Overcoming adversaries in sensor networks: A survey of theoretical models and algorithmic approaches for tolerating malicious interference

M Young, R Boutaba - IEEE Communications Surveys & …, 2011 - ieeexplore.ieee.org
Interference is an unavoidable property of the wireless communication medium and, in
sensor networks, such interference is exacerbated due to the energy-starved nature of the …

Proof of work without all the work

D Gupta, J Saia, M Young - … of the 19th international conference on …, 2018 - dl.acm.org
Proof-of-work (PoW) is an algorithmic tool used to secure networks by imposing a
computational cost on participating devices. Unfortunately, traditional PoW schemes require …

Exponential separations in the energy complexity of leader election

YJ Chang, T Kopelowitz, S Pettie, R Wang… - ACM Transactions on …, 2019 - dl.acm.org
Energy is often the most constrained resource for battery-powered wireless devices, and
most of the energy is often spent on transceiver usage (ie, transmitting and receiving …

Packet latency of deterministic broadcasting in adversarial multiple access channels

L Anantharamu, BS Chlebus, DR Kowalski… - Journal of Computer and …, 2019 - Elsevier
We study broadcasting in multiple access channels with dynamic packet arrivals and
jamming. Communication environments are represented by adversarial models that specify …

Interactive communication with unknown noise rate

V Dani, TP Hayes, M Movahedi, J Saia… - Information and …, 2018 - Elsevier
Alice and Bob want to run a protocol over a noisy channel, where some bits are flipped
adversarially. Several results show how to make an L-bit noise-free communication protocol …

Competitive and fair throughput for co-existing networks under adversarial interference

A Richa, C Scheideler, S Schmid, J Zhang - Proceedings of the 2012 …, 2012 - dl.acm.org
This paper initiates the formal study of a fundamental problem: How to efficiently allocate a
shared communication medium among a set of K co-existing networks in the presence of …

Bankrupting DoS attackers

T Chakraborty, A Islam, V King, D Rayborn… - arxiv preprint arxiv …, 2022 - arxiv.org
To defend against denial-of-service (DoS) attacks, we employ a technique called resource
burning (RB). RB is the verifiable expenditure of a resource, such as computational power …

Windowed backoff algorithms for WiFi: theory and performance under batched arrivals

WC Anderton, T Chakraborty, M Young - Distributed Computing, 2021 - Springer
Binary exponential backoff (BEB) is a decades-old algorithm for coordinating access to a
shared channel. In modern networks, BEB plays a crucial role in WiFi and other wireless …

Resource-competitive algorithms

MA Bender, JT Fineman, M Movahedi, J Saia… - ACM SIGACT …, 2015 - dl.acm.org
The point of adversarial analysis is to model the worst-case performance of an algorithm.
Unfortunately, this analysis may not always reect performance in practice because the …

Fully energy-efficient randomized backoff: slow feedback loops yield fast contention resolution

MA Bender, JT Fineman, S Gilbert, J Kuszmaul… - Proceedings of the 43rd …, 2024 - dl.acm.org
Contention resolution addresses the problem of coordinating access to a shared
communication channel. Time is discretized into synchronized slots, and a packet …