Principles and practice of information theory
Principles and practice of information theory
Elements of information theory
Elements of information theory
The base-rate fallacy and its implications for the difficulty of intrusion detection
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
A framework for MAC protocol misbehavior detection in wireless networks
Proceedings of the 4th ACM workshop on Wireless security
Selfish MAC Layer Misbehavior in Wireless Networks
IEEE Transactions on Mobile Computing
A Framework for the Evaluation of Intrusion Detection Systems
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks
ACM Transactions on Information and System Security (TISSEC)
Hi-index | 0.00 |
In this work we evaluate the impact of interference caused by concurrent transmissions of neighboring stations on the performance of quickest detection schemes for detection of back-off misbehavior in the IEEE 802.11 MAC. We evaluate the trade-offs that both the adversary and the detector face under such conditions using a game theoretic framework. Furthermore, we evaluate the worst-case scenarios under which the given detector can efficiently operate under the predetermined conditions and show by both mathematical analysis and simulation how the presence of uncertainty affects the performance of the detector. Finally, we conclude that in the presence of (i) adaptive intelligent adversaries and (ii) variable environment conditions, the adoption of a static detection system is not advisable and propose employment of an adaptive detection system in order to maintain satisfying performance under a wide range of conditions.