An introduction to signal detection and estimation (2nd ed.)
An introduction to signal detection and estimation (2nd ed.)
MACAW: a media access protocol for wireless LAN's
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Algorithmic mechanism design (extended abstract)
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
SEEDEX: a MAC protocol for ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
TCP congestion control with a misbehaving receiver
ACM SIGCOMM Computer Communication Review
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting
PROMS 2001 Proceedings of the 6th International Conference on Protocols for Multimedia Systems
Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations
NETWORKING '02 Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Analysis of distributed intrusion detection systems using Bayesian methods
PCC '02 Proceedings of the Performance, Computing, and Communications Conference, 2002. on 21st IEEE International
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
Game theory and the design of self-configuring, adaptive wireless networks
IEEE Communications Magazine
A framework for wireless LAN monitoring and its applications
Proceedings of the 3rd ACM workshop on Wireless security
On the resiliency of mobile ad hoc networks to MAC layer misbehavior
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Modeling and analysis of predictable random backoff in selfish environments
Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems
DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots
IEEE Transactions on Mobile Computing
DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks
Computer Communications
Backbone construction in selfish wireless networks
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks
ADHOC-NOW '08 Proceedings of the 7th international conference on Ad-hoc, Mobile and Wireless Networks
Games to induce specified equilibria
Theoretical Computer Science
Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools
Evaluation of detection algorithms for MAC layer misbehavior: theory and experiments
IEEE/ACM Transactions on Networking (TON)
Security vulnerabilities in IEEE 802.22
Proceedings of the 4th Annual International Conference on Wireless Internet
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
Computer Standards & Interfaces
An analysis of generalized slotted-Aloha protocols
IEEE/ACM Transactions on Networking (TON)
RAP: protecting commodity wi-fi networks from rogue access points
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Detecting selfish configurations in 802.11 WLANs
IEEE Communications Letters
Selfish MAC layer misbehavior detection model for the IEEE 802.11-based wireless mesh networks
APPT'07 Proceedings of the 7th international conference on Advanced parallel processing technologies
An effective strategy for greedy behavior in wireless ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
IEEE 802.11 user fingerprinting and its applications for intrusion detection
Computers & Mathematics with Applications
Journal of Parallel and Distributed Computing
A fuzzy logic based scheme to detect adaptive cheaters in wireless lan
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A new mechanism to detect selfish behavior in IEEE 802.11 ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Detection and punishment of malicious wireless stations in IEEE 802.11e EDCA network
Sarnoff'10 Proceedings of the 33rd IEEE conference on Sarnoff
MAC layer misbehavior effectiveness and collective aggressive reaction approach
Sarnoff'10 Proceedings of the 33rd IEEE conference on Sarnoff
Mechanisms to induce random choice
WINE'06 Proceedings of the Second international conference on Internet and Network Economics
SimpleMAC: a jamming-resilient MAC-layer protocol for wireless channel coordination
Proceedings of the 18th annual international conference on Mobile computing and networking
Near-optimal deviation-proof medium access control designs in wireless networks
IEEE/ACM Transactions on Networking (TON)
The evolution game analysis of clustering for asymmetrical multi-factors in WSNs
Computers and Electrical Engineering
Distributed scheduling schemes for wireless mesh networks: A survey
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel. In this environment, selfish hosts that fail to adhere to the MAC protocol may obtain an unfair throughput share. For example, IEEE 802.11 requires hosts competing for access to the channel to wait for a "backoff驴 interval, randomly selected from a specified range, before initiating a transmission. Selfish hosts may wait for smaller backoff intervals than well-behaved hosts, thereby obtaining an unfair advantage. We present modifications to the IEEE 802.11 protocol to simplify detection of such selfish hosts and analyze the optimality of the chosen strategy. We also present a penalty scheme for punishing selfish misbehavior. We develop two misbehavior models to capture the behavior of misbehaving hosts. Simulation results under these misbehavior models indicate that our detection and penalty schemes are successful in handling MAC layer misbehavior.