Contention-based MAC protocols for wireless ad hoc LANs rely on random deferment of packet transmissions to avoid collisions. By selfishly modifying the probabilities of deferments greedy stations can grab more bandwidth than regular stations that apply standard-prescribed probabilities. To discourage such misbehaviour we propose a protocol calledRT-hash whereby the winner of a contention is determined using a public hash function of the channel feedback. RT-hash is effective in a full hearability topology, assuming that improper timing of control frames is detectable and that greedy stations do not resort to malicious actions. Simulation experiments show that RT-hash protects regular stations' bandwidth share against various sophisticated ...
Paper presented at the IMA Conference on Game Theory and its Applications, Oxford, 8/12/2014Peer rev...
With the increasing availability of flexible wireless 802.11 devices, the potential exists for users...
The pervasiveness of wireless devices and the architectural organization of wireless networks in dis...
Contention-based MAC protocols for wireless ad hoc LANs rely on random deferment of packet transmiss...
It is known that 802.11 is not resilient to selfish behavior and denial of service (DoS) attacks tar...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
peer-reviewedIn this paper, we deal with backoff cheating technique in IEEE802.11 based MANETs and ...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolu...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Selfish behavior at the MAC layer can have devastating side effects on the performance of wireless n...
In wireless networks, users share a transmission medium. For efficient channel use, wireless systems...
Most existing wireless MAC protocols are based on the assumption that all hosts cooperate with each ...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Abstract-Current wireless MAC protocols are designed to provide an equal share of throughput to all ...
Paper presented at the IMA Conference on Game Theory and its Applications, Oxford, 8/12/2014Peer rev...
With the increasing availability of flexible wireless 802.11 devices, the potential exists for users...
The pervasiveness of wireless devices and the architectural organization of wireless networks in dis...
Contention-based MAC protocols for wireless ad hoc LANs rely on random deferment of packet transmiss...
It is known that 802.11 is not resilient to selfish behavior and denial of service (DoS) attacks tar...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
peer-reviewedIn this paper, we deal with backoff cheating technique in IEEE802.11 based MANETs and ...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolu...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Selfish behavior at the MAC layer can have devastating side effects on the performance of wireless n...
In wireless networks, users share a transmission medium. For efficient channel use, wireless systems...
Most existing wireless MAC protocols are based on the assumption that all hosts cooperate with each ...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Abstract-Current wireless MAC protocols are designed to provide an equal share of throughput to all ...
Paper presented at the IMA Conference on Game Theory and its Applications, Oxford, 8/12/2014Peer rev...
With the increasing availability of flexible wireless 802.11 devices, the potential exists for users...
The pervasiveness of wireless devices and the architectural organization of wireless networks in dis...