Performance Analysis of Jammed Single-Hop Wireless Networks

被引:0
作者
Wang, Peng [1 ]
Henz, Brian [1 ]
机构
[1] Army Res Lab, Aberdeen Proving Ground, MD 21005 USA
来源
2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013) | 2013年
关键词
JAMMING ATTACKS;
D O I
10.1109/MILCOM.2013.158
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We develop a theoretical approach to derive system throughput for single-hop wireless networks with N independent channels, n users and m jammers where users and jammers follow the given policies to randomly select channels at each time slot. The whole system, named as NRL model, can be modeled as a Markov chain, and the system state at each time slot is defined as the number of successful jammers. The key point is to derive the transition probability matrix and obtain the stationary distribution. Then, the theoretical system throughput can be computed straightforwardly. Numerical experiments are used to validate theoretical results, and the throughput differences between numerical and theoretical results are within 0.3%. Also, we derive the theoretical throughput for a Dumb model where users and jammers randomly select channels at each time slot. Compared with Dumb model, NRL model achieves better performance for big n and worse performance for small n.
引用
收藏
页码:910 / 915
页数:6
相关论文
共 9 条
[1]  
Adamy D., 2004, EW 102 2 COURSE ELEC
[2]  
[Anonymous], 2005, P 6 ACM INT S MOB AD, DOI DOI 10.1145/1062689.1062697
[3]   A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks [J].
Awerbuch, Baruch ;
Richa, Andrea ;
Scheideler, Christian .
PODC'08: PROCEEDINGS OF THE 27TH ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2008, :45-+
[4]  
Brown T. X., 2006, MOBIHOC 2006. Proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing, P120, DOI 10.1145/1132905.1132919
[5]   Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks [J].
Chiang, Jerry T. ;
Hu, Yih-Chun .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (01) :286-298
[6]  
Grimmett G., PROBABILITY RANDOM P
[7]   Optimal jamming attacks and network Defense policies in wireless sensor networks [J].
Li, Mingyan ;
Koutsopoulos, Iordanis ;
Poovendran, Radha .
INFOCOM 2007, VOLS 1-5, 2007, :1307-+
[8]   A Survey on Jamming Attacks and Countermeasures in WSNs [J].
Mpitziopoulos, Aristides ;
Gavalas, Damianos ;
Konstantopoulos, Charalampos ;
Pantziou, Grammati .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (04) :42-56
[9]  
Xu W., 2004, P 3 ACM WORKSHOP WIR, P80, DOI DOI 10.1145/1023646.1023661