Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
en:projects:mth:licos3 [2008/11/25 09:37] bardet created |
en:projects:mth:licos3 [2010/03/29 09:26] (current) bardet |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ===== lala ===== | ||
- | \\ | ||
- | **General description**\\ | ||
- | Wireless networks are specially vulnerable to attacks by malicious | ||
- | nodes since the communication is over the air and hence the legitimate | ||
- | transmitted signal is mixed with jamming signals. The question | ||
- | addressed by this project is in the context of wireless relay networks | ||
- | where there are a set of authenticated helper (relay) nodes that | ||
- | facilitate communication between a source and a destination. These | ||
- | helper nodes attempt to maximize throughput between the source and | ||
- | destination while protecting it from malicuous transmissions by | ||
- | jamming nodes. | ||
- | \\ | ||
- | **Goal**\\ | ||
- | The trade-off between throughput and resistance to these denial-of-service attacks is the main question addressed by this project. This develops on recent ideas on wireless networks developed (see http://licos.epfl.ch/index.php?p=research_projWNC). | ||