Adaptive Scheduling Over a Wireless Channel Under Constrained Jamming
نویسندگان
چکیده
We consider a wireless channel between a single pair of stations (sender and receiver) that is being “watched” and disrupted by a malicious, adversarial jammer. The sender’s objective is to transmit as much useful data as possible, over the channel, despite the jams that are caused by the adversary. The data is transmitted as the payload of packets, and becomes useless if the packet is jammed. In this work, we develop deterministic scheduling algorithms that decide the lengths of the packets to be sent, in order to maximize the total payload successfully transmitted over period T in the presence of up to f packet jams, useful payload. We first consider the case where all packets must be of the same length and compute the optimal packet length that leads to the best possible useful payload. Then, we consider adaptive algorithms; ones that change the packet length based on the feedback on jammed packets received. We propose an optimal scheduling algorithm that is essentially a recursive algorithm that calculates the length of the next packet to transmit based on the packet errors that have occurred up to that point. We make a thorough non trivial analysis for the algorithm and discuss how our solutions could be used to solve a more general problem than the one we consider.
منابع مشابه
Adaptive packet scheduling over a wireless channel under constrained jamming
In this work we consider the communication over a wireless link, between a sender and a receiver, being disrupted by a jammer. The objective of the sender is to transmit as much data as possible to the receiver in the most efficient way. The data is sent as the payload of packets, and becomes useless if the packet is jammed. We consider a jammer with constrained power, defined by parameters ρ a...
متن کاملPacket Scheduling over a Wireless Channel: AQT-Based Constrained Jamming
In this paper we consider a two-node setting with a sender transmitting packets to a receiver over a wireless channel. Unfortunately, the channel can be jammed, thus corrupting the packet that is being transmitted at the time. The sender has a specific amount of data that needs to be sent to the receiver and its objective is to complete the transmission of the data as quickly as possible in the...
متن کاملCognitive Communications in White Space: Opportunistic Scheduling, Spectrum Shaping and Delay Analysis by
A unique feature, yet a challenge, in cognitive radio (CR) networks is the user hierarchy: secondary users (SU) wishing for data transmission must defer in the presence of active primary users (PUs), whose priority to channel access is strictly higher. Under a common thread of characterizing and improving Quality of Service (QoS) for the SUs, this dissertation is progressively organized under t...
متن کاملProviding survivability against jamming attack for multi-radio multi-channel wireless mesh networks
Built upon a shared wireless medium, wireless mesh network is particularly vulnerable to jamming attacks. The ability to recover from attacks and maintain an acceptable level of service degradation is a crucial aspect in the design of a wireless mesh network. To address this issue, this paper investigates the network restoration solutions via the joint design of traffic rerouting, channel re-as...
متن کاملPlatoon Stability and Safety Analysis of Cooperative Adaptive Cruise Control under Wireless Rician Fading Channels and Jamming Attacks
Cooperative Adaptive Cruise Control (CACC) is considered as a key enabling technology to automatically regulate the intervehicle distances in a vehicle platoon to improve traffic efficiency while maintaining safety. Although the wireless communication and physical processes in the existing CACC systems are integrated in one control framework, the coupling between wireless communication reliabil...
متن کامل