Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Christos Koufogiannakis is active.

Publication


Featured researches published by Christos Koufogiannakis.


modeling and optimization in mobile, ad-hoc and wireless networks | 2009

Gaming the jammer: Is frequency hopping effective?

Konstantinos Pelechrinis; Christos Koufogiannakis; Srikanth V. Krishnamurthy

Frequency hopping has been the most popularly considered approach for alleviating the effects of jamming attacks. In this paper, we provide a novel, measurement-driven, game theoretic framework that captures the interactions between a communication link and an adversarial jammer, possibly with multiple jamming devices, in a wireless network employing frequency hopping (FH). The framework can be used to quantify the efficacy of FH as a jamming countermeasure. Our model accounts for two important factors that affect the aforementioned interactions: (a) the number of orthogonal channels available for use and (b) the frequency separation between these orthogonal bands. If the latter is small, then the energy spill over between two adjacent channels (considered orthogonal) is high; as a result a jammer on an orthogonal band that is adjacent to that used by a legitimate communication, can be extremely effective. We account for both these factors and using our framework we provide bounds on the performance of proactive frequency hopping in alleviating the impact of a jammer. The main contributions of our work are: (a) Construction of a measurement driven game theoretic framework which models the interactions between a jammer and a communication link that employ FH. (b) Extensive experimentation on our indoor testbed in order to quantify the impact of a jammer in a 802.11a/g network. (c) Application of our framework to quantify the efficacy of proactive FH across a variety of 802.11 network configurations. (d) Formal derivation of the optimal strategies for both the link and the jammer in 802.11 networks. Our results demonstrate that frequency hopping is largely inadequate in coping with jamming attacks in current 802.11 networks. In particular, we show that if current systems were to support hundreds of additional channels, FH would form a robust jamming countermeasure1.


Algorithmica | 2014

A Nearly Linear-Time PTAS for Explicit Fractional Packing and Covering Linear Programs

Christos Koufogiannakis; Neal E. Young

We give an approximation algorithm for fractional packing and covering linear programs (linear programs with non-negative coefficients). Given a constraint matrix with n non-zeros, r rows, and c columns, the algorithm (with high probability) computes feasible primal and dual solutions whose costs are within a factor of 1+ε of opt (the optimal cost) in time O((r+c)log(n)/ε2+n).


IEEE Transactions on Wireless Communications | 2010

On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks

Konstantinos Pelechrinis; Christos Koufogiannakis; Srikanth V. Krishnamurthy

Frequency hopping (FH) has been the most popularly considered approach for alleviating the effects of jamming attacks. We re-examine, the efficacy of FH based on both experimentation and analysis. Briefly, the limitations of FH are: (a) the energy spill over between adjacent channels that are considered to be orthogonal, and (b) the small number of available orthogonal bands. In a nutshell, the main contributions of our work are: (a) Construction of a measurement-driven game theoretic framework which models the interactions between a jammer and a communication link employing FH. Our model accounts for the above limiting factors and provides bounds on the performance of proactive FH in coping with jamming. (b) Extensive experimentation to quantify the impact of a jammer on 802.11a/g/n networks. Interestingly, we find that 802.11n devices can be more vulnerable to jamming as compared with legacy devices. We carefully analyze the reasons behind this observation. (c) Application of our framework to quantify the efficacy of proactive FH and validation of our analytical bounds across various 802.11 network configurations. (d) Formal derivation of the optimal strategies for both the link and the jammer in 802.11 networks. Our results demonstrate that FH seems to be inadequate in coping with jamming attacks in current 802.11 networks.


international symposium on distributed computing | 2009

Distributed fractional packing and maximum weighted b-matching via tail-recursive duality

Christos Koufogiannakis; Neal E. Young

We present efficient distributed δ-approximation algorithms for FRACTIONAL PACKING AND MAXIMUM WEIGHTED b-MATCHING in hypergraphs, where δ is the maximum number of packing constraints in which a variable appears (for MAXIMUM WEIGHTED b-MATCHING δ is the maximum edge degree -- for graphs δ = 2). (a) For δ = 2 the algorithm runs in O(logm) rounds in expectation and with high probability. (b) For general δ, the algorithm runs in O(log2 m) rounds in expectation and with high probability.


principles of distributed computing | 2009

Distributed and parallel algorithms for weighted vertex cover and other covering problems

Christos Koufogiannakis; Neal E. Young

The paper presents distributed and parallel δ-approximation algorithms for covering problems, where δ is the maximum number of variables on which any constraint depends (for example, δ = 2 for VERTEX COVER). Specific results include the following. ≺ For WEIGHTED VERTEX COVER, the first distributed 2-approximation algorithm taking O(log n) rounds and the first parallel 2-approximation algorithm in RNC. The algorithms generalize to covering mixed integer linear programs (CMIP) with two variables per constraint (δ = 2). ≺ For any covering problem with monotone constraints and submodular cost, a distributed δ-approximation algorithm taking O(log2 |C|) rounds, where |C| is the number of constraints. (Special cases include CMIP, facility location, and probabilistic (two-stage) variants of these problems.)


international colloquium on automata languages and programming | 2009

Greedy

Christos Koufogiannakis; Neal E. Young

This paper describes a greedy


foundations of computer science | 2007

{\ensuremath{\Delta}}

Christos Koufogiannakis; Neal E. Young

{\ensuremath{\Delta}}


Algorithmica | 2013

-Approximation Algorithm for Covering with Arbitrary Constraints and Submodular Cost

Christos Koufogiannakis; Neal E. Young

-approximation algorithm for monotone covering , a generalization of many fundamental NP-hard covering problems. The approximation ratio


Distributed Computing | 2011

Beating Simplex for Fractional Packing and Covering Linear Programs

Christos Koufogiannakis; Neal E. Young

{\ensuremath{\Delta}}


Archive | 2008

Greedy Δ-Approximation Algorithm for Covering with Arbitrary Constraints and Submodular Cost

Christos Koufogiannakis; Neal E. Young

is the maximum number of variables on which any constraint depends. (For example, for vertex cover,

Collaboration


Dive into the Christos Koufogiannakis's collaboration.

Top Co-Authors

Avatar

Neal E. Young

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge