ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Denial of Service Attacks in Wireless Networks: The Case of Jammers

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 1)

Publication Date:

Authors : ;

Page : 548-558

Keywords : Jamming; Multiple path routing; Portfolio selection theory; Optimization; Network utility maximization;

Source : Downloadexternal Find it from : Google Scholarexternal


Multiple-path source routing protocols distribute the total traffic among available paths. In this article, we consider the problem of jamming-aware source routing and avoiding jamming by splitting data rate. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. We show that in multi-source networks, this centralized optimization problem can be solved using a distributed algorithm based on decomposition in network utility maximization (NUM). We demonstrate the network’s ability to estimate the impact of jamming and solve it by redirecting the packets or by splitting data rate. Finally, we efficiently allocate the traffic to maximize the overall throughput.

Last modified: 2014-02-09 16:41:35