IJMTES – EFFECTIVE AND FAIR RESOURCE ALLOCATION FOR WIRELESS NETWORKS UNDER EFFECT OF JAMMING ATTACKS

Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : Xiaomei Zhang

Volume 02 Issue 12  Year 2015 

ISSN no: 2348-3121  

Page no: 78-83

Abstract The shared, open nature of wireless networks renders them vulnerable to jamming attacks, which may decrease the packet delivery ratio of wireless links. The potential jamming attacks for wireless networks pose a great challenge to the design of effective resource allocation algorithms which maintain fairness among multiple flows and an acceptable level of service through achieving good effective throughput. In this paper, we present a pricing policy considering the reliability constraint which establishes channel condition price referred to data packet loss in wireless networks. Using this model, the Channel Condition Price-based Resource Allocation Algorithm (CCPRAA) is proposed to ensure fair channel capacity allocation among flows and effective network throughput under the effect of jamming attacks. Through simulation results, the proposed algorithm is shown to be able to fairly distribute resource among flows and achieve higher effective network throughput than the traditional algorithm under effect of jamming attacks.

Keywords— Resource allocation; Jamming; Wireless Networks

Reference

[1] E. Altman, K. Avrachenkov, and A. Garnaev, “Fair resource allocation in wireless networks in the presence of a jammer,” Performance Evaluation, Vol. 67, No. 4, pp. 338-349, (2010).
[2] D. J. Thuente and M. Acharya, “Intelligent jamming in wireless networks with applications to 802.11b and other networks,” in Proc. of 25th IEEE Communications Society Military Communications Conference (MILCOM’06), Washington, DC, October (2006), pp. 1-7.
[3] V. Coskun, E. Cayirci, A. Levi, and S. Sancak, “Quarantine region scheme to mitigate spam attacks in wireless-sensor networks,” IEEE Transactions On Mobile Computing, Vol. 5, No. 8, pp. 1074-1086, August (2006).
[4] M. Li, I. Koutsopoulos, and R. Poovendran, “Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks,” IEEE Transactions on Mobile Computing, Vol. 9, No. 8, pp. 1119-1133, August (2010).
[5] Z. Lin and M. van der Schaar, “MAC Layer Jamming Mitigation Using a Game Augmented by Intervention,” EURASIP Journal on Wireless Communications and Networking, Vol. (2010), April (2010).
[6] P. Tague, S. Nabar, J. Ritcey, and R. Poovendran, “Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection,” IEEE/ACM Transactions on Networking, Vol. 19, No. 1, pp. 184-194, February (2011).
[7] S. Jiang and Y. Xue, “Providing Survivability against Jamming Attack for Multi- Radio Multi-Channel Wireless Mesh Networks,” Journal of Network and Computer Applications, Special Issue on Efficient and Robust Security of Wireless Mesh Networks, Vol. 34, No. 2, pp. 443-454, March (2011).
[8] F. P. Kelly, A. Maulloo, and D. K. H. Tan, “Rate control for communication networks: shadow price, rairness and stability,”Journal of Operational Research Society, Vol. 49, No. 3, pp. 237-252, March (1998).
[9] V. Subramanian, K. Duffy, and D. Leith, “Existence and uniqueness of fair rate allocations in lossy wireless networks, ” IEEE Transactions on Wireless Communications, Vol.8, No.7, pp. 3401-3406, (2009).
[10] F. Paganini, J. Doyle, and S. Low, “ Scalable Laws for Stable Network Congestion Control,” in Proc. of IEEE Conference on Decision and Control (CDC’01), pp. 185-190, (2001).
[11] W. Xu, K. Ma, W. Trappe, and Y. Zhang, “ Jamming sensor networks: Attack and defense strategies,” IEEE Network, Vol. 20, No.3, pp. 41-47, May/June (2006).
[12] V. Coskun, E. Cayirci, A. Levi, and S. Sancak, “Quarantine region scheme to mitigate spam attacks in wireless-sensor networks,” IEEE Transactions On Mobile Computing, Vol. 5, No. 8, pp. 1074-1086, August (2006).

Full Pdf Paper: Click Here

Scroll Up