With the proliferation of access points and terminals, wireless access misbehavior emerges as important means of protocol misuse, whereby network entities aim at obtaining higher channel share than the one in legitimate operation. We consider the instantiation of misbehavior in the back-off mechanism in IEEE 802.11. First, we study the competition between two malicious entities that affect each other. Each entity has some private target gain in terms of access probability and attempts to misuse the protocol to its benefit so as to prolong the time until detection. We derive conditions for existence of the unique Nash Equilibrium Point (NEP). This is influenced by attacker gains and topology parameters that capture the level of contention fr...
In a distributed wireless system, multiple network nodes behave cooperatively towards a common goal....
In a distributed wireless system, such as an ad hoc network, multiple nodes behave cooperatively tow...
We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of th...
Abstract—With the proliferation of access points and termi-nals, wireless access misbehavior emerges...
Abstract—CSMA/CA, the contention mechanism of the IEEE 802.11 DCF medium access protocol, has recent...
Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolu...
Abstract — Misbehaviour due to back-off distribution manipulation has been one of the significant pr...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
In Wi-Fi networks, mobile nodes compete for accessing the shared channel by means of a random access...
In Wi-Fi networks, mobile nodes compete for accessing the shared channel by means of a random access...
Resource-depletion attacks against IEEE 802,11 access points (APs) are commonly executed by flooding...
AbstractThe IEEE 802.11 MAC protocol now prevailing in wireless LANs is vulnerable to selfish backof...
The focus of this thesis lies in investigating possible abuse of the standardized medium access prot...
In a distributed wireless system, multiple network nodes behave cooperatively towards a common goal....
In a distributed wireless system, multiple network nodes behave cooperatively towards a common goal....
In a distributed wireless system, multiple network nodes behave cooperatively towards a common goal....
In a distributed wireless system, such as an ad hoc network, multiple nodes behave cooperatively tow...
We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of th...
Abstract—With the proliferation of access points and termi-nals, wireless access misbehavior emerges...
Abstract—CSMA/CA, the contention mechanism of the IEEE 802.11 DCF medium access protocol, has recent...
Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolu...
Abstract — Misbehaviour due to back-off distribution manipulation has been one of the significant pr...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
In Wi-Fi networks, mobile nodes compete for accessing the shared channel by means of a random access...
In Wi-Fi networks, mobile nodes compete for accessing the shared channel by means of a random access...
Resource-depletion attacks against IEEE 802,11 access points (APs) are commonly executed by flooding...
AbstractThe IEEE 802.11 MAC protocol now prevailing in wireless LANs is vulnerable to selfish backof...
The focus of this thesis lies in investigating possible abuse of the standardized medium access prot...
In a distributed wireless system, multiple network nodes behave cooperatively towards a common goal....
In a distributed wireless system, multiple network nodes behave cooperatively towards a common goal....
In a distributed wireless system, multiple network nodes behave cooperatively towards a common goal....
In a distributed wireless system, such as an ad hoc network, multiple nodes behave cooperatively tow...
We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of th...