dc.contributor.author Fernández Anta, Antonio dc.contributor.author Georgiou, Chryssis dc.contributor.author Zavou, Elli dc.date.accessioned 2021-07-13T09:25:38Z dc.date.available 2021-07-13T09:25:38Z dc.date.issued 2015-06-10 dc.identifier.uri http://hdl.handle.net/20.500.12761/63 dc.description.abstract We consider a wireless channel between a single pair of stations (sender and receiver) that is being “watched” and disrupted by a malicious, adversarial jammer. However, the jammer’s power is constrained by parameters $\rho$ and $\sigma$, that represent the rate at which the adversary can jam a packet, and the length of the largest bursts of jams, respectively. This, corresponds to the translation of the Adversarial Queueing Theory (AQT) constrains, to channel jamming. The sender’s objective is to transmit as much useful data as possible, over the channel, despite the jams that are caused by the adversary. In this work, we focus on a simplified version of the problem, where given a transmission period $T$, the adversary is constrained in jamming up to $f$ packets. We believe it to be a building block for solving the general problem of AQT-based jamming. We therefore develop deterministic scheduling algorithms that decide the lengths of the packets to be sent, in order to maximize the total payload successfully transmitted over period T in the presence of up to f packet jams, useful payload. We first consider the case where all packets must be of the same length and compute the optimal packet length. Then, we consider adaptive algorithms; ones that change the packet length based on the feedback on jammed packets, and analyze them with respect to the simplified model, showing their optimality. Finally, we discuss how our solutions could be used to solve the more general problem. dc.language.iso eng dc.title Adaptive Scheduling over a Wireless Channel under Constrained Jamming en dc.type conference object dc.conference.date 10-12 June 2015 dc.conference.place Málaga, Spain dc.conference.title XXIII Jornadas de Concurrencia y Sistemas Distribuidos - Doctoral Consortium en Tecnologías Informáticas (JCSD 2015) * dc.event.type conference dc.pres.type paper dc.type.hasVersion VoR dc.rights.accessRights open access dc.description.refereed TRUE dc.description.status pub dc.eprint.id http://eprints.networks.imdea.org/id/eprint/1071
﻿