Suman Bhunia

Learn More
Limited and dynamically available resources and " no right to protection from interference " in the open access dynamic spectrum access model bring forth a serious challenge of sustenance among the secondary networks and make them more susceptible to various spectrum etiquette attacks. Among these, the most common are jamming-based denial of service (DoS)(More)
—In a multihop ad hoc network, end-to-end data transmissions traverse through multiple inter-node wireless links. A jammer can disrupt the entire data transfer of a network by intentionally interfering with links between a subset of nodes. The impact of such attacks is escalated when the jammer is moving. While the majority of current ad hoc protocols(More)
The performance of wireless LANs is greatly affected by pathloss, RF interference and other sources of signal attenuation, in addition to network congestion. The primary factors involved in effective real-time communication, namely delay and loss, must be within certain controlled limits in such a scenario. In this paper, we analyze the various factors(More)
  • 1