2014
DOI: 10.1109/twc.2014.2320973
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Adaptive Anti-Jamming via Controlled Mobility

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(19 citation statements)
references
References 33 publications
0
19
0
Order By: Relevance
“…In particular, according to prior results on spectral graph theory [18], the max-flow of an undirected graph can be properly approximated by the so-called weighted Cheeger's constant. However, the graph G d in the considered problem is a directed one.…”
Section: The Proposed Schemementioning
confidence: 99%
See 1 more Smart Citation
“…In particular, according to prior results on spectral graph theory [18], the max-flow of an undirected graph can be properly approximated by the so-called weighted Cheeger's constant. However, the graph G d in the considered problem is a directed one.…”
Section: The Proposed Schemementioning
confidence: 99%
“…By exploiting the underlying structure of the network topology, it is shown that the max-flow in this directed graph is equivalent to that of its undirected counterpart. Based on prior results from spectral graph theory [15]- [18], a direct consequence of this key finding is that the network throughput can be well approximated by the second smallest eigenvalue of the network Laplacian matrix, whose gradient can be readily computed. This in turn allows us to effectively increase the network eigenvalue (and thus approximately the throughput) by adjusting the IRS phase-shifts as well as the power and bandwidth allocation via the generic gradient descent method.…”
Section: Introductionmentioning
confidence: 98%
“…Using game theory, they modeled strategies to assign random access to MAC layers. He et al considered the single and multicommodity flow problems in the presence of mobile relays and single intelligent jammer. Considering that the other nodes, including the source and the destination nodes, are static, they tried to maximize the network flow, using spectral graph theory.…”
Section: Related Workmentioning
confidence: 99%
“…Multipath routing provides a way to circumvent the jammer [26] [27]. Even the mobility of the nodes can in certain scenarios be exploited to avoid jamming [28].…”
Section: Introductionmentioning
confidence: 99%