ABSTRACT
Electing a leader is a fundamental task in distributed computations. Many coordination problems, such as the access to a shared resource, and the resulting inefficiencies, can be avoided by relying on a leader. This paper presents Select, a leader election protocol for wireless networks where nodes communicate over a shared medium. Select is very robust in two respects. First, the protocol is self-stabilizing in the sense that it converges to a correct solution from any possible initial network state (e.g., where no or multiple nodes consider themselves a leader). This is an appealing property, especially for dynamic networks. Second, the described protocol is resilient against a powerful reactive jammer that blocks a significant fraction of all communication rounds. The reactive model is general and of interest beyond jamming (e.g., in the context of co-existing networks). The paper also reports on experimental results obtained from our simulation framework which allows us to study convergence behavior under different types of adversarial jammers.
- G. Alnifie and R. Simon. A multi-channel defense against jamming attacks in wireless sensor networks. In Proc. of Q2SWinet '07, pages 95--104, 2007. Google ScholarDigital Library
- Gheorghe Antonoiu, Gheorghe Antonoiu, Pradip K Srimani, and Pradip K Srimani. A self-stabilizing leader election algorithm for tree graphs. Journal of Parallel and Distributed Computing, 34:227--232, 1996. Google ScholarDigital Library
- Hagit Attiya and Jennifer Welch. Distributed Computing: Fundamentals, Simulations and Advanced Topics (Chapter 3). John Wiley & Sons, 2004. Google ScholarDigital Library
- B. Awerbuch. Optimal distributed algorithms for minimum weight spanning tree, counting, leader election, and related problems. In Proc. STOC, 1987. Google ScholarDigital Library
- Baruch Awerbuch, Andrea Richa, and Christian Scheideler. A jamming-resistant mac protocol for single-hop wireless networks. In Proc. of PODC '08, 2008. Google ScholarDigital Library
- E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa. On the performance of IEEE 802.11 under jamming. In Proc. of IEEE Infocom '08, 2008.Google ScholarCross Ref
- T. Brown, J. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proc. of MobiHoc '06, pages 120--130, 2006. Google ScholarDigital Library
- Shukai Cai, Taisuke Izumi, and Koichi Wada. Space complexity of self-stabilizing leader election in passively-mobile anonymous agents. In Proc. 16th International Colloquium on Structural Information and Communication Complexity (SIROCCO), 2009. Google ScholarDigital Library
- J. T. Chiang and Y.-C. Hu. Cross-layer jamming detection and mitigation in wireless broadcast networks. In Proc. of MobiCom '07, pages 346--349, 2007. Google ScholarDigital Library
- Edsger W. Dijkstra. Self-stabilization in spite of distributed control. Communications of the ACM, 17(11):643--644, 1974. Google ScholarDigital Library
- Shlomi Dolev, Seth Gilbert, Rachid Guerraoui, Dariusz R. Kowalski, Calvin Newport, Fabian Kuhn, and Nancy Lynch. Reliable distributed computing on unreliable radio channels. In Proc. 2009 MobiHoc S3 Workshop, 2009. Google ScholarDigital Library
- R. G. Gallager, P. A. Humblet, and P. M. Spira. A distributed algorithm for minimum-weight spanning trees. ACM Trans. Program. Lang. Syst., 5(l):66--77, 1983. Google ScholarDigital Library
- Sukumar Ghosh and Arobinda Gupta. An exercise in fault-containment: self-stabilizing leader election. Inf. Process. Lett., 59(5):281--288, 1996. Google ScholarDigital Library
- S. Gilbert, R. Guerraoui, and C. Newport. Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. In Proc. of OPODIS '06, 2006. Google ScholarDigital Library
- J. Hromkovic, R. Klasing, A. Pelc, P. Ruzicka, and W. Unger. Dissemination of Information in Communication Networks: Broadcasting, Gossiping, Leader Election, and Fault-Tolerance (Chapter 8). Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2005. Google ScholarDigital Library
- Gene Itkis, Chengdian Lin, and Janos Simon. Deterministic, constant space, self-stabilizing leader election on uniform rings. In Proc. 9th International Workshop on Distributed Algorithms (WDAG), pages 288--302, 1995. Google ScholarDigital Library
- C. Y Koo, V. Bhandari, J. Katz, and N. H. Vaidya. Reliable broadcast in radio networks: The bounded collision case. In Proc. of PODC '06, 2006. Google ScholarDigital Library
- E. Korach, S. Kutten, and S. Moran. A modular technique for the design of efficient distributed leader finding algorithms. ACM Trans. Program. Lang. Syst., 12(1):84--101, 1990. Google ScholarDigital Library
- Shay Kutten and Boaz Patt-Shamir. Time-adaptive self stabilization. In Proc. PODC, 1997. Google ScholarDigital Library
- Seungjoon Lee, Dave Levin, Vijay Gopalakrishnan, and Bobby Bhattacharjee. Backbone construction in selfish wireless networks. In Proc. ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS), 2007. Google ScholarDigital Library
- Xin Liu, Guevara Noubir, Ravi Sundaram, and San Tan. Spread: Foiling smart jammers using multi-layer agility. In Proc. of Infocom '07, pages 2536--2540, 2007.Google ScholarDigital Library
- Koji Nakano and Stephan Olariu. Randomized leader election protocols in radio networks with no collision detection. In ISAAC '00: Proceedings of the 11th International Conference on Algorithms and Computation, pages 362--373, London, UK, 2000. Springer-Verlag. Google ScholarDigital Library
- Vishnu Navda, Aniruddha Bohra, Samrat Ganguly, and Dan Rubenstein. Using channel hopping to increase 802.11 resilience to jamming attacks. In Proc. of Infocom '07, pages 2526--2530, 2007.Google ScholarDigital Library
- Koji Nikano and Stephan Olariu. Uniform leader election protocols for radio networks. IEEE Tram. Parallel Distrib. Syst., 13(5):516--526, 2002. Google ScholarDigital Library
- A. Pelc and D. Peleg. Feasibility and complexity of broadcasting with random transmission failures. In Proc. of PODC '05, 2005. Google ScholarDigital Library
- Andrea Richa, Christian Scheideler, Stefan Schmid, and Jin Zhang. A jamming-resistant mac protocol for multi-hop wireless networks. In Proc. DISC, 2010. Google ScholarDigital Library
- Andrea Richa, Christian Scheideler, Stefan Schmid, and Jin Zhang. Competitive and fair medium access despite reactive jamming. In Proc. 31st IEEE International Conference on Distributed Computing Systems (ICDCS), 2011. Google ScholarDigital Library
- Georgios Smaragdakis, Ibrahim Matta, and Azer Bestavros. Sep: A stable election protocol for clustered heterogeneous wireless sensor networks. In Proc. 2nd International Workshop on Sensor and Actor Network Protocols and Applications (SANPA), 2004.Google Scholar
- Dan E Willard. Log-logarithmic selection resolution protocols in a multiple access channel. SIAM J. Comput., 15(2):468--477, 1986. Google ScholarDigital Library
- A. D. Wood, J. A. Stankovic, and G. Zhou. DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4--based wireless networks. In Proc. of SECON '07, 2007.Google ScholarCross Ref
- W. Xu, T. Wood, and Y. Zhang. Channel surfing and spatial retreats: defenses against wireless denial of service. In Proc. of Workshop on Wireless Security, 2004. Google ScholarDigital Library
Index Terms
- Self-stabilizing leader election for single-hop wireless networks despite jamming
Recommendations
A jamming-resistant MAC protocol for single-hop wireless networks
PODC '08: Proceedings of the twenty-seventh ACM symposium on Principles of distributed computingIn this paper we consider the problem of designing a medium access control (MAC) protocol for single-hop wireless networks that is provably robust against adaptive adversarial jamming. The wireless network consists of a set of honest and reliable nodes ...
Principles of Robust Medium Access and an Application to Leader Election
This article studies the design of medium access control (MAC) protocols for wireless networks that are provably robust against arbitrary and unpredictable disruptions (e.g., due to unintentional external interference from co-existing networks or due to ...
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
SASN '05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networksA typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help prevent the jammer from ...
Comments