Skip to main content

On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility

  • Conference paper
Wired/Wireless Internet Communications (WWIC 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2957))

Included in the following conference series:

Abstract

In this paper we investigate the problem of maintaining connectivity under jamming in multihop ad hoc wireless networks. Connectivity is measured using a connectivity index, which indicates the probability that there exists a path between two nodes. We first show that connectivity can be drastically reduced with a relatively small number of jammers. We show that using sectored antennas can maintain connectivity in the presence of a significantly higher number of jammers at the expense of higher average number of hops. Finally, we show that mobility allows further resiliency to jamming.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Noubir, G., Lin, G.: Low Power DoS Attacks in Data Wireless LANs and Countermeasures. In: Proceedings of Poster: ACM MobiHoc. 2003, Annapolis, MD. ACM Press, New York (2003)

    Google Scholar 

  2. Antenova Ltd (2003), http://www.antenova.com/

  3. Texas Instruments Inc. (2003), http://www.ti.com/wanda

  4. Takagi, H., Kleinrock, L.: Optimal Transmission Ranges for Randomly Distributed Packet Radio Terminals. IEEE Transactions on Communications 32(3), 246–255 (1984)

    Article  Google Scholar 

  5. Bettstetter, C.: On the Minimum Node Degree and Connectivity of a Wireless Multihop Network. In: Proceedings of MobiHoc. ACM Press, Lausanne (2002)

    Google Scholar 

  6. Sanchez, M., Manzoni, P., Haas, Z.J.: Determination of critical transmission range in ad-hoc networks. In: Proceedings of Multiaccess Mobility and Teletraffic for Wireless Communications Workshop (1999)

    Google Scholar 

  7. Chlamtac, I., Farago, A.: A New Approach to the Design and Analysis of Peer-to- Peer Mobile Networks. ACM/Baltzer Wireless Networks 5(8) (1999)

    Google Scholar 

  8. Dousse, O., Baccelli, F., Thiran, P.: Impact of Interferences on Connectivity in Ad Hoc Networks. In: Proceedings of IEEE Infocom (2003)

    Google Scholar 

  9. Santi, P., Blough, D.M.: An Evaluation of Connectivity in Mobile Wireless Ad Hoc Networks. In: Proceedings of IEEE DSN (2002)

    Google Scholar 

  10. Gupta, P., Kumar, P.R.: Critical Power for Asymptotic Connectivity in Wireless Networks. In: Fleming, W.H., McEneany, W.M., Yin, G., Zhang, Q. (eds.) Stochastic Analysis, Control, Optimization and Applications: A Volume in Honor. Birkhauser, Basel (1998)

    Google Scholar 

  11. Penrose, M.D.: On k-Connectivity for a Geomtric Random Graph. Random Structures and Algorithms 15(2), 145–164

    Google Scholar 

  12. Farago, A.: Graph Theoretic Analysis of Ad Hoc Network Vulnerability. In: Proceedings of WiOpt: Modeling and Optimization in Mobile Ad Hoc and Wireless Networks (2003)

    Google Scholar 

  13. Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: Proceedings of ACM Mobicom, Atlanta, GA (2002)

    Google Scholar 

  14. Papadimitratos, P., Haas, Z.J.: Securing Mobile Ad Hoc Networks. In: Ilyas, M. (ed.) Handbook of Ad Hoc Wireless Networks. CRC Press, Boca Raton (2002)

    Google Scholar 

  15. Kyasanur, P., Vaidya, N.: Detection and Handling of MAC Layer Misbehavior in Wireless Networks. UIUC (August 2002)

    Google Scholar 

  16. Dahill, B., et al.: A Secure Routing Protocol for Ad Hoc Networks. In: Electrical Engineering and Computer Science. University of Michigan, Ann Arbor (2001); UM-CS-2001-037

    Google Scholar 

  17. Hubaux, J.-P., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: Proceedings of MobiHoc 2001. ACM Press, New York (2001)

    Google Scholar 

  18. Marti, S., et al.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proceedings of Sixth Annual IEEE/ACM International Conference on Mobile Computing and Networking (MobiCom 2000). ACM Press, New York (2000)

    Google Scholar 

  19. Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, p. 215. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  20. Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Networks Magazine 13(6) (1999)

    Google Scholar 

  21. Schleher, C.D.: Electronic Warfare in the Information Age, Norwood, Artech House (1999)

    Google Scholar 

  22. Sklar, B.: Digital Communications, Fundamentals and Applications. Prentice-Hall, Englewood Cliffs (2001)

    Google Scholar 

  23. Kershner, R.: The Number of Circles Covering a Set. American Journal of Mathematics 61(3), 665–671 (1939)

    Article  MathSciNet  Google Scholar 

  24. Grossglauser, M., Tse, D.: Mobility Increases the Capacity of Ad Hoc Wireless Networks. In: Proceedings of IEEE Infocom (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Noubir, G. (2004). On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility. In: Langendoerfer, P., Liu, M., Matta, I., Tsaoussidis, V. (eds) Wired/Wireless Internet Communications. WWIC 2004. Lecture Notes in Computer Science, vol 2957. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24643-5_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24643-5_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20954-6

  • Online ISBN: 978-3-540-24643-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics