Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
4954827 | Computer Networks | 2017 | 14 Pages |
Abstract
We propose a theoretical framework to model the protocol performance starting by a benign scenario (no jamming activities). Later, we extend the model to more hostile environments considering firstly a jammer with no knowledge of the nodes' secret keys (external jammer) and subsequently, a jammer aware of a fraction of the nodes' secret keys (internal jammer). The experimental results do confirm our theoretical analysis and show the overall viability of our solution. In particular, FoS outperforms competitor solutions for deployment scenarios characterized by even a moderated degree of node volatility.
Keywords
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Roberto Di Pietro, Gabriele Oligeri,