Show simple item record

dc.contributor.authorFernández Anta, Antonioen
dc.contributor.authorGeorgiou, Chryssisen
dc.contributor.authorZavou, Ellien
dc.contributor.editorBouajjani A.en
dc.contributor.editorFauconnier H.en
dc.creatorFernández Anta, Antonioen
dc.creatorGeorgiou, Chryssisen
dc.creatorZavou, Ellien
dc.date.accessioned2019-11-13T10:40:03Z
dc.date.available2019-11-13T10:40:03Z
dc.date.issued2015
dc.identifier.issn0302-9743
dc.identifier.urihttp://gnosis.library.ucy.ac.cy/handle/7/53931
dc.description.abstractIn this paper we consider a two-node setting with a sender transmitting packets to a receiver over a wireless channel. Unfortunately, the channel can be jammed, thus corrupting the packet that is being transmitted at the time. The sender has a specific amount of data that needs to be sent to the receiver and its objective is to complete the transmission of the data as quickly as possible in the presence of jamming. We assume that the jamming is controlled by a constrained adversary. In particular, the adversary’s power is constrained by two parameters, ρ and σ. Intuitively, ρ represents the rate at which the adversary can jam the channel, and σ the length of the largest bursts of jams it can cause. This definition corresponds to the translation of the Adversarial Queuing Theory (AQT) constrains, typically defined for packet injections in similar settings, to channel jamming. We propose deterministic scheduling algorithms that decide the lengths of the packets to be sent by the sender in order to minimize the transmission time. We first assume all packets being of the same length (uniform) and characterize the corresponding optimal packet length. Then, we show that if the packet length can be adapted, for specific values of ρ and σ the transmission time can be improved. © Springer International Publishing Switzerland 2015.en
dc.source3rd International Conference on Networked Systems, NETYS 2015en
dc.source.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84961174048&doi=10.1007%2f978-3-319-26850-7_16&partnerID=40&md5=f96af3f92798d5ad17a87718d7e3a4a5
dc.subjectJammingen
dc.subjectPacket networksen
dc.subjectWireless channelen
dc.subjectQueueing networksen
dc.subjectPacket schedulingen
dc.subjectUnreliable communicationen
dc.subjectQueueing theoryen
dc.subjectAdversarial jammingen
dc.subjectDeterministic schedulingen
dc.subjectOptimal packet lengthsen
dc.subjectScheduling algorithmsen
dc.subjectAdversarial queueing theoriesen
dc.subjectAdversarial Queueing Theoryen
dc.subjectAdversarial queuing theoryen
dc.subjectPacket injectionen
dc.subjectTransmission timeen
dc.titlePacket scheduling over a wireless channel: AQT-based constrained jammingen
dc.typeinfo:eu-repo/semantics/article
dc.identifier.doi10.1007/978-3-319-26850-7_16
dc.description.volume9466
dc.description.startingpage230
dc.description.endingpage245
dc.author.faculty002 Σχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences
dc.author.departmentΤμήμα Πληροφορικής / Department of Computer Science
dc.type.uhtypeArticleen
dc.description.notes<p>Sponsors: Springeren
dc.description.notesConference code: 165729en
dc.description.notesCited By :1</p>en
dc.source.abbreviationLect. Notes Comput. Sci.en
dc.contributor.orcidGeorgiou, Chryssis [0000-0003-4360-0260]
dc.contributor.orcidFernández Anta, Antonio [0000-0001-6501-2377]
dc.gnosis.orcid0000-0003-4360-0260
dc.gnosis.orcid0000-0001-6501-2377


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record