IJMTES – JOINTLY EFFECTIVE OPTIMAL FLOW CONTROL AND MULTI-PATH ROUTING FOR WIRELESS NETWORKS UNDER PROBABILISTIC ATTACKS

 Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : Xiaomei Zhang

Volume 02 Issue 12  Year 2015

ISSN no: 2348-3121

Page no: 36-40

Abstract A wireless network is vulnerable to jamming attacks since the network relies on open and shared wireless channels. Maintaining an acceptable level of network performance degradation has been an important problem in the wireless network. This paper studies a scheme for network performance optimization by exploiting dynamic rate control and multi-path routing in the wireless network under probabilistic jamming. We model the optimization problem through maximizing the network utility associated with the effective data flows and propose an effective optimal flow control (EOFC) approach to allocate resource on multiple paths considering the effect of jamming. A novel distributed algorithm is designed to adjust flow rates adaptively on each path using multi-path routing. Our simulation results demonstrate that higher effective network throughput and better fairness can be achieved under jamming by our EOFC algorithm than the standard OFC.

Keywords— Routing; Flow control; Jamming; Wireless Networks

Reference

[1] E. Altman, K. Avrachenkov, and A. Garnaev, “Fair resource allocation in wireless networks in the presence of a jammer,” Performance Evaluation, Vol. 67, No. 4, pp. 338-349, (2010).
[2] M. Li, I. Koutsopoulos, and R. Poovendran, “Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks,” IEEE Transactions on Mobile Computing, Vol. 9, No. 8, pp. 1119- 1133, August (2010).
[3] Y. Zhu, and Y. Jiang, “On Optimal Antijamming Strategies in Wireless Sensor Networks,” Intenational Journal of Distributed Sensor Networks, vol. 2012, Article ID 793194, 9 pages
[4] V. Coskun, E. Cayirci, A. Levi, and S. Sancak, “Quarantine region scheme to mitigate spam attacks in wireless-sensor networks,” IEEE Trans. on Mobile Computing, Vol. 5, No. 8, pp. 1074-1086, August (2006).
[5] S. Jiang and Y. Xue, “Providing Survivability against Jamming Attack for Multi- Radio Multi-Channel Wireless Mesh Networks,” Journal of Network and Computer Applications, SI on Efficient and Robust Security of Wireless Mesh Networks, Vol. 34, No. 2, pp. 443-454, March (2011).
[6] H. Mustafa, X. Zhang, Z. Liu, W. Xu, A. Perrig, “Jamming-Resilient Multipath Routing Leveraging Availability-Based Correlation,” in Proc. of 4th ACM Conference on Wireless Network Security (WiSec), Hamburg, Germany, June (2011).
[7] P. Tague, S. Nabar, J. Ritcey, and R. Poovendran, “Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection,” IEEE/ACM Trans. on Networking, Vol. 19, No. 1, pp. 184-194, Feb. (2011).
[8] F. P. Kelly, A. Maulloo, and D. K. H. Tan, “Rate control for communication networks: shadow price, rairness and stability,”Journal of Operational Research Society, Vol. 49, No. 3, pp. 237-252, March (1998).
[9] J. Lee, M. Chiang, and A. Calderbank, “Utility-Optimal RandomAccess Control,” IEEE Trans. on Wireless Communications, Vol. 6, No. 7, pp. 2741-2751, JULY (2007).
[10] J. Mo, and J. Walrand, “Fair end-to-end window-based congeation control,” IEEE/ACM Trans. on Networking, Vol. 8, No. 5, pp. 556-567, Oct. (2000).
[11] K.J. Arrow, L. Hurwicz, and H. Uzawa, “Studies in Linear and Nonlinear Programming,”Standford University Press, (1958).
[12] W. Wang, M. Palaniswami, and S.H. Low, “Optimal flow control and routing in multi-path netwoks,“ Performance Evaluation, Vol. 52, No.2-3, pp.119-132, April (2003).

Full Paper: Click Here