A jamming-resistant MAC protocol for single-hop wireless networks
DOI10.1145/1400751.1400759zbMATH Open1301.68041OpenAlexW1964657953MaRDI QIDQ2934331FDOQ2934331
Authors: Baruch Awerbuch, Andrea Richa, Christian Scheideler
Publication date: 12 December 2014
Published in: Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/1400751.1400759
Recommendations
- A jamming-resistant MAC protocol for multi-hop wireless networks
- Principles of robust medium access and an application to leader election
- Competitive throughput in multi-hop wireless networks despite adaptive jamming
- Sade: competitive MAC under adversarial SINR
- Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks
Probability in computer science (algorithm analysis, random structures, phase transitions, etc.) (68Q87) Network design and communication in computer systems (68M10) Network protocols (68M12)
Cited In (22)
- Efficient and competitive broadcast in multi-channel radio networks
- A jamming-resistant MAC protocol for multi-hop wireless networks
- Competitive throughput in multi-hop wireless networks despite adaptive jamming
- Ordered and delayed adversaries and how to work against them on a shared channel
- Broadcasting in an Unreliable SINR Model.
- Self-stabilizing leader election in dynamic networks
- Sade: competitive MAC under adversarial SINR
- Adversarial multiple access channels with individual injection rates
- Interactive communication with unknown noise rate
- Optimal Protocols for 2-Party Contention Resolution
- Who are you? Secure identities in single hop ad hoc networks
- Trusted computing for fault-prone wireless networks
- Contention Resolution with Constant Throughput and Log-Logstar Channel Accesses
- Adaptive packet scheduling over a wireless channel under constrained jamming
- Wired/Wireless Internet Communications
- A leader election algorithm for dynamic networks with causal clocks
- Fast Nonadaptive Deterministic Algorithm for Conflict Resolution in a Dynamic Multiple-Access Channel
- Singletons for simpletons revisiting windowed backoff with Chernoff bounds
- A resource-competitive jamming defense
- Windowed backoff algorithms for WiFi: theory and performance under batched arrivals
- Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks
- Adaptive Scheduling Over a Wireless Channel Under Constrained Jamming
This page was built for publication: A jamming-resistant MAC protocol for single-hop wireless networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2934331)