Mostrar el registro sencillo del ítem
Packet Scheduling over a Wireless Channel: AQT-based Constrained Jamming
dc.contributor.author | Fernández Anta, Antonio | |
dc.contributor.author | Georgiou, Chryssis | |
dc.contributor.author | Zavou, Elli | |
dc.date.accessioned | 2021-07-13T09:25:36Z | |
dc.date.available | 2021-07-13T09:25:36Z | |
dc.date.issued | 2015-05 | |
dc.identifier.uri | http://hdl.handle.net/20.500.12761/59 | |
dc.description.abstract | In this paper we consider a two-node setting with a sender transmitting packets to a receiver over a wireless channel. Unfortunately, the channel can be jammed, thus corrupting the packet that is being transmitted at the time. The sender has a specific amount of data that needs to be sent to the receiver and its objective is to complete the transmission of the data as quickly as possible in the presence of jamming. We assume that the jamming is controlled by a constrained adversary. In particular, the adversary’s power is constrained by two parameters, $\rho$ and $\sigma$. Intuitively, $\rho$ represents the rate at which the adversary can jam the channel, and $\sigma$ the length of the largest bursts of jams it can cause. This definition corresponds to the translation of the Adversarial Queuing Theory (AQT) constrains, typically defined for packet injections in similar settings, to channel jamming. We propose deterministic scheduling algorithms that decide the lengths of the packets to be sent by the sender in order to minimize the transmission time. We first assume all packets being of the same length (uniform) and characterize the corresponding optimal packet length. Then, we show that if the packet length can be adapted, for specific values of $\rho$ and $\sigma$ the transmission time can be improved. | |
dc.language.iso | eng | |
dc.title | Packet Scheduling over a Wireless Channel: AQT-based Constrained Jamming | en |
dc.type | conference object | |
dc.conference.date | 13-15 May 2015 | |
dc.conference.place | Agadir, Morocco | |
dc.conference.title | The International Conference on NETworked sYStems (NETYS 2015) | * |
dc.event.type | conference | |
dc.pres.type | paper | |
dc.type.hasVersion | AM | |
dc.rights.accessRights | open access | |
dc.subject.keyword | Packet scheduling | |
dc.subject.keyword | Wireless Channel | |
dc.subject.keyword | Unreliable communication | |
dc.subject.keyword | Adversarial jamming | |
dc.subject.keyword | Adversarial Queueing Theory | |
dc.description.refereed | TRUE | |
dc.description.status | pub | |
dc.eprint.id | http://eprints.networks.imdea.org/id/eprint/1068 |