Policing 802.11 MAC Misbehaviours
暂无分享,去创建一个
David Malone | Douglas J. Leith | Paul Patras | Hessan Feghhi | D. Leith | D. Malone | P. Patras | Hessan Feghhi
[1] Szymon Szott,et al. Detecting backoff misbehaviour in IEEE 802.11 EDCA , 2011, Eur. Trans. Telecommun..
[2] Frank Kelly,et al. Charging and rate control for elastic traffic , 1997, Eur. Trans. Telecommun..
[3] A. Bacciotti,et al. Liapunov functions and stability in control theory , 2001 .
[4] Weihua Zhuang,et al. An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[5] Seungjoon Lee,et al. Maranello: Practical Partial Packet Recovery for 802.11 , 2010, NSDI.
[6] David Malone,et al. Mitigating collisions through power-hopping to improve 802.11 performance , 2014, Pervasive Mob. Comput..
[7] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[8] Ilenia Tinnirello,et al. Temporal fairness provisioning in multi-rate contention-based 802.11e WLANs , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[9] Nj Piscataway,et al. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .
[10] Giulio Iannello,et al. ACKS: a technique to reduce the impact of legacy stations in 802.11e EDCA WLANs , 2005, IEEE Communications Letters.
[11] Douglas J. Leith,et al. Proportional Fairness in 802.11 Wireless LANs , 2011, IEEE Communications Letters.
[12] Xiaodong Wang,et al. Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.
[13] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[14] Oliver W. W. Yang,et al. Throughput Modeling and Analysis of IEEE 802.11 DCF with Selfish Node , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[15] PengYong,et al. IEEE 802.11 distributed coordination function , 2003 .
[16] John C. Bicket,et al. Bit-rate selection in wireless networks , 2005 .
[17] Elisabeth Buffard,et al. VLC Media Player , 2012 .
[18] David Malone,et al. H-RCA: 802.11 Collision-Aware Rate Control , 2013, IEEE/ACM Transactions on Networking.
[19] D. Malone,et al. Modeling the 802.11 Distributed Coordination Function in Nonsaturated Heterogeneous Conditions , 2007, IEEE/ACM Transactions on Networking.
[20] David Malone,et al. Incentivising Fairness and Policing Nodes in WiFi , 2011, IEEE Communications Letters.
[21] Nitin H. Vaidya,et al. Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.
[22] Voon Chin Phua,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .
[23] Maxim Raya,et al. DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.
[24] Christoph Neumann,et al. An Empirical Study of Passive 802.11 Device Fingerprinting , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[25] Stephen A. McGuire,et al. Introductory Statistics , 2007, Technometrics.
[26] Luca Vollero,et al. Providing Service Guarantees in 802.11e EDCA WLANs with Legacy Stations , 2010, IEEE Transactions on Mobile Computing.
[27] Ilenia Tinnirello,et al. MAClets: active MAC protocols over hard-coded devices , 2012, CoNEXT '12.
[28] Thomas H. Wonnacott,et al. Introductory Statistics , 2007, Technometrics.
[29] John V. Guttag,et al. Time-based Fairness Improves Performance in Multi-Rate WLANs , 2004, USENIX Annual Technical Conference, General Track.
[30] David Malone,et al. Exploiting the capture effect to improve WLAN throughput , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[31] William A. Arbaugh,et al. Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .
[32] Weihua Zhuang,et al. Real-Time Misbehavior Detection in IEEE 802.11-Based Wireless Networks: An Analytical Approach , 2014, IEEE Transactions on Mobile Computing.
[33] David J. Thuente,et al. Jamming Vulnerabilities of IEEE 802.11e , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[34] John S. Baras,et al. Evaluation of Detection Algorithms for MAC Layer Misbehavior: Theory and Experiments , 2009, IEEE/ACM Transactions on Networking.
[35] Giulio Iannello,et al. Frame dropping: A QoS mechanism for multimedia communications in WiFi hot spots , 2004 .
[36] Albert Banchs,et al. Detecting selfish configurations in 802.11 WLANs , 2010, IEEE Communications Letters.
[37] Ilenia Tinnirello,et al. Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[38] Martin Heusse,et al. Performance anomaly of 802.11b , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[39] Jie Xiong,et al. SecureArray: improving wifi security with fine-grained physical-layer information , 2013, MobiCom.
[40] Haitao Wu,et al. Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[41] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[42] John S. Baras,et al. Detection and prevention of MAC layer misbehavior in ad hoc networks , 2004, SASN '04.
[43] Paul Barford,et al. Generating representative Web workloads for network and server performance evaluation , 1998, SIGMETRICS '98/PERFORMANCE '98.
[44] Ilenia Tinnirello,et al. Wireless MAC processors: Programming MAC protocols on commodity Hardware , 2012, 2012 Proceedings IEEE INFOCOM.