A jamming-resistant MAC protocol for single-hop wireless networks

Baruch Awerbuch, Andrea Richa, Christian Scheideler

Research output: Chapter in Book/Report/Conference proceedingConference contribution

91 Citations (Scopus)

Abstract

In this paper we consider the problem of designing a medium access control (MAC) protocol for single-hop wireless networks that is provably robust against adaptive adversarial jamming. The wireless network consists of a set of honest and reliable nodes that are within the transmission range of each other. In addition to these nodes there is an adversary. The adversary may know the protocol and its entire history and use this knowledge to jam the wireless channel at will at any time. It is allowed to jam a (1 - ∈)-fraction of the time steps, for an arbitrary constant ∈ > 0, but it has to make a jamming decision before it knows the actions of the nodes at the current step. The nodes cannot distinguish between the adversarial jamming or a collision of two or more messages that are sent at the same time. We demonstrate, for the first time, that there is a local-control MAC protocol requiring only very limited knowledge about the adversary and the network that achieves a constant throughput for the non-jammed time steps under any adversarial strategy above. We also show that our protocol is very energy efficient and that it can be extended to obtain a robust and efficient protocol for leader election and the fair use of the wireless channel.

Original languageEnglish (US)
Title of host publicationProceedings of the Annual ACM Symposium on Principles of Distributed Computing
Pages45-54
Number of pages10
StatePublished - 2008
Event27th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing - Toronto, ON, Canada
Duration: Aug 18 2008Aug 21 2008

Other

Other27th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing
CountryCanada
CityToronto, ON
Period8/18/088/21/08

Fingerprint

Medium access control
Jamming
Wireless networks
Network protocols
Throughput

Keywords

  • Jamming
  • MAC protocols
  • Wireless ad-hoc networks

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Cite this

Awerbuch, B., Richa, A., & Scheideler, C. (2008). A jamming-resistant MAC protocol for single-hop wireless networks. In Proceedings of the Annual ACM Symposium on Principles of Distributed Computing (pp. 45-54)

A jamming-resistant MAC protocol for single-hop wireless networks. / Awerbuch, Baruch; Richa, Andrea; Scheideler, Christian.

Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 2008. p. 45-54.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Awerbuch, B, Richa, A & Scheideler, C 2008, A jamming-resistant MAC protocol for single-hop wireless networks. in Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. pp. 45-54, 27th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, Toronto, ON, Canada, 8/18/08.
Awerbuch B, Richa A, Scheideler C. A jamming-resistant MAC protocol for single-hop wireless networks. In Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 2008. p. 45-54
Awerbuch, Baruch ; Richa, Andrea ; Scheideler, Christian. / A jamming-resistant MAC protocol for single-hop wireless networks. Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 2008. pp. 45-54
@inproceedings{72939e9e956b47b297117ae14317b2fa,
title = "A jamming-resistant MAC protocol for single-hop wireless networks",
abstract = "In this paper we consider the problem of designing a medium access control (MAC) protocol for single-hop wireless networks that is provably robust against adaptive adversarial jamming. The wireless network consists of a set of honest and reliable nodes that are within the transmission range of each other. In addition to these nodes there is an adversary. The adversary may know the protocol and its entire history and use this knowledge to jam the wireless channel at will at any time. It is allowed to jam a (1 - ∈)-fraction of the time steps, for an arbitrary constant ∈ > 0, but it has to make a jamming decision before it knows the actions of the nodes at the current step. The nodes cannot distinguish between the adversarial jamming or a collision of two or more messages that are sent at the same time. We demonstrate, for the first time, that there is a local-control MAC protocol requiring only very limited knowledge about the adversary and the network that achieves a constant throughput for the non-jammed time steps under any adversarial strategy above. We also show that our protocol is very energy efficient and that it can be extended to obtain a robust and efficient protocol for leader election and the fair use of the wireless channel.",
keywords = "Jamming, MAC protocols, Wireless ad-hoc networks",
author = "Baruch Awerbuch and Andrea Richa and Christian Scheideler",
year = "2008",
language = "English (US)",
isbn = "9781595939890",
pages = "45--54",
booktitle = "Proceedings of the Annual ACM Symposium on Principles of Distributed Computing",

}

TY - GEN

T1 - A jamming-resistant MAC protocol for single-hop wireless networks

AU - Awerbuch, Baruch

AU - Richa, Andrea

AU - Scheideler, Christian

PY - 2008

Y1 - 2008

N2 - In this paper we consider the problem of designing a medium access control (MAC) protocol for single-hop wireless networks that is provably robust against adaptive adversarial jamming. The wireless network consists of a set of honest and reliable nodes that are within the transmission range of each other. In addition to these nodes there is an adversary. The adversary may know the protocol and its entire history and use this knowledge to jam the wireless channel at will at any time. It is allowed to jam a (1 - ∈)-fraction of the time steps, for an arbitrary constant ∈ > 0, but it has to make a jamming decision before it knows the actions of the nodes at the current step. The nodes cannot distinguish between the adversarial jamming or a collision of two or more messages that are sent at the same time. We demonstrate, for the first time, that there is a local-control MAC protocol requiring only very limited knowledge about the adversary and the network that achieves a constant throughput for the non-jammed time steps under any adversarial strategy above. We also show that our protocol is very energy efficient and that it can be extended to obtain a robust and efficient protocol for leader election and the fair use of the wireless channel.

AB - In this paper we consider the problem of designing a medium access control (MAC) protocol for single-hop wireless networks that is provably robust against adaptive adversarial jamming. The wireless network consists of a set of honest and reliable nodes that are within the transmission range of each other. In addition to these nodes there is an adversary. The adversary may know the protocol and its entire history and use this knowledge to jam the wireless channel at will at any time. It is allowed to jam a (1 - ∈)-fraction of the time steps, for an arbitrary constant ∈ > 0, but it has to make a jamming decision before it knows the actions of the nodes at the current step. The nodes cannot distinguish between the adversarial jamming or a collision of two or more messages that are sent at the same time. We demonstrate, for the first time, that there is a local-control MAC protocol requiring only very limited knowledge about the adversary and the network that achieves a constant throughput for the non-jammed time steps under any adversarial strategy above. We also show that our protocol is very energy efficient and that it can be extended to obtain a robust and efficient protocol for leader election and the fair use of the wireless channel.

KW - Jamming

KW - MAC protocols

KW - Wireless ad-hoc networks

UR - http://www.scopus.com/inward/record.url?scp=57549097287&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=57549097287&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:57549097287

SN - 9781595939890

SP - 45

EP - 54

BT - Proceedings of the Annual ACM Symposium on Principles of Distributed Computing

ER -