NTU IM OPLAB Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks Journal of Network and Computer Applications.

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
Advertisements

Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
Capacity of wireless ad-hoc networks By Kumar Manvendra October 31,2002.
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Jaringan Komputer Lanjut Packet Switching Network.
TDMA Scheduling in Wireless Sensor Networks
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
EE 685 presentation Optimal Control of Wireless Networks with Finite Buffers By Long Bao Le, Eytan Modiano and Ness B. Shroff.
DYNAMIC POWER ALLOCATION AND ROUTING FOR TIME-VARYING WIRELESS NETWORKS Michael J. Neely, Eytan Modiano and Charles E.Rohrs Presented by Ruogu Li Department.
Routing and Scheduling in Wireless Grid Mesh Networks Abdullah-Al Mahmood Supervisor: Ehab Elmallah Graduate Students’ Workshop on Networks Research Department.
Distributed Algorithms for Secure Multipath Routing
Wireless Mesh Networks 1. Architecture 2 Wireless Mesh Network A wireless mesh network (WMN) is a multi-hop wireless network that consists of mesh clients.
Deployment of Surface Gateways for Underwater Wireless Sensor Networks Saleh Ibrahim Advising Committee Prof. Reda Ammar Prof. Jun-Hong Cui Prof. Sanguthevar.
CS541 Advanced Networking 1 Spectrum Sharing in Cognitive Radio Networks Neil Tang 3/23/2009.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
LCN 2007, Dublin 1 Non-bifurcated Routing in Wireless Multi- hop Mesh Networks by Abdullah-Al Mahmood and Ehab S. Elmallah Department of Computing Science.
Maximizing the Lifetime of Wireless Sensor Networks through Optimal Single-Session Flow Routing Y.Thomas Hou, Yi Shi, Jianping Pan, Scott F.Midkiff Mobile.
CS541 Advanced Networking 1 Static Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/9/2009.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
1 Expected Data Rate (EDR): An Accurate High-Throughput Path Metric For Multi- Hop Wireless Routing Jun Cheol Park Sneha Kumar Kasera.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
A Fair Scheduling for Wireless Mesh Networks Naouel Ben Salem and Jean-Pierre Hubaux Laboratory of Computer Communications and Applications (LCA) EPFL.
MAXIMIZING SPECTRUM UTILIZATION OF COGNITIVE RADIO NETWORKS USING CHANNEL ALLOCATION AND POWER CONTROL Anh Tuan Hoang and Ying-Chang Liang Vehicular Technology.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
SoftCOM 2005: 13 th International Conference on Software, Telecommunications and Computer Networks September 15-17, 2005, Marina Frapa - Split, Croatia.
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
On Energy-Efficient Trap Coverage in Wireless Sensor Networks Junkun Li, Jiming Chen, Shibo He, Tian He, Yu Gu, Youxian Sun Zhejiang University, China.
Minimax Open Shortest Path First (OSPF) Routing Algorithms in Networks Supporting the SMDS Service Frank Yeong-Sung Lin ( 林永松 ) Information Management.
Advanced Communication Network Joint Throughput Optimization for Wireless Mesh Networks R 戴智斌 R 蔡永斌 Xiang-Yang.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Providing End-to-End Delay Guarantees for Multi-hop Wireless Sensor Networks I-Hong Hou.
Capacity Enhancement with Relay Station Placement in Wireless Cooperative Networks Bin Lin1, Mehri Mehrjoo, Pin-Han Ho, Liang-Liang Xie and Xuemin (Sherman)
Research Direction Introduction Advisor: Professor Frank Y.S. Lin Present by Hubert J.W. Wang.
1 Iterative Integer Programming Formulation for Robust Resource Allocation in Dynamic Real-Time Systems Sethavidh Gertphol and Viktor K. Prasanna University.
CS223 Advanced Data Structures and Algorithms 1 Maximum Flow Neil Tang 3/30/2010.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Multicast Recipient Maximization in IEEE j WiMAX Relay Networks Wen-Hsing Kuo † ( 郭文興 ) & Jeng-Farn Lee ‡ ( 李正帆 ) † Department of Electrical Engineering,
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
1 11 Distributed Channel Assignment in Multi-Radio Mesh Networks Bong-Jun Ko, Vishal Misra, Jitendra Padhye and Dan Rubenstein Columbia University.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
Optimization Models for Fixed Channel Assignment in Wireless Mesh Networks with Multiple Radios Arindam K. Das, Sumit Roy, SECON Kim Young.
1 Spectrum Co-existence of IEEE b and a Networks using the CSCC Etiquette Protocol Xiangpeng Jing and Dipankar Raychaudhuri, WINLAB Rutgers.
A Maximum Fair Bandwidth Approach for Channel Assignment in Wireless Mesh Networks Bahador Bakhshi and Siavash Khorsandi WCNC 2008.
1 Chapter 6 Reformulation-Linearization Technique and Applications.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Joint Routing and Scheduling Optimization in Wireless Mesh Networks with Directional Antennas A. Capone, I. Filippini, F. Martignon IEEE international.
Slide 1 Toward Optimal Sniffer-Channel Assignment for Reliable Monitoring in Multi-Channel Wireless Networks Donghoon Shin, Saurabh Bagchi and Chih-Chun.
Impact of Interference on Multi-hop Wireless Network Performance
Constraint-Based Routing
Presented by Tae-Seok Kim
Frank Yeong-Sung Lin (林永松) Information Management Department
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Pradeep Kyasanur Nitin H. Vaidya Presented by Chen, Chun-cheng
Advisor: Frank Yeong-Sung Lin, Ph.D. Presented by Yu-Jen Hsieh 謝友仁
Frank Yeong-Sung Lin (林永松) Information Management Department
Advisor: Yeong-Sung, Lin, Ph.D. Presented by Yu-Ren, Hsieh
Achieving Resilient Routing in the Internet
Presentation transcript:

NTU IM OPLAB Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks Journal of Network and Computer Applications Author: Shanshan Jiang, Yuan Xue Advisor: Frank,Yeong-Sung Lin Presented by Jia-Ling Pan /06/08

COMPANY LOGO Outline  Introduction  System model  Routing and channel assignment without jamming attacks  Optimal restoration strategies under jamming attacks /06/08

COMPANY LOGO Outline  Dynamic channel assignment under jamming attacks  Static channel assignment under jamming attacks  Performance degradation model  Performance evaluation  Concluding remarks 2010/06/08 3

COMPANY LOGO Introduction  Wireless mesh network are capable of communicating with each other and cooperating to relay traffic throughout the network via multiple hops.  Built upon open wireless medium, wireless mesh network is particularly vulnerable to jamming attacks.  The ability to deal with jamming attacks and maintain an acceptable level of service degradation in presence of jamming attack is thus a crucial issue /06/08

COMPANY LOGO Introduction  When jamming occurs, the traffic going through that jamming area is disrupted.  The network either switches to different channels other than those of the jammers, and/or its traffic needs to be rerouted around the jamming area.  This paper investigates the jamming defense strategies via the joint design of traffic rerouting, channel re-assignment, and scheduling in a multi-radio multi-channel wireless mesh network /06/08

COMPANY LOGO Introduction  First formulate the optimal network restoration problem as linear programming problem, which gives an upper bound on the achievable network throughput.  Consider two strategies, namely global restoration and local restoration.  Based on the LP solutions, providing a greedy scheduling algorithm using dynamic channel assignment, which schedules both the network traffic and the jamming traffic /06/08

COMPANY LOGO Introduction  Further provide a greedy static edge channel assignment algorithm, where a channel is assigned to an edge at the beginning and will remain fixed over all time slots.  Define two performance degradation indices, transient disruption index (TDI) and throughput degradation index (THI) /06/08

COMPANY LOGO Outline II ntroduction SS ystem model RR outing and channel assignment without jamming attacks OO ptimal restoration strategies under jamming attacks /06/08

COMPANY LOGO System model  Normal node model Consider a multi-radio multi-channel wireless mesh network and model it as a directed graph G=(V,E,C). Each node v is equipped with k(v) radios. E=E T υ E I All nodes have a uniform transmission range (R T ) and a uniform interference range (R I ). A transmission edge e=(v,v’) Є E T is formed if r(v,v’) ≤ R T. An interference edge e=(v,v’) Є E I is formed if R T ≤ r(v,v’) ≤ R I /06/08

COMPANY LOGO System model Wireless channel capacity is the same for all edge using channel c (Φ c ). Packet transmission from node v to v’ is successful if and only if : There is a transmission edge e=(v,v’) Є E T. Node v and v’ have radios that support a common channel c. Any other node v” Є V within the interference range of the sending node v or the receiving node v’, i.e., e=(v,v”) Є E T υ E I or e=(v’,v”) Є E T υ E I, is not transmitting on channel c /06/08

COMPANY LOGO System model I(e) : Interference set which contains the transmission edges that interfere with transmission edge e, e Є E T. The traffic between any pair of nodes as a flow and denote it as f Є F. s f : the sending node of flow f r f : the receiving node of flow f d f : the demand of flow f The traffic of flow f will be routed over multiple paths and multiple channels : x f (e,c) : The amount of flow f’ s traffic being routed on edge e over channel c /06/08

COMPANY LOGO System model ∑ f Є F x f (e,c) : The amount of all flows’ traffic on edge e over channel c  Jamming node model j c Є J c : A wireless jammer node at channel c. J c : The set of all the jammers detected at channel c. J : The set of all the jammers over all the channels. G jc : Constant traffic generating rate 0 ≤ G jc ≤ Φ c. All the jamming nodes have a uniform jamming range R J /06/08

COMPANY LOGO System model Assume that they are smart jammers that can totally occupy the channels when sending jamming traffic. J c (e),e Є E T υE I : the set of jammers who have one or both of the two end nodes of the edge e within its jamming range. E T (j c ) : the set of transmission edges whose sending or receiving node is within the jamming range of j c. Assume that two jammers are not within the jamming range of each other /06/08

COMPANY LOGO Outline II ntroduction SS ystem model RR outing and channel assignment without jamming attacks OO ptimal restoration strategies under jamming attacks /06/08

COMPANY LOGO Routing and channel assignment without jamming attacks  First study the routing and channel assignment problem in a multi-radio multi-channel wireless mesh network when there is no jamming node.  The goal is achieving the maximum throughput.  Find a best strategy that can minimize the performance degradation to defend against jamming attacks /06/08

COMPANY LOGO Routing and channel assignment without jamming attacks  Under this network and traffic model, optimizing the performance of a wireless mesh network via the joint design of routing, channel assignment, and scheduling can be formulated as an integer linear programming problem (ILP).  To make the integer linear programming problem tractable, existing approaches (Alicherry et al., 2005; Kodialam and Nandagopal, 2005; Kumar et al., 2005) usually solve its LP relaxation and then scale the solution to achieve feasibility /06/08

COMPANY LOGO Routing and channel assignment without jamming attacks  The necessary conditions of channel assignment and scheduling for a multi- radio multi-channel wireless network are summarized as follows:  Node radio constraint :  Channel congestion constraint : /06/08

COMPANY LOGO Routing and channel assignment without jamming attacks  Minimum flow throughput scaling factor(λ) : Characterizes the throughput of a given routing with respect to a certain traffic demand /06/08

COMPANY LOGO Routing and channel assignment without jamming attacks flow conservation constraint node radio constraint channel congestion constraint /06/08

COMPANY LOGO Outline II ntroduction SS ystem model RR outing and channel assignment without jamming attacks OO ptimal restoration strategies under jamming attacks /06/08

COMPANY LOGO Optimal restoration strategies under jamming attacks  The disrupted network traffic can be rerouted to use other intermittent nodes away from the jamming area, or switched to another channel instead of using the jammed channel.  Include the jamming traffic into the channel congestion constraint: /06/08

COMPANY LOGO Optimal restoration strategies under jamming attacks globallocal  The network restoration via joint traffic rerouting and channel re-assignment under global and local restoration strategies /06/08

COMPANY LOGO Optimal restoration strategies under jamming attacks  Global restoration flow conservation constraint node radio constraint channel congestion constraint /06/08

COMPANY LOGO Optimal restoration strategies under jamming attacks  Local restoration Need to find the bypass flows that need to be partially routed away from the jamming area. For these flows, their immediate upstream and downstream nodes surrounding the jamming area should remain unchanged /06/08

COMPANY LOGO Optimal restoration strategies under jamming attacks Bypass flows For a jamming node j c and a flow f : in f (j c ) : The set of nodes that are within the jamming area of j c. pre f (j c ) : The set of nodes sending data of f directly to one or more nodes in in f (j c ). post f (j c ) : The set of nodes receiving data of f directly from one or more nodes in in f (j c ) /06/08

COMPANY LOGO Optimal restoration strategies under jamming attacks /06/08

COMPANY LOGO Optimal restoration strategies under jamming attacks Optimal bypass restoration X bf (v,v’,jc) (e,c) : The traffic demand of b f (v,v’,j c ) that is routed over edge e and channel c. The bypass flows need to share the wireless channel capacity with the original flows, both of them need to be scaled again. λ b : Scaling factor with bypass restoration /06/08

COMPANY LOGO Optimal restoration strategies under jamming attacks node radio constraint channel congestion constraint /06/08

COMPANY LOGO Optimal restoration strategies under jamming attacks bypass flow conservation constraint /06/08

COMPANY LOGO Outline DD ynamic channel assignment under jamming attacks SS tatic channel assignment under jamming attacks PP erformance degradation model PP erformance evaluation CC oncluding remarks /06/08

COMPANY LOGO Dynamic channel assignment under jamming attacks  The global restoration and the local restoration give an upper bound on the achievable network throughput.  Dynamic channel assignment problem : A radio may need to switch to a different channel at different time slots. Provides the maximum flexibility in channel assignment and scheduling. Greedy approach /06/08

COMPANY LOGO Dynamic channel assignment under jamming attacks  Schedule both the network traffic on the edges and the jamming traffic.  I(e * ) : The set of transmission edges that interfere with edge e *.  E(J c * ) : The set of transmission edges that are within the jamming range of jammer j c * /06/08

COMPANY LOGO Dynamic channel assignment under jamming attacks /06/08

COMPANY LOGO Dynamic channel assignment under jamming attacks /06/08

COMPANY LOGO Dynamic channel assignment under jamming attacks round e* e1e1 e2e2 e2e2 e1e1 e2e2 e1e1 x (e 1,c) x (e 2,c) V V’ V’’ (e 1,c) (e 2,c) node set v1,1,2,2,3,31,1,2,2,3,3,….. v’1,2,31,1,2,2,3,3,…… v’’1,2,31,1,2,2,3,3,…… edge- channel set e 1,c1,2,31,2,3,4,……. e 2,c1,2,31,2,3,4,……. k(v)=k(v’)=k(v’’)=2 color poorcolor set 2010/06/08

COMPANY LOGO Dynamic channel assignment under jamming attacks  N : The maximum number of time slots taken by all the edge-channel pairs.  The new scaling factor λ S J after scheduling is calculated as : /06/08

COMPANY LOGO Outline DD ynamic channel assignment under jamming attacks SS tatic channel assignment under jamming attacks PP erformance degradation model PP erformance evaluation CC oncluding remarks /06/08

COMPANY LOGO Static channel assignment under jamming attacks  Dynamic channel assignment provides the maximum flexibility, but results in channel switching overhead.  Static edge channel assignment problem A channel is assigned to an edge at the beginning and will remain fixed over all time slots. Greedy approach /06/08

COMPANY LOGO Static channel assignment under jamming attacks  Constraint set The node radio constraint and the channel congestion constraint have a common structure. L Left sides of (1)&(10),have L sets, each of which is composed of (edge, channel)pairs. L Right sides of (1)&(10), have L fixed values, where L is the number of all the expanded inequalities /06/08

COMPANY LOGO Static channel assignment under jamming attacks S 1, S 2,…., S L : the sets of (edge, channel) pairs. β S 1 -G S 1, β S 2 -G S 2,…., β S L -G S L : their corresponding values. If S i comes from the node radio constraint : β S i = k(v)Φ c, G S i = 0. If S i comes from the channel congestion constraint : β S i = Φ c, G S i = ∑ j c Є J c (e) G j c. General form of Inequality (1) & (10) using constraint sets is defined as follows: /06/08

COMPANY LOGO Static channel assignment under jamming attacks  Static channel assignment x(e) : The amount of all flows’ traffic over all the channels on edge e. For simplicity, assume that only one channel can be assigned to a given edge. one particular Therefore, x(e) is assigned to one particular channel assigned to edge e. The basic idea of static channel assignment algorithm is to distribute the load on the constraint sets as much as possible among the given channels /06/08

COMPANY LOGO Static channel assignment under jamming attacks /06/08

COMPANY LOGO Outline DD ynamic channel assignment under jamming attacks SS tatic channel assignment under jamming attacks PP erformance degradation model PP erformance evaluation CC oncluding remarks /06/08

COMPANY LOGO Performance degradation model  Challenge for choosing the restoration strategy : Understand the tradeoff between the overhead involved in repairing the failed traffic path(s) and the traffic throughput and network congestion after restoration.  Transient Disruption Index (TDI) Based on the repair overhead for the failed traffic path(s) during restoration.  Throughput Degradation Index (THI) Characterizes throughput degradation of the new network after restoration /06/08

COMPANY LOGO Performance degradation model  Transient disruption index (TDI) Use the number of modified routing table entries as an estimate of the repair overhead for the failed path(s). For local repair, only the boundary nodes outside the jamming area will try to find the alternative paths. For global repair, the source node initiates a new route discovery and involves more routing table entry modifications /06/08

COMPANY LOGO Performance degradation model r v (c,v’) : A routing table entry of node v’s routing table. At a given channel c, it is calculated as the ratio of the total traffic of all the flows sending from node v to its next-hop node v’ to the total traffic of all the flows receiving at node v. r v * ( c,v’) : Its corresponding routing table entry for the new network under jamming. r(G) : All the routing table entries of the nodes in the network G /06/08

COMPANY LOGO Performance degradation model  Throughput degradation index (THI) Use the changes of the minimum flow throughput scaling factor λ as an estimate of the throughput degradation of the new network. For local repair, it achieves partially optimal utilization of the network. For global repair, all flows in the network will be considered in order to get an optimal utilization of the network /06/08

COMPANY LOGO Outline DD ynamic channel assignment under jamming attacks SS tatic channel assignment under jamming attacks PP erformance degradation model PP erformance evaluation CC oncluding remarks /06/08

COMPANY LOGO Performance evaluation SSSSimulation setup SS imulation result overview CC omparison of TDI and THI under various scenarios CC omparison of λ under various scenarios /06/08

COMPANY LOGO Performance evaluation 54 wireless nodes are randomly deployed over a 1800*1080 m 2 region. R T = 250 m, R I = 250 m. Channel capacity Φ c (c Є C) is set as 1 Mbps. Three randomly distributed jamming nodes. R J = 100 or 200 m. Traffic generating rates of the jammers are from 0.2 to 0.8 Mbps /06/08

COMPANY LOGO Performance evaluation All the flows‘ traffic demand of 1 Mbps /06/08

COMPANY LOGO Performance evaluation  Evaluate the performance of the global restoration and local restoration under two scenarios: Single channel All the network nodes and jamming nodes use the same channel. Multiple channels All the network nodes and jamming nodes use multiple channels and │ C │ =5. Each network node is equipped with multiple radios. Jammers are able to send jamming traffic over all the channels /06/08

COMPANY LOGO Performance evaluation SS imulation setup SSSSimulation result overview CC omparison of TDI and THI under various scenarios CC omparison of λ under various scenarios /06/08

COMPANY LOGO Performance evaluation /06/08

COMPANY LOGO Performance evaluation /06/08

COMPANY LOGO Performance evaluation /06/08

COMPANY LOGO Performance evaluation /06/08

COMPANY LOGO Performance evaluation /06/08

COMPANY LOGO Performance evaluation SS imulation setup SS imulation result overview CCCComparison of TDI and THI under various scenarios CC omparison of λ under various scenarios /06/08

COMPANY LOGO Performance evaluation /06/08

COMPANY LOGO Performance evaluation /06/08

COMPANY LOGO Performance evaluation SS imulation setup SS imulation result overview CC omparison of TDI and THI under various scenarios CCCComparison of λ under various scenarios /06/08

COMPANY LOGO Performance evaluation /06/08

COMPANY LOGO Performance evaluation /06/08

COMPANY LOGO Outline DD ynamic channel assignment under jamming attacks SS tatic channel assignment under jamming attacks PP erformance degradation model PP erformance evaluation CC oncluding remarks /06/08

COMPANY LOGO Concluding remarks  This paper investigates the network restoration problem in multi-radio multi- channel wireless mesh networks under jamming attacks.  The defense strategy dynamically adjusts the channel assignment and traffic routes to bypass the jamming area.  Two restoration strategies Global restoration Local restoration /06/08

COMPANY LOGO Concluding remarks  The goal is to minimize the performance degradation caused by the jamming attack.  Formulates as linear programming problems.  Network performance are evaluated via comprehensive simulation study under different jamming attack scenarios /06/08

COMPANY LOGO Concluding remarks  Static channel assignment Inefficient use of radio resource also hinders the network performance improvement when the number of radios is increased.  The post-restoration network performance (i.e., THI) may improve, when the network nodes are equipped with more radios, the disruption during the restoration (i.e., TDI) may get worse, as more radios need to switch channels /06/08

NTU IM OPLAB 69