Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
A framework for MAC protocol misbehavior detection in wireless networks
Proceedings of the 4th ACM workshop on Wireless security
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
On the resiliency of mobile ad hoc networks to MAC layer misbehavior
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Incentive compatible medium access control in wireless networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks
Computer Communications
International Journal of Security and Networks
An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks
ACM Transactions on Information and System Security (TISSEC)
Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
ACM Transactions on Sensor Networks (TOSN)
Evaluation of detection algorithms for MAC layer misbehavior: theory and experiments
IEEE/ACM Transactions on Networking (TON)
Assuring QoS in wireless mesh networks with misbehaving users
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
Detecting selfish configurations in 802.11 WLANs
IEEE Communications Letters
An effective strategy for greedy behavior in wireless ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A fuzzy logic based scheme to detect adaptive cheaters in wireless lan
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Detecting greedy behaviors by linear regression in wireless ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Hi-index | 0.00 |
Selfish behavior at the MAC layer can have devastating side effects on the performance of wireless networks, similar to the effects of DoS attacks. In this paper we focus on the prevention and detection of the manipulation of the backoff mechanism by selfish nodes in 802.11. We first propose an algorithm to ensure honest backoffs when at least one, either the receiver or the sender is honest. Then we discuss detection algorithms to deal with the problem of colluding selfish nodes. Although we have focused on the MAC layer of 802.11, our approach is general and can serve as a guideline for the design of any probabilistic distributed MAC protocol.