Elements of signal detection and estimation
Elements of signal detection and estimation
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Detection and prevention of MAC layer misbehavior in ad hoc networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Multihypothesis sequential probability ratio tests .I. Asymptotic optimality
IEEE Transactions on Information Theory
Impact of optimal MAC layer attacks on the network layer
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
An effective defense against email spam laundering
Proceedings of the 13th ACM conference on Computer and communications security
Incentive compatible medium access control in wireless networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks
ACM Transactions on Information and System Security (TISSEC)
Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks
ADHOC-NOW '08 Proceedings of the 7th international conference on Ad-hoc, Mobile and Wireless Networks
Thwarting E-mail Spam Laundering
ACM Transactions on Information and System Security (TISSEC)
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools
Evaluation of detection algorithms for MAC layer misbehavior: theory and experiments
IEEE/ACM Transactions on Networking (TON)
Security vulnerabilities in IEEE 802.22
Proceedings of the 4th Annual International Conference on Wireless Internet
Selfish MAC layer misbehavior detection model for the IEEE 802.11-based wireless mesh networks
APPT'07 Proceedings of the 7th international conference on Advanced parallel processing technologies
Journal of Parallel and Distributed Computing
A new mechanism to detect selfish behavior in IEEE 802.11 ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
MAC layer misbehavior effectiveness and collective aggressive reaction approach
Sarnoff'10 Proceedings of the 33rd IEEE conference on Sarnoff
A novel approach to identify insider-based jamming attacks in multi-channel wireless networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
OREN: Optimal revocations in ephemeral networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Outlier detection using naïve bayes in wireless ad hoc networks
Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Dishonest reporting in queue-based cross-layer network optimization
Proceedings of the 2012 IEEE 20th International Workshop on Quality of Service
Hi-index | 0.00 |
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main reasons for the growing interest in the issue of compliance to protocol rules. Reliable and timely detection of deviation from legitimate protocol operation is recognized as a prerequisite for ensuring efficient and fair use of network resources and minimizing performance losses. Nevertheless, the random nature of protocol operation together with the inherent difficulty of monitoring in the open and highly volatile wireless medium poses significant challenges. In this paper, we consider the fundamental problem of detection of node misbehavior at the MAC layer. Starting from a model where the behavior of a node is observable, we cast the problem within a minimax robust detection framework, with the objective to provide a detection rule of optimum performance for the worst-case attack. The performance is measured in terms of required number of observations in order to derive a decision. This framework is meaningful for studying misbehavior because it captures the presence of uncertainty of attacks and concentrates on the attacks that are most significant in terms of incurred performance losses. It also refers to the case of an intelligent attacker that can adapt its policy to avoid being detected. Although the basic model does not include interference, we show that our ideas can be extended to the case where observations are hindered by interference due to concurrent transmissions. We also present some hints for the problem of notifying the rest of the network about a misbehavior event. Our work provides interesting insights and performance bounds and serves as a prelude to a future study that would capture more composite instances of the problem.