Abstract—The CSMA/CA protocol is the most commonly used medium access mechanism in wireless networks. This protocol schedules properly the access to the medium among all the competing nodes. However, in a hostile environment, such as Mobile Ad Hoc Networks (MANETs), selfish or greedy nodes may prefer to decline the proper use of MAC protocol rules in order to increase their throughput at the expense of their honest neighbors. In this work, we propose a new backoff scheme that allows the neighbors of any node to detect its attempt to deliberately disobey the MAC protocol rules, by either fabricating a small backoff value or refusing to increase its contention window after an unsuccessful transmission. Our scheme uses one way function to gene...
Wireless access protocols currently deployed in MANET use distributed contention resolution mechanis...
This paper presents the design and implementation of spyware communication circuits built into the w...
CSMA/CA protocols rely on the random deferment of packet transmissions. Like most other protocols, C...
In this paper, we deal with backoff cheating technique in IEEE802.11 based MANETs and propose a nove...
It is known that 802.11 is not resilient to selfish behavior and denial of service (DoS) attacks tar...
In this paper, we deal with backoff cheating technique in IEEE802.11 based MANETs and propose a nove...
Selfish behavior at the MAC layer can have devastating side effects on the performance of wireless n...
AbstractMedium Access Control (MAC) protocol provides a fair access to the wireless channel through ...
AbstractThe IEEE 802.11 MAC protocol now prevailing in wireless LANs is vulnerable to selfish backof...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of th...
Abstract—CSMA/CA, the contention mechanism of the IEEE 802.11 DCF medium access protocol, has recent...
Abstract — Misbehaviour due to back-off distribution manipulation has been one of the significant pr...
Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolu...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
Wireless access protocols currently deployed in MANET use distributed contention resolution mechanis...
This paper presents the design and implementation of spyware communication circuits built into the w...
CSMA/CA protocols rely on the random deferment of packet transmissions. Like most other protocols, C...
In this paper, we deal with backoff cheating technique in IEEE802.11 based MANETs and propose a nove...
It is known that 802.11 is not resilient to selfish behavior and denial of service (DoS) attacks tar...
In this paper, we deal with backoff cheating technique in IEEE802.11 based MANETs and propose a nove...
Selfish behavior at the MAC layer can have devastating side effects on the performance of wireless n...
AbstractMedium Access Control (MAC) protocol provides a fair access to the wireless channel through ...
AbstractThe IEEE 802.11 MAC protocol now prevailing in wireless LANs is vulnerable to selfish backof...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of th...
Abstract—CSMA/CA, the contention mechanism of the IEEE 802.11 DCF medium access protocol, has recent...
Abstract — Misbehaviour due to back-off distribution manipulation has been one of the significant pr...
Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolu...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
Wireless access protocols currently deployed in MANET use distributed contention resolution mechanis...
This paper presents the design and implementation of spyware communication circuits built into the w...
CSMA/CA protocols rely on the random deferment of packet transmissions. Like most other protocols, C...