Skip to main content
Log in

Competitive throughput in multi-hop wireless networks despite adaptive jamming

  • Published:
Distributed Computing Aims and scope Submit manuscript

Abstract

This article presents a simple local medium access control protocol, called Jade, for multi-hop wireless networks with a single channel that is provably robust against adaptive adversarial jamming. The wireless network is modeled as a unit disk graph on a set of nodes distributed arbitrarily in the plane. In addition to these nodes, there are adversarial jammers that know the protocol and its entire history and that are allowed to jam the wireless channel at any node for an arbitrary \((1-\epsilon )\)-fraction of the time steps, where \(0<\epsilon <1\) is an arbitrary constant. We assume that nodes can perform collision detection (unless they are transmitting themselves), but that they cannot distinguish between jammed transmissions and collisions of regular messages. Nevertheless, we show that Jade achieves an asymptotically optimal throughput by efficiently exploiting the unpredictable time periods in which the medium is available.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Notes

  1. In this article, disks (and later sectors) will refer both to 2-dimensional areas in the plane as well as to the set of nodes in the respective areas. The exact meaning will become clear in the specific context.

References

  1. Alnifie, G., Simon, R.: A multi-channel defense against jamming attacks in wireless sensor networks. In: Proceedings of Q2SWinet ’07, pp. 95–104 (2007)

  2. Awerbuch, B., Richa, A., Scheideler, C.: A jamming-resistant MAC protocol for single-hop wireless networks. In: Proceedings of PODC ’08 (2008)

  3. Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R., Thapa, B.: On the performance of IEEE 802.11 under jamming. In: Proceedings of IEEE Infocom ’08, pp. 1265–1273 (2008)

  4. Bender, M.A., Farach-Colton, M., He, S., Kuszmaul, B.C., Leiserson, C.E.: Adversarial contention resolution for simple channels. In: Proceedings of SPAA ’05 (2005)

  5. Brown, T., James, J., Sethi, A.: Jamming and sensing of encrypted wireless ad hoc networks. In: Proceedings of MobiHoc ’06, pp. 120–130 (2006)

  6. Chiang, J., Hu, Y.-C.: Cross-layer jamming detection and mitigation in wireless broadcast networks. In: Proceedings of MobiCom ’07, pp. 346–349 (2007)

  7. Chlebus, B.S., Kowalski, D.R., Rokicki, M.A.: Adversarial queuing on the multiple-access channel. In: Proceedings of PODC ’06 (2006)

  8. Czumaj, A., Rytter, W.: Broadcasting algorithms in radio networks with unknown topology. J. Algorithms 60(2), 115–143 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  9. Dolev, S., Gilbert, S., Guerraoui, R., Kowalski, D., Newport, C., Kuhn, F., Lynch, N.: Reliable distributed computing on unreliable radio channels. In: Proceedings of the 2009 MobiHoc S3 Workshop (2009)

  10. Dolev, S., Gilbert, S., Guerraoui, R., Kuhn, F., Newport, C.C.: The wireless synchronization problem. In: Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing (PODC), pp. 190–199 (2009)

  11. Dolev, S., Gilbert, S., Guerraoui, R., Newport, C.: Gossiping in a multi-channel radio network: An oblivious approach to coping with malicious interference. In: Proceedings of the Symposium on Distributed Computing (DISC) (2007)

  12. Dolev, S., Gilbert, S., Guerraoui, R., Newport, C.: Secure communication over radio channels. In: Proceedings of the 27th ACM Symposium on Principles of Distributed Computing (PODC), pp. 105–114 (2008)

  13. Dolev, S., Gilbert, S., Guerraoui, R., Newport, C.C.: Gossiping in a multi-channel radio network. In: Proceedings of the 21st International Symposium on Distributed Computing (DISC), pp. 208–222 (2007)

  14. Gilbert, S., Guerraoui, R., Kowalski, D., Newport, C.: Interference-resilient information exchange. In: Proceedings of the 28th Conference on Computer Communications. IEEE Infocom 2009 (2009)

  15. Gilbert, S., Guerraoui, R., Kowalski, D.R., Newport, C.C.: Interference-resilient information exchange. In: Proceedings of the 28th IEEE International Conference on Computer Communications (INFOCOM), pp. 2249–2257 (2009)

  16. Gilbert, S., Guerraoui, R., Newport, C.: Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. In: Proceedings of OPODIS ’06 (2006)

  17. Goldberg, L.A., Mackenzie, P.D., Paterson, M., Srinivasan, A.: Contention resolution with constant expected delay. J. ACM 47(6) 1048–1096 (2000). doi:10.1145/355541.355567

    Google Scholar 

  18. Håstad, J., Leighton, T., Rogoff, B.: Analysis of backoff protocols for mulitiple access channels. SIAM J. Comput. 25(4) 710–774 (1996). http://dx.doi.org/10.1137/S0097539792233828

  19. Heusse, M., Rousseau, F., Guillier, R., Duda, A.: Idle sense: An optimal access method for high throughput and fairness in rate diverse wireless lans. In: Proceedings of SIGCOMM (2005)

  20. IEEE: Medium access control (MAC) and physical specifications. In: IEEE P802.11/D10 (1999)

  21. Jain, K., Padhye, J., Padmanabhan, V.N., Qiu, L.: Impact of interference on multi-hop wireless network performance. In: Proceedings of the 9th Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 66–80 (2003)

  22. Jiang, S., Xue, Y.: Providing survivability against jamming attack via joint dynamic routing and channel assigment. In: Proceedings of the 7th Workshop on Design of Reliable Communication Networks (DRCN) (2009)

  23. Koo, C., Bhandari, V., Katz, J., Vaidya, N.: Reliable broadcast in radio networks: The bounded collision case. In: Proceedings of PODC ’06 (2006)

  24. Kuhn, F., Moscibroda, T., Wattenhofer, R. Radio network clustering from scratch. In: Proceedings. of ESA ’04 (2004)

  25. Kwak, B.-J., Song, N.-O., Miller, L.E.: Performance analysis of exponential backoff. IEEE/ACM Trans. Netw. 13(2), 343–355 (2005)

    Article  Google Scholar 

  26. Law, Y., van Hoesel, L., Doumen, J., Hartel, P., Havinga, P.: Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. In: Proceedings of SASN ’05, pp. 76–88 (2005)

  27. Li, M., Koutsopoulos, I., Poovendran, R.: Optimal jamming attacks and network defense policies in wireless sensor networks. In: Proceedings of Infocom ’07, pp. 1307–1315 (2007)

  28. Liu, X., Noubir, G., Sundaram, R., Tan, S.: Spread: Foiling smart jammers using multi-layer agility. In: Proceedings of Infocom ’07, pp. 2536–2540 (2007)

  29. Meier, D., Pignolet Y.A., Schmid S., Wattenhofer, R.: Speed dating despite jammers. In: Proceedings of DCOSS ’09 June (2009)

  30. Navda, V., Bohra, A., Ganguly, S., Rubenstein, D.: Using channel hopping to increase 802.11 resilience to jamming attacks. In: Proceedings of Infocom’07, pp. 2526–2530 (2007)

  31. Negi, R., Perrig, A.: Jamming Analysis of MAC Protocols. Technical Report. Carnegie Mellon University (2003)

  32. Noubir, G.: On connectivity in ad hoc networks under jamming using directional antennas and mobility. In: Proceedings of the 2nd International Conference on Wired/Wireless Internet Communications (WWIC), pp. 186–200 (2004)

  33. Pelc A., Peleg, D.: Feasibility and complexity of broadcasting with random transmission failures. In: Proceedings of PODC ’05 (2005)

  34. Raghavan, P., Upfal, E.: Stochastic contention resolution with short delays. SIAM J. Comput. 28(2), 709–719 (1999)

    Article  MathSciNet  Google Scholar 

  35. Richa, A., Scheideler, C., Schmid, S., Zhang, J.: Competitive and fair medium access despite reactive jamming. In: Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS) (2011)

  36. Richa, A., Scheideler, C., Schmid, S., Zhang, J.: Self-stabilizing leader election for single-hop wireless networks despite jamming. In: Proceedings of the 12th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2011)

  37. Schmidt, J., Siegel, A., Srinivasan, A.: Chernoff-Hoeffding bounds for applications with limited independence. SIAM J. Discrete Math. 8(2), 223–250 (1995)

    Article  MathSciNet  MATH  Google Scholar 

  38. Simon, M.K., Omura, J.K., Schultz, R.A., Levin, B.K.: Spread Spectrum Communications Handbook. McGraw-Hill, New York (2001)

    Google Scholar 

  39. Thuente, D., Acharya, M. Intelligent jamming in wireless networks with applications to 802.11b and other networks. In: Proceedings of MILCOM ’06 (2006)

  40. van de Ven, P.M., Janssen, A.J.E.M., van Leeuwaarden, J.S.H., Borst, S.C.: Achieving target throughputs in random-access networks. Perform. Eval. 68, 1103–1117 (2011)

    Article  Google Scholar 

  41. Wood, A., Stankovic, J., Zhou, G. DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In: Proceedings of SECON ’07 (2007)

  42. Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: attack and defense strategies. IEEE Netw. 20(3), 41–47 (2006)

    Google Scholar 

  43. Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of MobiHoc ’05, pp. 46–57 (2005)

  44. Xu, W., Wood, T., Zhang, Y.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceedings of Workshop on Wireless Security (2004)

  45. Ye, S., Wang, Y., Tseng, Y. A jamming-based MAC protocol for wireless multihop ad hoc networks. In: Proceedings of the IEEE 58th Vehicular Technology Conference (2003)

  46. Ye, S.-R., Wang, Y.-C., Tseng, Y.-C.: A jamming-based MAC protocol to improve the performance of wireless multihop ad-hoc networks. Wirel. Commun. Mob. Comput. 4(1), 75–84 (2004)

    Article  Google Scholar 

  47. Zander, J.: Jamming in slotted ALOHA multihop packed radio networks. IEEE Trans. Netw. 39(10), 1525–1531 (1991)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christian Scheideler.

Additional information

A preliminary version of this article appeared at the 24th International Symposium on Distributed Computing (DISC), 2010. Research is partly supported by NSF grants CCF-1116368 and CCF-0830704, as well as by DFG grants DFG SFB 901 and DFG SCHE 1592/2-1.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Richa, A., Scheideler, C., Schmid, S. et al. Competitive throughput in multi-hop wireless networks despite adaptive jamming. Distrib. Comput. 26, 159–171 (2013). https://doi.org/10.1007/s00446-012-0180-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00446-012-0180-x

Keywords

Navigation