메뉴 건너뛰기




Volumn 3, Issue 3, 2008, Pages 347-358

Robust detection of MAC layer denial-of-service attacks in CSMA/CA wireless networks

Author keywords

Carrier sensing multiple access with collision avoidance (CSMA CA); Denial of service (DoS) attack; IEEE 802.11; Kolmogorov smirnov (KS); Media access control (MAC); Sequential detection

Indexed keywords

ACCESS CONTROL; CARRIER SENSE MULTIPLE ACCESS; CELLULAR NEURAL NETWORKS; CELLULAR TELEPHONE SYSTEMS; COMPUTER CRIME; LAWS AND LEGISLATION; PORT TERMINALS; STANDARDS; TELECOMMUNICATION NETWORKS; WIRELESS LOCAL AREA NETWORKS (WLAN);

EID: 49549091088     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2008.926098     Document Type: Article
Times cited : (59)

References (29)
  • 1
    • 34547488337 scopus 로고    scopus 로고
    • Robust detection of selfish misbehavior in wireless networks
    • Aug
    • A. L. Toledo and X. Wang, "Robust detection of selfish misbehavior in wireless networks," IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp. 1124-1134, Aug. 2007.
    • (2007) IEEE J. Sel. Areas Commun , vol.25 , Issue.6 , pp. 1124-1134
    • Toledo, A.L.1    Wang, X.2
  • 2
    • 25644442524 scopus 로고    scopus 로고
    • On selfish behavior in CSMA/CA networks
    • presented at the, Miami, FL, Mar
    • M. Cagalj, S. Ganeriwal, I. Aad, and J.-P. Hubaux, "On selfish behavior in CSMA/CA networks," presented at the IEEE Infocom, Miami, FL, Mar. 2005.
    • (2005) IEEE Infocom
    • Cagalj, M.1    Ganeriwal, S.2    Aad, I.3    Hubaux, J.-P.4
  • 3
    • 0035508757 scopus 로고    scopus 로고
    • Game theory and the design of self-configuring, adaptive wireless networks
    • Nov
    • A. MacKenzie and S. Wicker, "Game theory and the design of self-configuring, adaptive wireless networks." IEEE Commun. Mag., vol. 39, no. 11, pp. 126-131, Nov. 2001.
    • (2001) IEEE Commun. Mag , vol.39 , Issue.11 , pp. 126-131
    • MacKenzie, A.1    Wicker, S.2
  • 4
    • 0042474409 scopus 로고    scopus 로고
    • Stability of multipacket slotted aloha with selfish users and perfect information
    • presented at the, San Francisco, CA, Apr
    • A. MacKenzie and S. Wicker, "Stability of multipacket slotted aloha with selfish users and perfect information," presented at the IEEE Infocom, San Francisco, CA, Apr. 2003.
    • (2003) IEEE Infocom
    • MacKenzie, A.1    Wicker, S.2
  • 5
    • 85008044268 scopus 로고    scopus 로고
    • Selfish MAC layer misbehavior in wireless networks
    • Sep./Oct
    • P. Kyasanur and N. H. Vaidya, "Selfish MAC layer misbehavior in wireless networks." IEEE Trans. Mobile Comput., vol. 4, no. 5, pp. 502-516, Sep./Oct. 2005.
    • (2005) IEEE Trans. Mobile Comput , vol.4 , Issue.5 , pp. 502-516
    • Kyasanur, P.1    Vaidya, N.H.2
  • 6
    • 49549119421 scopus 로고    scopus 로고
    • M. Acharya, T. Sharma, D. Thuente, and D. Sizemore, Intelligentjamming in 802.11b wireless networks, presented at the OPNETWORK, Washington, DC, Aug. 2004.
    • M. Acharya, T. Sharma, D. Thuente, and D. Sizemore, " Intelligentjamming in 802.11b wireless networks," presented at the OPNETWORK, Washington, DC, Aug. 2004.
  • 7
    • 51949113065 scopus 로고    scopus 로고
    • Intelligent jamming in wireless networks with applcations to 802.11b and other networks
    • presented at the, Washington, DC. Oct
    • D. Thuente and M. Acharya, "Intelligent jamming in wireless networks with applcations to 802.11b and other networks," presented at the 2006 IEEE MILCOM, Washington, DC. Oct. 2006.
    • (2006) 2006 IEEE MILCOM
    • Thuente, D.1    Acharya, M.2
  • 8
    • 4544221258 scopus 로고    scopus 로고
    • Access points vulnerabilities to dos attacks in 802.11 networks
    • presented at the, Atlanta, GA, Mar
    • F. Ferreri, M. Bernaschi, and L. Valcamonici, "Access points vulnerabilities to dos attacks in 802.11 networks," presented at the IEEE Wireless Commun. Net. Conf., Atlanta, GA, Mar. 2004.
    • (2004) IEEE Wireless Commun. Net. Conf
    • Ferreri, F.1    Bernaschi, M.2    Valcamonici, L.3
  • 9
    • 33947131246 scopus 로고    scopus 로고
    • Dos attacks and defense mechanisms in wireless networks
    • presented at the, Guangzhou, China, Nov
    • L. A. Mohammed and B. Issac, "Dos attacks and defense mechanisms in wireless networks," presented at the Int. Conf. Mobile Tech. Appl. Syst., Guangzhou, China, Nov. 2005.
    • (2005) Int. Conf. Mobile Tech. Appl. Syst
    • Mohammed, L.A.1    Issac, B.2
  • 10
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • presented at the, Washington, DC, Aug
    • J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," presented at the USENIX Security Symp., Washington, DC, Aug. 2003.
    • (2003) USENIX Security Symp
    • Bellardo, J.1    Savage, S.2
  • 11
    • 33847392537 scopus 로고    scopus 로고
    • Effect of pulse jamming on ieee 802.11 wireless lan performance
    • presented at the, Atlantic City, NJ, Oct
    • M. Hall, A. Silvennoinen, and S. G. Haggman, "Effect of pulse jamming on ieee 802.11 wireless lan performance," presented at the IEEE MILCOM. Atlantic City, NJ, Oct. 2005.
    • (2005) IEEE MILCOM
    • Hall, M.1    Silvennoinen, A.2    Haggman, S.G.3
  • 12
    • 33745966425 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • presented at the, Urbana-Champaign, IL, May
    • W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," presented at the ACM MobiHoc, Urbana-Champaign, IL, May 2005.
    • (2005) ACM MobiHoc
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 13
    • 49549094344 scopus 로고    scopus 로고
    • Detecting MAC layer collision abnormalities in CSMA/CA wireless networks
    • presented at the, Beijing, China, May
    • A. L. Toledo and X. Wang, "Detecting MAC layer collision abnormalities in CSMA/CA wireless networks," presented at the IEEE Int. Conf. Commun., Beijing, China, May 2008.
    • (2008) IEEE Int. Conf. Commun
    • Toledo, A.L.1    Wang, X.2
  • 14
    • 24144449882 scopus 로고    scopus 로고
    • Dos analysis of reservation based mac protocols
    • presented at the, Seoul, Korea, May
    • R. Negi and A. Rajeswaran, "Dos analysis of reservation based mac protocols," presented at the IEEE Int. Conf. Commun., Seoul, Korea, May 2005.
    • (2005) IEEE Int. Conf. Commun
    • Negi, R.1    Rajeswaran, A.2
  • 15
    • 49549123657 scopus 로고    scopus 로고
    • Incentive compatible medium access control in wireless networks
    • presented at the, GameNets, Pisa, Italy, Oct
    • N. BenAmmar and J. S. Baras, "Incentive compatible medium access control in wireless networks," presented at the Workshop Game Theory Commun. and Net. (GameNets), Pisa, Italy, Oct. 2006.
    • (2006) Workshop Game Theory Commun. and Net
    • BenAmmar, N.1    Baras, J.S.2
  • 16
    • 49549087157 scopus 로고    scopus 로고
    • 2 attacks in 802.11b wireless networks, presented at the OPNETWORK, Washington, DC, Aug. 2005.
    • 2 attacks in 802.11b wireless networks," presented at the OPNETWORK, Washington, DC, Aug. 2005.
  • 18
    • 33746885902 scopus 로고    scopus 로고
    • Adaptive optimization of IEEE 802.11 DCF based on bayesian estimation of the number of competing terminals
    • Nov
    • A. L. Toledo, T. Vercauteren, and X. Wang, "Adaptive optimization of IEEE 802.11 DCF based on bayesian estimation of the number of competing terminals," IEEE Trans. Mobile Comput., vol. 5, no. 9, pp. 1283-1296, Nov. 2006.
    • (2006) IEEE Trans. Mobile Comput , vol.5 , Issue.9 , pp. 1283-1296
    • Toledo, A.L.1    Vercauteren, T.2    Wang, X.3
  • 19
    • 3943058268 scopus 로고    scopus 로고
    • A new collision resolution mechanism to enhance the performance of IEEE 802.11 DCF
    • Jul
    • C. Wang, B. Li, and L. Li, "A new collision resolution mechanism to enhance the performance of IEEE 802.11 DCF," IEEE Trans. Veh. Technol., vol. 53, no. 4, pp. 1235-1246, Jul. 2004.
    • (2004) IEEE Trans. Veh. Technol , vol.53 , Issue.4 , pp. 1235-1246
    • Wang, C.1    Li, B.2    Li, L.3
  • 21
    • 0041438376 scopus 로고    scopus 로고
    • G. Bianchi and I. Tinnirello, Kalman fitler estimation of the number of competing terminals in an IEEE 802.11 network, presented at the Infocom, San Francisco, CA, Mar. 2003.
    • G. Bianchi and I. Tinnirello, "Kalman fitler estimation of the number of competing terminals in an IEEE 802.11 network," presented at the Infocom, San Francisco, CA, Mar. 2003.
  • 22
    • 85008537091 scopus 로고    scopus 로고
    • Batch and sequential bayesian estimators of the number of active terminals in an IEEE 802.11 network
    • Feb
    • T. Vercauteren, A. L. Toledo, and X. Wang, "Batch and sequential bayesian estimators of the number of active terminals in an IEEE 802.11 network," IEEE Trans. Signal Process., vol. 55, no. 2, pp. 437-450, Feb. 2007.
    • (2007) IEEE Trans. Signal Process , vol.55 , Issue.2 , pp. 437-450
    • Vercauteren, T.1    Toledo, A.L.2    Wang, X.3
  • 23
    • 0033749075 scopus 로고    scopus 로고
    • Performance analysis of the IEEE 802.11 distributed coordination function
    • Mar
    • G. Bianchi, "Performance analysis of the IEEE 802.11 distributed coordination function." IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp. 535-547, Mar. 2000.
    • (2000) IEEE J. Sel. Areas Commun , vol.18 , Issue.3 , pp. 535-547
    • Bianchi, G.1
  • 24
    • 84941871856 scopus 로고
    • The Kolmogorov-Smirnov test for goodnes of fit
    • F. Massey, "The Kolmogorov-Smirnov test for goodnes of fit," J. Amer. Statist. Assoc., vol. 46, no. 253, pp. 68-78, 1951.
    • (1951) J. Amer. Statist. Assoc , vol.46 , Issue.253 , pp. 68-78
    • Massey, F.1
  • 25
    • 0037914860 scopus 로고
    • The δ-corrected Kolmogorov-Smirnov test for goodness of fit
    • H. Khamis. "The δ-corrected Kolmogorov-Smirnov test for goodness of fit," J. Statist. Planning Inference, vol. 24, pp. 317-335, 1990.
    • (1990) J. Statist. Planning Inference , vol.24 , pp. 317-335
    • Khamis, H.1
  • 26
    • 1542736959 scopus 로고    scopus 로고
    • The two-stage δ-corrected Kolmogorov-Smirnov test
    • H. Khamis, "The two-stage δ-corrected Kolmogorov-Smirnov test," J. Appl. Statist., vol. 27, no. 4, pp. 439-450, 2000.
    • (2000) J. Appl. Statist , vol.27 , Issue.4 , pp. 439-450
    • Khamis, H.1
  • 29
    • 33749037166 scopus 로고    scopus 로고
    • A framework for MAC protocol misbehavior detection in wireless networks
    • presented at the, Cologne, Germany, Sep
    • S. Radosavac, J. S. Baras, and I. Koutsopoulos, "A framework for MAC protocol misbehavior detection in wireless networks," presented at the ACM Workshop Wireless Security, Cologne, Germany, Sep. 2005.
    • (2005) ACM Workshop Wireless Security
    • Radosavac, S.1    Baras, J.S.2    Koutsopoulos, I.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.