About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
1st International ICST Workshop on the Security and Privacy of Emerging Ubiquitous Communication Systems

Research Article

On Adjusting Power to Defend Wireless Networks from Jamming

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/MOBIQ.2007.4451072,
        author={ Wenyuan  Xu},
        title={On Adjusting Power to Defend Wireless Networks from Jamming},
        proceedings={1st International ICST Workshop on the Security and Privacy of Emerging Ubiquitous Communication Systems},
        publisher={IEEE},
        proceedings_a={SPEUCS},
        year={2008},
        month={2},
        keywords={Access protocols  Electromagnetic interference  Jamming  Power control  Sensor arrays  Spread spectrum communication  Telecommunication network reliability  Wireless mesh networks  Wireless networks  Wireless sensor networks},
        doi={10.1109/MOBIQ.2007.4451072}
    }
    
  • Wenyuan Xu
    Year: 2008
    On Adjusting Power to Defend Wireless Networks from Jamming
    SPEUCS
    IEEE
    DOI: 10.1109/MOBIQ.2007.4451072
Wenyuan Xu1,*
  • 1: Department of Computer Science and Engineering University of South Carolina, Columbia, SC, 29208
*Contact email: wyxu@engr.sc.edu

Abstract

Wireless networks are susceptible to accidental or intentional radio interference. One way to cope with this threat is to have the radios compete with the jammer, whereby the network nodes adapt their transmission power to improve the chance for successful communication. In this paper, we examine issues associated with using power control both theoretically and experimentally. We begin by examining the two-party, single-jammer scenario, where we explore the underlying communication theory associated with jamming. We note that the effect of the jammer upon source-receiver communications is not isotropic. We then discuss the potential for improving communication reliability through experiments conducted using Mica2 motes, and in particular explore the feasibility of power- control for competing against jammers. Next, we turn to examining the more complicated scenario consisting of a multi- hop wireless network. We show the complex jamming effect by applying the non-isotropic model of jamming to a multi-hop wireless network, and it is necessary to have a feed-back based power control protocol to compete with jamming interference.

Keywords
Access protocols Electromagnetic interference Jamming Power control Sensor arrays Spread spectrum communication Telecommunication network reliability Wireless mesh networks Wireless networks Wireless sensor networks
Published
2008-02-12
Publisher
IEEE
Modified
2011-08-09
http://dx.doi.org/10.1109/MOBIQ.2007.4451072
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL