The combined-jamming model for IEEE 802.11 FH/MFSK networks

被引:1
作者
Kirachaiwanich, D. [1 ]
Liang, Q. [1 ]
机构
[1] Univ Texas Arlington, Dept Elect Engn, Arlington, TX 76011 USA
来源
EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS | 2011年 / 22卷 / 01期
基金
美国国家科学基金会;
关键词
WIRELESS MESH NETWORKS; INTERFERENCE;
D O I
10.1002/ett.1438
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, the expressions for calculating the bit error rate (BER) performance of noncoherent frequency-hopped Mary frequency-shift-keying (NC-FH/MFSK) receiver, subjected to independent multitone jamming (IMTJ) and partial-band jamming (PBJ), are derived. We observe that the the jamming tones in IMTJ strategy are, in fact, equivalent to the cochannel interferences in the network of IEEE 802.11 NC-FH/MFSK devices. Also, the major source of interference from outside of such network (coexisting network interference) is the IEEE 802.11 a/b/g devices whose signal is very similar to that of the jammer in PBJ strategy. Therefore, we combine the expressions for IMTJ and PBJ together and create a new combined-jamming formula for determining the link performance in IEEE 802.11 NC-FH/MFSK networks. As an example, we also illustrate the application of the new formula on the channel assignment (CA) problem in multiradio NC-FH/MFSK wireless mesh networks. Because the combined-jamming formula can take into account both the cochannel interference and the outside interference, it can predict fairly accurate BERs for determining appropriate channels in the network. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:2 / 12
页数:11
相关论文
共 50 条
  • [21] IEEE 802.11s wireless mesh networks: Framework and challenges
    Wang, Xudong
    Lim, Azman O.
    AD HOC NETWORKS, 2008, 6 (06) : 970 - 984
  • [22] A Robust and Cooperative MAC Protocol for IEEE 802.11a Wireless Networks
    Kim, Dong-Wook
    Lim, Wan-Seon
    Suh, Young-Joo
    WIRELESS PERSONAL COMMUNICATIONS, 2012, 67 (03) : 689 - 705
  • [23] Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
    Bicakci, Kemal
    Tavli, Bulent
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 931 - 941
  • [24] An Interference Mitigation Scheme for IEEE 802.15.4 Networks under IEEE 802.11b/g Interference
    Subbu, Kalyan Pathapati
    Soman, Suchith
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [25] A survey of cross-layer protocols for IEEE 802.11 wireless multi-hop mesh networks
    Sheikh, Sajid M.
    Wolhuter, Riaan
    Engelbrecht, Herman A.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (06)
  • [26] A new secure and privacy preserved protocol for IEEE802.11s networks
    Abouhogail, Reham Abdellatif
    Gadelrab, Mohammed S.
    COMPUTERS & SECURITY, 2018, 77 : 745 - 755
  • [27] A novel localised authentication scheme in IEEE 802.11 based wireless mesh networks
    Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada
    Int. J. Secur. Netw., 2008, 2 (122-132): : 122 - 132
  • [28] Coexistence Performance of IEEE 802.15.4 Wireless Sensor Networks Under IEEE 802.11b/g Interference
    Wei Yuan
    Xiangyu Wang
    Jean-Paul M. G. Linnartz
    Ignas G. M. M. Niemegeers
    Wireless Personal Communications, 2013, 68 : 281 - 302
  • [29] Coexistence Performance of IEEE 802.15.4 Wireless Sensor Networks Under IEEE 802.11b/g Interference
    Yuan, Wei
    Wang, Xiangyu
    Linnartz, Jean-Paul M. G.
    Niemegeers, Ignas G. M. M.
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 68 (02) : 281 - 302
  • [30] Many-to-One Throughput Capacity of IEEE 802.11 Multihop Wireless Networks
    Chan, Chi Pan
    Liew, Soung Chang
    Chan, An
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (04) : 514 - 527