Jamming-Resistant Learning in Wireless Networks

  • Johannes Dams
  • Martin Hoefer
  • Thomas Kesselheim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8573)


We consider capacity maximization in wireless networks under adversarial interference conditions. There are n links, each consisting of a sender and a receiver, which repeatedly try to perform a successful transmission. In each time step, the success of attempted transmissions depends on interference conditions, which are captured by an interference model (e.g. the SINR model). Additionally, an adversarial jammer can render a (1 − δ)-fraction of time steps unsuccessful. For this scenario, we analyze a framework for distributed no-regret learning algorithms. We obtain an \(O\left(1/\delta\right)\)-approximation for the problem of maximizing the number of successful transmissions. Our approach provides even a constant-factor approximation when the jammer exactly blocks a (1 − δ)-fraction of time steps. In addition, we consider the parameters of the jammer being unknown to the algorithm, and we also consider a stochastic jammer, for which we obtain a constant-factor approximation after a polynomial number of time steps. We extend our results to more general settings, in which links arrive and depart dynamically.


Wireless Network Time Slot Capacity Maximization Successful Transmission Approximation Factor 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Andrews, M., Dinitz, M.: Maximizing capacity in arbitrary wireless networks in the SINR model: Complexity and game theory. In: Proc. 28th INFOCOM, pp. 1332–1340 (2009)Google Scholar
  2. 2.
    Asgeirsson, E.I., Mitra, P.: On a game theoretic approach to capacity maximization in wireless networks. In: Proc. 30th INFOCOM, pp. 3029–3037 (2011)Google Scholar
  3. 3.
    Auer, P., Cesa-Bianchi, N., Freund, Y., Schapire, R.E.: The nonstochastic multiarmed bandit problem. SIAM Journal on Computing 32(1), 48–77 (2002)CrossRefMATHMathSciNetGoogle Scholar
  4. 4.
    Awerbuch, B., Richa, A.W., Scheideler, C.: A jamming-resistant mac protocol for single-hop wireless networks. In: PODC, pp. 45–54 (2008)Google Scholar
  5. 5.
    Dams, J., Hoefer, M., Kesselheim, T.: Scheduling in wireless networks with rayleigh-fading interference. In: Proc. 24th SPAA (2012)Google Scholar
  6. 6.
    Dams, J., Hoefer, M., Kesselheim, T.: Jamming-resistant learning in wireless networks (full version). CoRR abs/1307.5290 (2013)Google Scholar
  7. 7.
    Dams, J., Hoefer, M., Kesselheim, T.: Sleeping experts in wireless networks. In: Proc. 27th DISC, pp. 344–357 (2013)Google Scholar
  8. 8.
    Dinitz, M.: Distributed algorithms for approximating wireless network capacity. In: Proc. 29th INFOCOM, pp. 1397–1405 (2010)Google Scholar
  9. 9.
    Erlebach, T., Jansen, K., Seidel, E.: Polynomial-time approximation schemes for geometric intersection graphs. SIAM J. Comput. 34(6), 1302–1323 (2005)CrossRefMATHMathSciNetGoogle Scholar
  10. 10.
    Goussevskaia, O., Halldórsson, M., Wattenhofer, R., Welzl, E.: Capacity of arbitrary wireless networks. In: Proc. 28th INFOCOM, pp. 1872–1880 (2009)Google Scholar
  11. 11.
    Goussevskaia, O., Oswald, Y.A., Wattenhofer, R.: Complexity in geometric SINR. In: Proc. 8th MobiHoc, pp. 100–109 (2007)Google Scholar
  12. 12.
    Gupta, P., Kumar, P.R.: The capacity of wireless networks. IEEE Trans. Inf. Theory 46(2), 388–404 (2000)CrossRefMATHMathSciNetGoogle Scholar
  13. 13.
    Halldórsson, M.M., Wattenhofer, R.: Wireless communication is in APX. In: Albers, S., Marchetti-Spaccamela, A., Matias, Y., Nikoletseas, S., Thomas, W. (eds.) ICALP 2009, Part I. LNCS, vol. 5555, pp. 525–536. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  14. 14.
    Halldórsson, M.M., Mitra, P.: Wireless capacity and admission control in cognitive radio. In: Proc. 31st INFOCOM, pp. 855–863 (2012)Google Scholar
  15. 15.
    Hoefer, M., Kesselheim, T., Vöcking, B.: Approximation algorithms for secondary spectrum auctions. In: Proc. 23rd SPAA, pp. 177–186 (2011)Google Scholar
  16. 16.
    Moscibroda, T., Wattenhofer, R.: The complexity of connectivity in wireless networks. In: Proc. 25th INFOCOM, pp. 1–13 (2006)Google Scholar
  17. 17.
    Nieberg, T., Hurink, J., Kern, W.: Approximation schemes for wireless networks. ACM Trans. Algorithms 4(4) (2008)Google Scholar
  18. 18.
    Ogierman, A., Richa, A., Scheideler, C., Schmid, S., Zhang, J.: Competitive medium sharing under adversarial sinr (unpublished paper)Google Scholar
  19. 19.
    Richa, A.W., Scheideler, C., Schmid, S., Zhang, J.: A jamming-resistant mac protocol for multi-hop wireless networks. In: DISC, pp. 179–193 (2010)Google Scholar
  20. 20.
    Richa, A.W., Scheideler, C., Schmid, S., Zhang, J.: Competitive and fair medium access despite reactive jamming. In: ICDCS, pp. 507–516 (2011)Google Scholar
  21. 21.
    Richa, A.W., Scheideler, C., Schmid, S., Zhang, J.: Competitive and fair throughput for co-existing networks under adversarial interference. In: Proc. 31st PODC, pp. 291–300 (2012)Google Scholar
  22. 22.
    Schneider, J., Wattenhofer, R.: An optimal maximal independent set algorithm for bounded-independence graphs. Distributed Computing 22(5-6), 349–361 (2010)CrossRefMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Johannes Dams
    • 1
  • Martin Hoefer
    • 2
  • Thomas Kesselheim
    • 3
  1. 1.Dept. of Computer ScienceRWTH Aachen UniversityGermany
  2. 2.Max-Planck-Institut für Informatik and Saarland UniversityGermany
  3. 3.Dept. of Computer ScienceCornell UniversityUSA

Personalised recommendations