Interference aware routing for CDMA wireless ad hoc networks

Hasan Mahmood, Cristina Comaniciu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

The CDMA technology represents an appealing choice for ad hoc networks deployments in military communications, due to its intrinsic resistance to jamming and interference, and its low probability of intercept property. On the other hand, ad hoc CDMA network performance is severely limited by strong interferers, and for peer-to-peer communications the near-far effect problem cannot be mitigated through power control as in cellular systems. In this paper, we propose to alleviate the near-far problem at the network level by designing an interference aware routing scheme. The proposed routing algorithm seeks to minimize the total energy expenditure for an end-to-end path, subject to constraints on the interference caused by the nodes participating in a route to other nodes in their neighborhood. Our simulation results using this routing technique show improvements in throughput of up to 60%, compared with the classic minimum energy routing approach. These improvements are achieved at the expense of only a slight increase in the average energy per bit transmission for an end-to-end path.

Original languageEnglish
Title of host publicationMILCOM 2005
Subtitle of host publicationMilitary Communications Conference 2005
Pages1059-1063
Number of pages5
DOIs
StatePublished - 2005
EventMILCOM 2005: Military Communications Conference 2005 - Atlatnic City, NJ, United States
Duration: 17 Oct 200520 Oct 2005

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM
Volume2005

Conference

ConferenceMILCOM 2005: Military Communications Conference 2005
Country/TerritoryUnited States
CityAtlatnic City, NJ
Period17/10/0520/10/05

Keywords

  • CDMA
  • Routing metric
  • Routing protocols

Fingerprint

Dive into the research topics of 'Interference aware routing for CDMA wireless ad hoc networks'. Together they form a unique fingerprint.

Cite this