An analysis of short-term fairness in wireless media access protocols (poster session)
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Analysis of a local-area wireless network
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Selfish behavior and stability of the internet:: a game-theoretic analysis of TCP
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Analyzing the Short-Term Fairness of IEEE 802.11 in Wireless Multi-Hop Radio Networks
MASCOTS '02 Proceedings of the 10th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Selfish MAC Layer Misbehavior in Wireless Networks
IEEE Transactions on Mobile Computing
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Evaluation of detection algorithms for MAC layer misbehavior: theory and experiments
IEEE/ACM Transactions on Networking (TON)
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
Computer Standards & Interfaces
Efficient MAC in cognitive radio systems: a game-theoretic approach
IEEE Transactions on Wireless Communications
Assuring QoS in wireless mesh networks with misbehaving users
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
Detecting selfish configurations in 802.11 WLANs
IEEE Communications Letters
An effective strategy for greedy behavior in wireless ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
IEEE 802.11 user fingerprinting and its applications for intrusion detection
Computers & Mathematics with Applications
A fuzzy logic based scheme to detect adaptive cheaters in wireless lan
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A new mechanism to detect selfish behavior in IEEE 802.11 ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Detecting greedy behaviors by linear regression in wireless ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
On order gain of backoff misbehaving nodes in CSMA/CA-based wireless networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
MAC layer misbehavior effectiveness and collective aggressive reaction approach
Sarnoff'10 Proceedings of the 33rd IEEE conference on Sarnoff
An IEEE 802.11 EDCA model with support for analysing networks with misbehaving nodes
EURASIP Journal on Wireless Communications and Networking
An adaptive tit-for-tat strategy for IEEE 802.11 CSMA/CA protocol
International Journal of Security and Networks
Hi-index | 0.00 |
IEEE 802.11 works properly only if the stations respect the MAC protocol. We show in this paper that a greedy user can substantially increase his share of bandwidth, at the expense of the other users, by slightly modifying the driver of his network adapter. We explain how easily this can be performed, in particular, with the new generation of adapters. We then present DOMINO (Detection Of greedy behavior in the MAC layer of IEEE 802.11 public NetwOrks), a piece of software to be installed in or near the Access Point. DOMINO can detect and identify greedy stations without requiring any modification of the standard protocol. We illustrate these concepts by simulation results and by the description of a prototype that we have recently implemented.