Mostrar el registro sencillo del ítem
Adaptive Scheduling over a Wireless Channel under Constrained Jamming
dc.contributor.author | Fernández Anta, Antonio | |
dc.contributor.author | Georgiou, Chryssis | |
dc.contributor.author | Zavou, Elli | |
dc.date.accessioned | 2021-07-13T09:25:38Z | |
dc.date.available | 2021-07-13T09:25:38Z | |
dc.date.issued | 2015-06-10 | |
dc.identifier.uri | http://hdl.handle.net/20.500.12761/63 | |
dc.description.abstract | We consider a wireless channel between a single pair of stations (sender and receiver) that is being “watched” and disrupted by a malicious, adversarial jammer. However, the jammer’s power is constrained by parameters $\rho$ and $\sigma$, that represent the rate at which the adversary can jam a packet, and the length of the largest bursts of jams, respectively. This, corresponds to the translation of the Adversarial Queueing Theory (AQT) constrains, to channel jamming. The sender’s objective is to transmit as much useful data as possible, over the channel, despite the jams that are caused by the adversary. In this work, we focus on a simplified version of the problem, where given a transmission period $T$, the adversary is constrained in jamming up to $f$ packets. We believe it to be a building block for solving the general problem of AQT-based jamming. We therefore develop deterministic scheduling algorithms that decide the lengths of the packets to be sent, in order to maximize the total payload successfully transmitted over period T in the presence of up to f packet jams, useful payload. We first consider the case where all packets must be of the same length and compute the optimal packet length. Then, we consider adaptive algorithms; ones that change the packet length based on the feedback on jammed packets, and analyze them with respect to the simplified model, showing their optimality. Finally, we discuss how our solutions could be used to solve the more general problem. | |
dc.language.iso | eng | |
dc.title | Adaptive Scheduling over a Wireless Channel under Constrained Jamming | en |
dc.type | conference object | |
dc.conference.date | 10-12 June 2015 | |
dc.conference.place | Málaga, Spain | |
dc.conference.title | XXIII Jornadas de Concurrencia y Sistemas Distribuidos - Doctoral Consortium en Tecnologías Informáticas (JCSD 2015) | * |
dc.event.type | conference | |
dc.pres.type | paper | |
dc.type.hasVersion | VoR | |
dc.rights.accessRights | open access | |
dc.description.refereed | TRUE | |
dc.description.status | pub | |
dc.eprint.id | http://eprints.networks.imdea.org/id/eprint/1071 |