[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Radosavac et al., 2005 - Google Patents

A framework for MAC protocol misbehavior detection in wireless networks

Radosavac et al., 2005

View PDF
Document ID
16942463279114777237
Author
Radosavac S
Baras J
Koutsopoulos I
Publication year
Publication venue
Proceedings of the 4th ACM workshop on Wireless security

External Links

Snippet

The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main reasons for the growing interest in the issue of compliance to protocol rules. Reliable and …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
    • H04W74/0841Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure with collision treatment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC [Transmission power control]
    • H04W52/18TPC being performed according to specific parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION

Similar Documents

Publication Publication Date Title
Radosavac et al. A framework for MAC protocol misbehavior detection in wireless networks
Jokar et al. Specification-based intrusion detection for home area networks in smart grids
Radosavac et al. Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
Toledo et al. Robust detection of selfish misbehavior in wireless networks
US7783300B2 (en) Systems and methods for proactively enforcing a wireless free zone
Raya et al. DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots
Srinivasan et al. The β-factor: measuring wireless link burstiness
Hamieh et al. Detection of jamming attacks in wireless ad hoc networks using error distribution
Law et al. Link-layer jamming attacks on S-MAC
JP7455220B2 (en) Wireless intrusion prevention system, wireless network system including the same, and method of operating the wireless network system
US8630308B2 (en) Methods and apparatuses for detecting deviations from legitimate operation on a wireless network
US20060165073A1 (en) Method and a system for regulating, disrupting and preventing access to the wireless medium
Min et al. Attack-tolerant distributed sensing for dynamic spectrum access networks
Hernandez-Serrano et al. Modeling the lion attack in cognitive radio networks
Li et al. Mac-layer selfish misbehavior in ieee 802.11 ad hoc networks: Detection and defense
Radosavac et al. An analytic framework for modeling and detecting access layer misbehavior in wireless networks
Fragkiadakis et al. Anomaly‐based intrusion detection of jamming attacks, local versus collaborative detection
Amin et al. A comprehensive taxonomy and analysis of IEEE 802.15. 4 attacks
Halloush Transmission early-stopping scheme for anti-jamming over delay-sensitive IoT applications
Gvozdenovic et al. Truncate after preamble: PHY-based starvation attacks on IoT networks
Guang et al. DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks
Hamieh et al. Detecting greedy behaviors by linear regression in wireless ad hoc networks
Choi et al. A lightweight passive online detection method for pinpointing misbehavior in WLANs
Sugantha et al. A statistical approach to detect NAV attack at MAC layer
Afaqui et al. Detecting MAC misbehavior of IEEE 802.11 devices within ultra dense Wi-Fi networks