Principles and practice of information theory
Principles and practice of information theory
Elements of information theory
Elements of information theory
The base-rate fallacy and its implications for the difficulty of intrusion detection
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Specification-based anomaly detection: a new approach for detecting network intrusions
Proceedings of the 9th ACM conference on Computer and communications security
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Detection and prevention of MAC layer misbehavior in ad hoc networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Slotted Aloha as a game with partial information
Computer Networks: The International Journal of Computer and Telecommunications Networking
A framework for MAC protocol misbehavior detection in wireless networks
Proceedings of the 4th ACM workshop on Wireless security
Selfish MAC Layer Misbehavior in Wireless Networks
IEEE Transactions on Mobile Computing
A Framework for the Evaluation of Intrusion Detection Systems
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots
IEEE Transactions on Mobile Computing
Incentive compatible medium access control in wireless networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
ICDCS '07 Proceedings of the 27th International Conference on Distributed Computing Systems
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks
ACM Transactions on Information and System Security (TISSEC)
Anomaly-Based intrusion detection algorithms for wireless networks
WWIC'10 Proceedings of the 8th international conference on Wired/Wireless Internet Communications
An adaptive tit-for-tat strategy for IEEE 802.11 CSMA/CA protocol
International Journal of Security and Networks
Hi-index | 0.00 |
We revisit the problem of detecting greedy behavior in the IEEE 802.11 MAC protocol by evaluating the performance of two previously proposed schemes: DOMINO and the Sequential Probability Ratio Test (SPRT). Our evaluation is carried out in four steps. We first derive a new analytical formulation of the SPRT that considers access to the wireless medium in discrete time slots. Then, we introduce an analytical model for DOMINO. As a third step, we evaluate the theoretical performance of SPRT and DOMINO with newly introduced metrics that take into account the repeated nature of the tests. This theoretical comparison provides two major insights into the problem: it confirms the optimality of SPRT, and motivates us to define yet another test: a nonparametric CUSUM statistic that shares the same intuition as DOMINO but gives better performance. We finalize the paper with experimental results, confirming the correctness of our theoretical analysis and validating the introduction of the new nonparametric CUSUM statistic.