Radosavac et al., 2005 - Google Patents
A framework for MAC protocol misbehavior detection in wireless networksRadosavac et al., 2005
View PDF- Document ID
- 16942463279114777237
- Author
- Radosavac S
- Baras J
- Koutsopoulos I
- Publication year
- Publication venue
- Proceedings of the 4th ACM workshop on Wireless security
External Links
Snippet
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main reasons for the growing interest in the issue of compliance to protocol rules. Reliable and …
- 238000001514 detection method 0 title abstract description 79
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W74/00—Wireless channel access, e.g. scheduled or random access
- H04W74/08—Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
- H04W74/0833—Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
- H04W74/0841—Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure with collision treatment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC [Transmission power control]
- H04W52/18—TPC being performed according to specific parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/14—Spectrum sharing arrangements between different networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Radosavac et al. | A framework for MAC protocol misbehavior detection in wireless networks | |
Jokar et al. | Specification-based intrusion detection for home area networks in smart grids | |
Radosavac et al. | Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers | |
Toledo et al. | Robust detection of selfish misbehavior in wireless networks | |
US7783300B2 (en) | Systems and methods for proactively enforcing a wireless free zone | |
Raya et al. | DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots | |
Srinivasan et al. | The β-factor: measuring wireless link burstiness | |
Hamieh et al. | Detection of jamming attacks in wireless ad hoc networks using error distribution | |
Law et al. | Link-layer jamming attacks on S-MAC | |
JP7455220B2 (en) | Wireless intrusion prevention system, wireless network system including the same, and method of operating the wireless network system | |
US8630308B2 (en) | Methods and apparatuses for detecting deviations from legitimate operation on a wireless network | |
US20060165073A1 (en) | Method and a system for regulating, disrupting and preventing access to the wireless medium | |
Min et al. | Attack-tolerant distributed sensing for dynamic spectrum access networks | |
Hernandez-Serrano et al. | Modeling the lion attack in cognitive radio networks | |
Li et al. | Mac-layer selfish misbehavior in ieee 802.11 ad hoc networks: Detection and defense | |
Radosavac et al. | An analytic framework for modeling and detecting access layer misbehavior in wireless networks | |
Fragkiadakis et al. | Anomaly‐based intrusion detection of jamming attacks, local versus collaborative detection | |
Amin et al. | A comprehensive taxonomy and analysis of IEEE 802.15. 4 attacks | |
Halloush | Transmission early-stopping scheme for anti-jamming over delay-sensitive IoT applications | |
Gvozdenovic et al. | Truncate after preamble: PHY-based starvation attacks on IoT networks | |
Guang et al. | DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks | |
Hamieh et al. | Detecting greedy behaviors by linear regression in wireless ad hoc networks | |
Choi et al. | A lightweight passive online detection method for pinpointing misbehavior in WLANs | |
Sugantha et al. | A statistical approach to detect NAV attack at MAC layer | |
Afaqui et al. | Detecting MAC misbehavior of IEEE 802.11 devices within ultra dense Wi-Fi networks |