Denial of Service Attacks in Wireless Networks: The Case of JammersJournal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 1)
Publication Date: 2014-01-30
Authors : L.Devi A.Suganthi;
Page : 548-558
Keywords : Jamming; Multiple path routing; Portfolio selection theory; Optimization; Network utility maximization;
Multiple-path source routing protocols distribute the total traffic among available paths. In this article, we consider the problem of jamming-aware source routing and avoiding jamming by splitting data rate. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. We show that in multi-source networks, this centralized optimization problem can be solved using a distributed algorithm based on decomposition in network utility maximization (NUM). We demonstrate the network’s ability to estimate the impact of jamming and solve it by redirecting the packets or by splitting data rate. Finally, we efficiently allocate the traffic to maximize the overall throughput.
Other Latest Articles
Last modified: 2014-02-09 16:41:35