Principles of robust medium access and an application to leader election

Baruch Awerbuch, Andrea Richa, Christian Scheideler, Stefan Schmid, Jin Zhang

Research output: Contribution to journalArticlepeer-review

7 Scopus citations

Abstract

This article studies the design of medium access control (MAC) protocols for wireless networks that are provably robust against arbitrary and unpredictable disruptions (e.g., due to unintentional external interference from co-existing networks or due to jamming). We consider a wireless network consisting of a set of n honest and reliable nodes within transmission (and interference) range of each other, and we model the external disruptions with a powerful adaptive adversary. This adversary may know the protocol and its entire history and can use this knowledge to jam the wireless channel at will at any time. It is allowed to jam a (1 ? ∈)-fraction of the timesteps, for an arbitrary constant isin; > 0 unknown to the nodes. The nodes cannot distinguish between the adversarial jamming or a collision of two or more messages that are sent at the same time. We demonstrate, for the first time, that there is a local-control MAC protocol requiring only very limited knowledge about the adversary and the network that achieves a constant (asymptotically optimal) throughput for the nonjammed time periods under any of the aforementioned adversarial strategies. The derived principles are also useful to build robust applications on top of the MAC layer, and we present an exemplary study for leader election, one of the most fundamental tasks in distributed computing.

Original languageEnglish (US)
Article number24
JournalACM Transactions on Algorithms
Volume10
Issue number4
DOIs
StatePublished - Aug 2014

Keywords

  • Jamming
  • MAC protocols
  • Wireless ad-hoc networks

ASJC Scopus subject areas

  • Mathematics (miscellaneous)

Fingerprint Dive into the research topics of 'Principles of robust medium access and an application to leader election'. Together they form a unique fingerprint.

Cite this