2011
DOI: 10.1109/tnet.2010.2057515
|View full text |Cite
|
Sign up to set email alerts
|

Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection

Abstract: Abstract-Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. In this article, we consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. We show that in multi-source networks, this centrali… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0
2

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 52 publications
(33 citation statements)
references
References 16 publications
0
31
0
2
Order By: Relevance
“…Now, each node in route Π transmits the message to the next node until it reaches the destination. The transmit power of each node is determined by (12) and the actual outage probability of each link can be obtained from (6). Note that the end-to-end outage probability achieved by the proposed method is no greater than the target outage probability, as we used an upper bound in our calculations.…”
Section: Routing Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Now, each node in route Π transmits the message to the next node until it reaches the destination. The transmit power of each node is determined by (12) and the actual outage probability of each link can be obtained from (6). Note that the end-to-end outage probability achieved by the proposed method is no greater than the target outage probability, as we used an upper bound in our calculations.…”
Section: Routing Algorithmmentioning
confidence: 99%
“…In [11] and [12], routing algorithms in the presence of multiple jammers are investigated, but the energy consumption of the network nodes is not considered. Because most devices in wireless ad hoc networks rely on battery power, it is essential to seek methods to reduce their energy consumption.…”
Section: Introductionmentioning
confidence: 99%
“…Recent work by Tague et al [22], [23] studied the optimal traffic allocation scheme over already selected multiple paths and aimed at maximizing the throughput in the presence of jammers, while our scheme effectively incorporates jamming-resilience into multipath selection.…”
Section: Related Workmentioning
confidence: 99%
“…The wireless IDS is unique in that it detects attacks against the 802.11 frame at layer two of the wireless network. Most wireless attacks target management frames, since they are responsible for authentication, association, dissociation, beacon and probe request/response (Tague et al, 2011). Wireless threats such as attacks man-in-the-middle, rouge access points, war drivers and denial of service attacks function within the 802.11 frames and cannot be detected on layer three past access point.…”
Section: Related Workmentioning
confidence: 99%