An analysis of short-term fairness in wireless media access protocols (poster session)
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Analysis of a local-area wireless network
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Achieving MAC layer fairness in wireless packet networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Characterizing user behavior and network performance in a public wireless LAN
SIGMETRICS '02 Proceedings of the 2002 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Analysis of a campus-wide wireless network
Proceedings of the 8th annual international conference on Mobile computing and networking
Selfish behavior and stability of the internet:: a game-theoretic analysis of TCP
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations
NETWORKING '02 Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Analyzing the Short-Term Fairness of IEEE 802.11 in Wireless Multi-Hop Radio Networks
MASCOTS '02 Proceedings of the 10th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Toward self-organized mobile ad hoc networks: the terminodes project
IEEE Communications Magazine
Performance analysis of the IEEE 802.11 distributed coordination function
IEEE Journal on Selected Areas in Communications
A framework for wireless LAN monitoring and its applications
Proceedings of the 3rd ACM workshop on Wireless security
Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Broadcast reception rates and effects of priority access in 802.11-based vehicular ad-hoc networks
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Detection and prevention of MAC layer misbehavior in ad hoc networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Transmission Costs, Selfish Nodes, and Protocol Design
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
A framework for MAC protocol misbehavior detection in wireless networks
Proceedings of the 4th ACM workshop on Wireless security
Selfish MAC Layer Misbehavior in Wireless Networks
IEEE Transactions on Mobile Computing
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
On the resiliency of mobile ad hoc networks to MAC layer misbehavior
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Enhancing the security of corporate Wi-Fi networks using DAIR
Proceedings of the 4th international conference on Mobile systems, applications and services
A framework for incentive compatible topology control in non-cooperative wireless multi-hop networks
DIWANS '06 Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks
Modeling and analysis of predictable random backoff in selfish environments
Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems
Quality of service games in an IEEE 802.11 ad hoc wireless LAN
Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems
Incentive compatible medium access control in wireless networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
A game-theoretic study of CSMA/CA under a backoff attack
IEEE/ACM Transactions on Networking (TON)
DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks
Computer Communications
A station strategy to deter backoff attacks in IEEE 802.11 LANs
Journal of Discrete Algorithms
Backbone construction in selfish wireless networks
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Dependability in Wireless Networks: Can We Rely on WiFi?
IEEE Security and Privacy
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks
ACM Transactions on Information and System Security (TISSEC)
A proactive wireless self-protection system
Proceedings of the 5th international conference on Pervasive services
Defending wireless sensor networks from radio interference through channel adaptation
ACM Transactions on Sensor Networks (TOSN)
Transmission costs, selfish nodes, and protocol design
Wireless Networks
Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks
ADHOC-NOW '08 Proceedings of the 7th international conference on Ad-hoc, Mobile and Wireless Networks
Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools
Evaluation of detection algorithms for MAC layer misbehavior: theory and experiments
IEEE/ACM Transactions on Networking (TON)
Security vulnerabilities in IEEE 802.22
Proceedings of the 4th Annual International Conference on Wireless Internet
Analytical models for understanding misbehavior and MAC friendliness in CSMA networks
Performance Evaluation
Impact of Misbehaviour on QoS in Wireless Mesh Networks
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
Game Theory and Cognitive Radio Based Wireless Networks
KES-AMSTA '09 Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
RAP: protecting commodity wi-fi networks from rogue access points
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
Modeling misbehavior in cooperative diversity: a dynamic game approach
EURASIP Journal on Advances in Signal Processing - Special issue on game theory in signal processing and communications
Conjecture-based channel selection game for delay-sensitive users in multi-channel wireless networks
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Quality-based resource brokerage for autonomous networked multimedia applications
IEEE Transactions on Circuits and Systems for Video Technology
Robust Detection of Unauthorized Wireless Access Points
Mobile Networks and Applications
Selfish MAC layer misbehavior detection model for the IEEE 802.11-based wireless mesh networks
APPT'07 Proceedings of the 7th international conference on Advanced parallel processing technologies
Performance sensitivities of wireless mesh networks under path-based DoS attacks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
IEEE 802.11 user fingerprinting and its applications for intrusion detection
Computers & Mathematics with Applications
Detecting greedy behaviors by linear regression in wireless ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
An Experimental Study of the Performance Impact of Path-Based DoS Attacks in Wireless Mesh Networks
Mobile Networks and Applications
Detection and punishment of malicious wireless stations in IEEE 802.11e EDCA network
Sarnoff'10 Proceedings of the 33rd IEEE conference on Sarnoff
Dartmouth internet security testbed (DIST: building a campus-wide wireless testbed
CSET'09 Proceedings of the 2nd conference on Cyber security experimentation and test
Dartmouth internet security testbed (DIST: building a campus-wide wireless testbed
CSET'09 Proceedings of the 2nd conference on Cyber security experimentation and test
Sequential detection of misbehaving nodes in cooperative networks with HARQ
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
A cross-layer approach to detect jamming attacks in wireless ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Proceedings of the 8th ACM Symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Noncooperative channel contention in ad hoc wireless LANs with anonymous stations
IWDC'05 Proceedings of the 7th international conference on Distributed Computing
Playing CSMA/CA game to deter backoff attacks in ad hoc wireless LANs
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
SimpleMAC: a jamming-resilient MAC-layer protocol for wireless channel coordination
Proceedings of the 18th annual international conference on Mobile computing and networking
Defending against jamming attacks in wireless local area networks
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.01 |
The proliferation of hotspots based on IEEE 802.11 wireless LANs brings the promise of seamless Internet access from a large number of public locations. However, as the number of users soars, so does the risk of possible misbehavior; to protect themselves, wireless ISPs already make use of a number of security mechanisms, and require mobile stations to authenticate themselves at the Access Points (APs). However, IEEE 802.11 works properly only if the stations also respect the MAC protocol. We show in this paper that a greedy user can substantially increase his share of bandwidth, at the expense of the other users, by slightly modifying the driver of his network adapter. We explain how easily this can be performed, in particular with the new generation of adapters. We then present DOMINO (System for Detection Of greedy behavior in the MAC layer of IEEE 802.11 public NetwOrks), a piece of software to be installed in the Access Point. DOMINO can detect and identify greedy stations, without requiring any modification of the standard protocol at the AP and without revealing its own presence. We illustrate these concepts by simulation results and by the description of our prototype.