The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main reasons for the growing interest in the issue of compliance to protocol rules. Nevertheless, the random nature of protocol operation together with the inherent difficulty of monitoring in the open and highly volatile wireless medium poses significant challenges. In this thesis, the problem of detection of node misbehavior at the MAC layer and impact of such behavior on two different routing protocols in the Network Layer is considered. Starting from a model where the behavior of a node is observable, we cast the problem within a min-max robust detection framework, wit...
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow f...
A Mobile Ad Hoc Network (MANETs) is a collection of wireless hosts that can be rapidly deployed as a...
Abstract — Misbehaviour due to back-off distribution manipulation has been one of the significant pr...
The pervasiveness of wireless devices and the architectural organization of wireless networks in dis...
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topolo...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
The IEEE 802.11 networks are vulnerable to numerous wireless-specific attacks. Attackers can impleme...
The widespread deployment of wireless networks and hot spots that employ the IEEE 802.11 technology ...
Abstract — Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on th...
While wireless communication has dramatically changed the way people work and interact, the wireless...
Abstract — Network survivability is fundamental to information security. Adversaries could compromis...
It is well known that security threats, in wireless ad hoc networks, are becoming a serious problem ...
The dramatic increase in the number of connected devices and the significant growth of the network t...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow f...
A Mobile Ad Hoc Network (MANETs) is a collection of wireless hosts that can be rapidly deployed as a...
Abstract — Misbehaviour due to back-off distribution manipulation has been one of the significant pr...
The pervasiveness of wireless devices and the architectural organization of wireless networks in dis...
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topolo...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
The IEEE 802.11 networks are vulnerable to numerous wireless-specific attacks. Attackers can impleme...
The widespread deployment of wireless networks and hot spots that employ the IEEE 802.11 technology ...
Abstract — Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on th...
While wireless communication has dramatically changed the way people work and interact, the wireless...
Abstract — Network survivability is fundamental to information security. Adversaries could compromis...
It is well known that security threats, in wireless ad hoc networks, are becoming a serious problem ...
The dramatic increase in the number of connected devices and the significant growth of the network t...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow f...
A Mobile Ad Hoc Network (MANETs) is a collection of wireless hosts that can be rapidly deployed as a...
Abstract — Misbehaviour due to back-off distribution manipulation has been one of the significant pr...