Thwarting inside jamming attacks on wireless broadcast communications
Proceedings of the fourth ACM conference on Wireless network security
Short paper: reactive jamming in wireless networks: how realistic is the threat?
Proceedings of the fourth ACM conference on Wireless network security
On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming
Proceedings of the fourth ACM conference on Wireless network security
OPODIS'06 Proceedings of the 10th international conference on Principles of Distributed Systems
Mutual Information Jammer-Relay Games
IEEE Transactions on Information Forensics and Security
Jamming sensor networks: attack and defense strategies
IEEE Network: The Magazine of Global Internetworking
SimpleMAC: a jamming-resilient MAC-layer protocol for wireless channel coordination
Proceedings of the 18th annual international conference on Mobile computing and networking
Hi-index | 0.00 |
We formulate the interaction between the communicating nodes and an adversary within a game-theoretic context. We show that earlier information-theoretic capacity results for a jammed channel correspond to a pure Nash Equilibrium (NE). However, when both players are allowed to randomize their actions (i.e., coding rate and jamming power) new mixed Nash equilibria appear with surprising properties. We show the existence of a threshold (JTH) such that if the jammer average power exceeds J TH, the channel capacity at the NE is the same as if the jammer was using its maximum allowable power, JMax, all the time. This indicates that randomization significantly advantages powerful jammers. We also show how the NE strategies can be derived, and we provide very simple (e.g., semi-uniform) approximations to the optimal communication and jamming strategies. Such strategies are very simple to implement in current hardware and software.