Security threats to the MAC-layer in wireless networks

[1]  Laurent Massoulié,et al.  Greening the internet with nano data centers , 2009, CoNEXT '09.

[2]  Wanjiun Liao,et al.  A practical QoS solution to voice over IP in IEEE 802.11 WLANs , 2009, IEEE Communications Magazine.

[3]  Martin Heusse,et al.  Performance anomaly of 802.11b , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[4]  Todor Cooklev,et al.  Air Interface for Fixed Broadband Wireless Access Systems , 2004 .

[5]  Craig Gentry,et al.  Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.

[6]  John C. Bicket,et al.  Bit-rate selection in wireless networks , 2005 .

[7]  Nitin H. Vaidya,et al.  On physical carrier sensing in wireless ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[8]  Jihyuk Choi,et al.  Secure MAC-Layer Protocol for Captive Portals in Wireless Hotspots , 2011, 2011 IEEE International Conference on Communications (ICC).

[9]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[10]  Massimo Bernaschi,et al.  Access points vulnerabilities to DoS attacks in 802.11 networks , 2008, Wirel. Networks.

[11]  Samir Ranjan Das,et al.  Detecting selfish carrier-sense behavior in WiFi networks by passive monitoring , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[12]  Hongqiang Zhai,et al.  Physical Carrier Sensing and Spatial Reuse in Multirate and Multihop Wireless Ad Hoc Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[13]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[14]  Helen J. Wang,et al.  Preserving location privacy in wireless lans , 2007, MobiSys '07.

[15]  Kjell Jørgen Hole,et al.  Securing Wi-Fi Networks , 2005, Computer.

[16]  Hyuk Lim,et al.  Optimal physical carrier sense in wireless networks , 2011, Ad Hoc Networks.

[17]  Bruce Potter Wireless hotspots , 2006, Commun. ACM.

[18]  John S. Baras,et al.  Performance Comparison of Detection Schemes for MAC Layer Misbehavior , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[19]  Jihyuk Choi,et al.  Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks , 2010, SecureComm.

[20]  Vasilios A. Siris,et al.  Optimal CWmin selection for achieving proportional fairness in multi-rate 802.11e WLANs: test-bed implementation and evaluation , 2006, WINTECH.

[21]  John Ioannidis,et al.  A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP) , 2004, TSEC.

[22]  Jerzy Konorski A game-theoretic study of CSMA/CA under a backoff attack , 2006, TNET.

[23]  Hui Luo,et al.  WiFi: what's next? , 2002, IEEE Commun. Mag..

[24]  Songqing Chen,et al.  SCAP: Smart Caching inWireless Access Points to Improve P2P Streaming , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[25]  Sandeep K. S. Gupta,et al.  Reliable multicast MAC protocol for wireless LANs , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[26]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[27]  Leo Monteban,et al.  WaveLAN®-II: A high-performance wireless LAN for the unlicensed band , 1997, Bell Labs Technical Journal.