Abstract. This article studies the design of medium access control (MAC) protocols for wireless networks that are provably robust against arbitrary and unpredictable disruptions, e.g., due to unintentional external interference from co-existing networks or due to jamming. We consider a wireless network consisting of a set of n honest and reliable nodes within transmission (and interference) range of each other, and we model the external disruptions with a powerful, adaptive adversary. This adversary may know the protocol and its entire history and can use this knowledge to jam the wireless channel at will at any time. It is allowed to jam a (1 − )-fraction of the time steps, for an arbitrary constant > 0 unknown to the nodes. The nodes cannot distinguish between the adversarial jamming or a collision of two or more messages that are sent at the same time. We demonstrate, for the first time, that there is a local-control MAC protocol requiring only very limited knowledge about the adversary and the network that achieves a constant (asymptotically optimal) throughput for the non-jammed time periods under any adversarial strategy above. The derived principles are also useful to build robust applications on top of the MAC layer, and we present an exemplary study for leader election, one of the most fundamental tasks in distributed computing.1. Introduction. The efficient use of a shared medium is arguable one of the most relevant but also most complex problems in distributed computing. First, a wireless network requires distributed access coordination mechanisms which minimize the internal interference due to simultaneous transmissions from wireless devices in the same network. In addition, the availability of the wireless medium can vary significantly over time due to the external interference, e.g., due to disturbances from other sources such as microwaves, due to transmissions of co-existing (potentially mobile) networks, or due to intentional or even adversarial interruptions. Adversarial attacks constitute a major threat especially since they often do not require any special hardware and may be implemented by simply listening to the open medium and broadcasting in the same frequency band as the network.This article studies the design of distributed medium access schemes which are robust even against a powerful adversary who can block the medium at arbitrary and unpredictable times, and in an adaptive manner (i.e., depending on the protocol history). This adversarial model is used to capture a wide range of interference scenarios. Despite the adversary's power, we show that provably robust medium access solutions exist in the sense that in the time periods where the medium is available, there are many successful transmissions.