Contention-based MAC protocols for wireless ad hoc LANs rely on random deferment of packet transmissions to avoid collisions. By selfishly modifying the probabilities of deferments greedy stations can grab more bandwidth than regular stations that apply standard-prescribed probabilities. To discourage such misbehaviour we propose a protocol called RT-hash whereby the winner of a contention is determined using a public hash function of the channel feedback. RT-hash is effective in a full hearability topology, assuming that improper timing of control frames is detectable and that greedy stations do not resort to malicious actions. Simulation experiments show that RT-hash protects regular stations' bandwidth share against various sophisticated...
The MAC layer misbehavior of the IEEE 802.11 standard can have a negative impact on the wireless net...
Both hidden terminals, intrinsic in a multi-hop wireless network, and unfairness, due to location-de...
In wireless networks, users share a transmission medium. For efficient channel use, wireless systems...
Contention-based MAC protocols for wireless ad hoc LANs rely on random deferment of packet transmiss...
Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolu...
Most existing wireless MAC protocols are based on the assumption that all hosts cooperate with each ...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
It is known that 802.11 is not resilient to selfish behavior and denial of service (DoS) attacks tar...
Selfish behavior at the MAC layer can have devastating side effects on the performance of wireless n...
Abstract—We address the problem of MAC-layer misbehavior in distributed multi-channel MAC protocols....
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
Wireless access protocols currently deployed in MANET use distributed contention resolution mechanis...
Abstract—The CSMA/CA protocol is the most commonly used medium access mechanism in wireless networks...
In this paper, we deal with backoff cheating technique in IEEE802.11 based MANETs and propose a nove...
While the problem of greedy behavior at the MAC layer has been widely explored in the context of wir...
The MAC layer misbehavior of the IEEE 802.11 standard can have a negative impact on the wireless net...
Both hidden terminals, intrinsic in a multi-hop wireless network, and unfairness, due to location-de...
In wireless networks, users share a transmission medium. For efficient channel use, wireless systems...
Contention-based MAC protocols for wireless ad hoc LANs rely on random deferment of packet transmiss...
Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolu...
Most existing wireless MAC protocols are based on the assumption that all hosts cooperate with each ...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
It is known that 802.11 is not resilient to selfish behavior and denial of service (DoS) attacks tar...
Selfish behavior at the MAC layer can have devastating side effects on the performance of wireless n...
Abstract—We address the problem of MAC-layer misbehavior in distributed multi-channel MAC protocols....
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
Wireless access protocols currently deployed in MANET use distributed contention resolution mechanis...
Abstract—The CSMA/CA protocol is the most commonly used medium access mechanism in wireless networks...
In this paper, we deal with backoff cheating technique in IEEE802.11 based MANETs and propose a nove...
While the problem of greedy behavior at the MAC layer has been widely explored in the context of wir...
The MAC layer misbehavior of the IEEE 802.11 standard can have a negative impact on the wireless net...
Both hidden terminals, intrinsic in a multi-hop wireless network, and unfairness, due to location-de...
In wireless networks, users share a transmission medium. For efficient channel use, wireless systems...