Maximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer

Routing traffic through multiple paths is known as multipath routing. There was considerable research in the area of multiple-path source routing to overcome the problem of jamming. Many jamming- aware approaches existed. This paper explores the jamming aware concept of (1) with empirical studies using NS2. Moreover it also explores the possibility of relaxing the assumption of (1) with respect to in-network inference of correlations among related variables. In this implementation the source node allocates traffic to the available paths based on the awareness of jamming details at nodes. The practical implementation makes use of portfolio selection as explored in (1) and tries to explore the in-network inference of correlations among estimated random variables. The algorithm used to achieve this ensures that all available paths are optimally utilized without congestion while maximizing throughput. The simulation results revealed that the network is capable of performing jamming aware allocation of traffic. Index Terms-Multiple path source routing, traffic allocation, jamming, optimization, and in-network inference

[1]  S. W. Roberts Control chart tests based on geometric moving averages , 2000 .

[2]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[3]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[4]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[5]  Baochun Li,et al.  MP-DSR: a QoS-aware multi-path dynamic source routing protocol for wireless ad-hoc networks , 2001, Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks.

[6]  Radha Poovendran,et al.  Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection , 2011, IEEE/ACM Transactions on Networking.

[7]  Guevara Noubir,et al.  On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..

[8]  M. Stojanovic,et al.  Underwater acoustic networks , 2000, IEEE Journal of Oceanic Engineering.

[9]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[10]  David J. Thuente,et al.  Intelligent jamming in wireless networks with applications to 802.11b and other networks , 2006 .

[11]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[12]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.