A Jamming-Resilient and Scalable Broadcasting Algorithm for Multiple Access Channel Networks

Multiple access channel (MAC) networks use a broadcasting algorithm called the Binary Exponential Backoff (BEB) to mediate access to the shared communication channel by competing nodes and resolve their collisions. While the BEB achieves fair throughput and average packet latency in jamming-free environments and relatively small networks, its performance noticeably degrades when the network is exposed to jamming or its size increases. This paper presents an alternative broadcasting algorithm called the K-tuple Full Withholding (KTFW), which significantly increases MAC networks’ resilience to jamming attacks and network growth. Through simulation, we compare the KTFW with both the BEB and the Queue Backoff (QB), an efficient and high-throughput broadcasting algorithm. We compare the three approaches against two different traffic injection models, each approximating a different environment type. Our results show that the KTFW achieves higher throughput and lower average packet latency against jamming attacks than both the BEB and the QB algorithms. The results also show that the KTFW outperforms the BEB for larger networks with or without jamming.

[1]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[2]  Marco Gruteser,et al.  An experimental study of inter-cell interference effects on system performance in unplanned wireless LAN deployments , 2008, Comput. Networks.

[3]  Srihari Nelakuditi,et al.  CSMA/CN: carrier sense multiple access with collision notification , 2012, TNET.

[4]  R. A. Leibler,et al.  On Information and Sufficiency , 1951 .

[5]  Hongbo Zhu,et al.  Congestion-Optimal WiFi Offloading with User Mobility Management in Smart Communications , 2018, Wirel. Commun. Mob. Comput..

[6]  Alvin S. Lim,et al.  Jamming and anti-jamming techniques in wireless networks: a survey , 2014, Int. J. Ad Hoc Ubiquitous Comput..

[7]  Injong Rhee,et al.  WiFox: scaling WiFi performance for large audience environments , 2012, CoNEXT '12.

[8]  Lawrence G. Roberts,et al.  ALOHA packet system with and without slots and capture , 1975, CCRV.

[9]  Guevara Noubir,et al.  On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..

[10]  Frank Thomson Leighton,et al.  Analysis of Backoff Protocols for Multiple Access Channels , 1996, SIAM J. Comput..

[11]  Mythili Vutukuru,et al.  TCP Download Performance in Dense WiFi Scenarios: Analysis and Solution , 2017, IEEE Transactions on Mobile Computing.

[12]  Yung-Fang Chen,et al.  Jamming Resilient Cross-Layer Resource Allocation in Uplink HARQ-Based SIMO OFDMA Video Transmission Systems , 2017, IEEE Access.

[13]  Ian F. Akyildiz,et al.  A survey on wireless mesh networks , 2005, IEEE Communications Magazine.

[14]  Bülent Tavli,et al.  Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks , 2009, Comput. Stand. Interfaces.

[15]  Bogdan S. Chlebus,et al.  Broadcasting in ad hoc multiple access channels , 2015, Theor. Comput. Sci..

[16]  Xin Liu,et al.  Performance of IEEE 802.11 under Jamming , 2013, Mob. Networks Appl..

[17]  Alec Wolman,et al.  Designing High Performance Enterprise Wi-Fi Networks , 2008, NSDI.

[18]  Srinivasan Seshan,et al.  Understanding and mitigating the impact of RF interference on 802.11 networks , 2007, SIGCOMM '07.

[19]  Zheng Dou,et al.  An Adaptive Resource Allocation Model With Anti-Jamming in IoT Network , 2019, IEEE Access.

[20]  Allan Borodin,et al.  Adversarial queuing theory , 2001, JACM.

[21]  Norman M. Abramson,et al.  THE ALOHA SYSTEM: another alternative for computer communications , 1899, AFIPS '70 (Fall).

[22]  Michael A. Bender,et al.  Adversarial contention resolution for simple channels , 2005, SPAA '05.

[23]  David J. Aldous Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels , 1987, IEEE Trans. Inf. Theory.

[24]  J. Hayes,et al.  An Adaptive Technique for Local Distribution , 1978, IEEE Trans. Commun..

[25]  Frank Kelly,et al.  Stochastic Models of Computer Communication Systems , 1985 .

[26]  John Capetanakis,et al.  Tree algorithms for packet broadcast channels , 1979, IEEE Trans. Inf. Theory.

[27]  Victor B. Lawrence,et al.  A Novel Low-Complexity Low-Latency Power Efficient Collision Detection Algorithm for Wireless Sensor Networks , 2015 .

[28]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[29]  Eli Upfal,et al.  Stochastic Contention Resolution With Short Delays , 1998, SIAM J. Comput..

[30]  Baruch Awerbuch,et al.  Universal-stability results and performance bounds for greedy contention-resolution protocols , 2001, JACM.

[31]  Zhu Han,et al.  Jamming Mitigation via Hierarchical Security Game for IoT Communications , 2018, IEEE Access.

[32]  Jianhua Lin,et al.  Divergence measures based on the Shannon entropy , 1991, IEEE Trans. Inf. Theory.

[33]  Dariusz R. Kowalski,et al.  Maximum throughput of multiple access channels in adversarial environments , 2017, Distributed Computing.

[34]  Biplab Sikdar,et al.  A Wireless MAC Protocol with Collision Detection , 2007, IEEE Transactions on Mobile Computing.

[35]  Sebastian Rampfl Network Simulation and its Limitations , 2013 .

[36]  Peng Ning,et al.  Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks , 2012, IEEE Transactions on Signal Processing.

[37]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[38]  Kevin C. Almeroth,et al.  Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Networks , 2010, IEEE Transactions on Mobile Computing.