A fuzzy logic based scheme to detect adaptive cheaters in wireless lan
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Detection of selfish nodes in networks using CoopMAC protocol with ARQ
IEEE Transactions on Wireless Communications
Sequential detection of misbehaving nodes in cooperative networks with HARQ
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Hi-index | 0.25 |
The widespread deployment of wireless networks and hot spots that employ the IEEE 802.11 technology has forced network designers to put emphasis on the importance of ensuring efficient and fair use of network resources. In order to be able to evaluate the performance of the adversary, we define a set of security guarantees and requirements for an intrusion detection system and precisely define an adversary model. We then apply the proposed model for defining performance bounds of the worst case adversary and the quickest detection IDS in the IEEE 802.11 MAC.