Open Access Open Access  Restricted Access Subscription or Fee Access

Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection

Nagalatha Yannam, Anil Kumar, Dr.P. Harini

Abstract


Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. In this article, we consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flown optimization problem using portfolio selection theory from financial statistics. We show that in multi-source networks, this centralized optimization problem can be solved using a distributed algorithm based on decomposition in network utility maximization (NUM). We demonstrate the network's ability to estimate the impact of jamming and incorporate these estimates into the traffic allocation problem. Finally, we simulate the achievable throughput using our proposed traffic allocation method in several scenarios.

Keywords


Jamming, Multiple Path Routing, Portfolio Selection Theory, Optimization, Network Utility Maximization

Full Text:

PDF

References


P. Tague, S. Nabar, J. A. Ritcey, D. Slater, and R. Poovendran, .Throughput optimization for multipath unicast routing under probabilistic jamming,. in Proc. 19th Annual IEEE International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC'08), Cannes, France,Sep. 2008, pp. 1.5.

I. F. Akyildiz, X. Wang, and W. Wang, .Wireless mesh networks: A survey,. Computer Networks, vol. 47, no. 4, pp. 445.487, Mar. 2005.

E. M. Sozer, M. Stojanovic, and J. G. Proakis, .Underwater acoustic networks,. IEEE Journal of Oceanic Engineering, vol. 25, no. 1, pp.72.83, Jan. 2000.

R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, Inc., 2001.

J. Bellardo and S. Savage, .802.11 denial-of-service attacks: Real vulnerabilities and practical solutions,. in Proc. USENIX Security Symposium,Washington, DC, Aug. 2003, pp. 15.28


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.