Practical Realisation and Validation of aWi-Fi Policing Algorithm
暂无分享,去创建一个
[1] Basem Shihada,et al. The efficacy of centralized flow rate control in 802.11-based wireless mesh networks , 2013, EURASIP Journal on Wireless Communications and Networking.
[2] Giulio Iannello,et al. Frame dropping: A QoS mechanism for multimedia communications in WiFi hot spots , 2004, Workshops on Mobile and Wireless Networking/High Performance Scientific, Engineering Computing/Network Design and Architecture/Optical Networks Control and Management/Ad Hoc and Sensor Networks/Compil.
[3] Yanghee Choi,et al. An experimental study on the capture effect in 802.11a networks , 2007, WinTECH '07.
[4] Philip Levis,et al. Achieving single channel, full duplex wireless communication , 2010, MobiCom.
[5] David Malone,et al. Incentivising Fairness and Policing Nodes in WiFi , 2011, IEEE Communications Letters.
[6] Jia Hao,et al. Access point centric scheduling for dash streaming in multirate 802.11 wireless network , 2014, 2014 IEEE International Conference on Multimedia and Expo (ICME).
[7] Nitin H. Vaidya,et al. Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.
[8] G. Bianchi,et al. On the anomalous behavior of IEEE 802 . 11 commercial cards , 2006 .
[9] Roland de Haan,et al. Why RTS-CTS is not your ideal wireless LAN multiple access protocol , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[10] Meikang Qiu,et al. Jamming ACK Attack to Wireless Networks and a Mitigation Approach , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[11] Oliver W. W. Yang,et al. Throughput Modeling and Analysis of IEEE 802.11 DCF with Selfish Node , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[12] Chadi Assi,et al. Modeling and analysis of predictable random backoff in selfish environments , 2006, MSWiM '06.
[13] Xin Liu,et al. Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.
[14] S. Giordano,et al. IEEE 802.11 b performance evaluation: convergence of theoretical, simulation and experimental results , 2004, 11th International Telecommunications Network Strategy and Planning Symposium. NETWORKS 2004,.
[15] Gustavo Gonzalez Granadillo,et al. Botnets: Lifecycle and Taxonomy , 2011, 2011 Conference on Network and Information Systems Security.
[16] R. R. Rejimol Robinson,et al. Evaluation of mitigation methods for distributed denial of service attacks , 2012, 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA).
[17] David J. Thuente,et al. Jamming Vulnerabilities of IEEE 802.11e , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[18] A. Benslimane,et al. Smart Attacks Based on Control Packets Vulnerabilities with IEEE 802.11 MAC , 2008, 2008 International Wireless Communications and Mobile Computing Conference.
[19] Chong-Ho Choi,et al. Providing absolute priority and airtime fairness in WLANs , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[20] R. Lua,et al. Mitigating DDoS attacks with transparent and intelligent fast-flux swarm network , 2011, IEEE Network.
[21] Frank Piessens,et al. Advanced Wi-Fi attacks using commodity hardware , 2014, ACSAC.
[22] David Malone,et al. Decentralised learning MACs for collision-free access in WLANs , 2010, Wirel. Networks.
[23] A. Kamerman,et al. Microwave oven interference on wireless LANs operating in the 2.4 GHz ISM band , 1997, Proceedings of 8th International Symposium on Personal, Indoor and Mobile Radio Communications - PIMRC '97.
[24] Weijie Liu,et al. A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks , 2013, Telecommun. Syst..
[25] Jihyuk Choi,et al. Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks , 2010, SecureComm.
[26] Kai Chen,et al. Theoretic Analysis of IEEE 802.11 Rate Adaptation Algorithm SampleRate , 2011, IEEE Communications Letters.
[27] Bin Li,et al. Saturation throughput analysis of multi-rate IEEE 802.11 wireless networks , 2009, Wirel. Commun. Mob. Comput..
[28] Cristina Cano,et al. Learning-BEB: Avoiding Collisions in WLAN , 2008 .
[29] Michael Bredel,et al. Understanding Fairness and its Impact on Quality of Service in IEEE 802.11 , 2008, IEEE INFOCOM 2009.
[30] Yan Grunenberger,et al. Experimenting With Commodity 802.11 Hardware: Overview and Future Directions , 2015, IEEE Communications Surveys & Tutorials.
[31] John S. Baras,et al. Evaluation of Detection Algorithms for MAC Layer Misbehavior: Theory and Experiments , 2009, IEEE/ACM Transactions on Networking.
[32] Soung Chang Liew,et al. Proportional fairness in wireless LANs and ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[33] David Malone,et al. H-RCA: 802.11 Collision-Aware Rate Control , 2013, IEEE/ACM Transactions on Networking.
[34] Raymond Knopp,et al. Information capacity and power control in single-cell multiuser communications , 1995, Proceedings IEEE International Conference on Communications ICC '95.
[35] George C. Polyzos,et al. TCP and UDP performance over a wireless LAN , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[36] Thierry Turletti,et al. IEEE 802.11 rate adaptation: a practical approach , 2004, MSWiM '04.
[37] Tuomas Sandholm,et al. Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming , 2014, WiSec '14.
[38] Bibhudatta Sahoo,et al. Mitigating DDoS attack and Saving Computational Time using a Probabilistic approach and HCF method , 2009, 2009 IEEE International Advance Computing Conference.
[39] Mario Gerla,et al. How effective is the IEEE 802.11 RTS/CTS handshake in ad hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[40] Eitan Altman,et al. New Insights From a Fixed-Point Analysis of Single Cell IEEE 802.11 WLANs , 2007, IEEE/ACM Transactions on Networking.
[41] Jean C. Walrand,et al. Design and Analysis of an Asynchronous Zero Collision MAC Protocol , 2008, ArXiv.
[42] Kang G. Shin,et al. Achieving efficient channel utilization and weighted fairness for data communications in IEEE 802.11 WLAN under the DCF , 2002, IEEE 2002 Tenth IEEE International Workshop on Quality of Service (Cat. No.02EX564).
[43] Martin Heusse,et al. Fairness and its impact on delay in 802.11 networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[44] Kang G. Shin,et al. An Experimental Approach to Spectrum Sensing in Cognitive Radio Networks with Off-the-Shelf IEEE 802.11 Devices , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[45] D. Malone,et al. Evaluation of the backoff procedure of Homeplug MAC vs. DCF , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[46] Maxim Raya,et al. DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.
[47] H. Zimmermann,et al. OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.
[48] Chris McDonald. Converged Networking: Data and Real-time Communications over IP (IFIP International Federation for Information Processing) , 2003 .
[49] Vaduvur Bharghavan,et al. Achieving MAC layer fairness in wireless packet networks , 2000, MobiCom '00.
[50] Jean-Yves Le Boudec,et al. Rate adaptation, Congestion Control and Fairness: A Tutorial , 2000 .
[51] Y. Murat Erten,et al. A layered security architecture for corporate 802.11 wireless networks , 2004, 2004 Symposium on Wireless Telecommunications.
[52] Leo Monteban,et al. WaveLAN®-II: A high-performance wireless LAN for the unlicensed band , 1997, Bell Labs Technical Journal.
[53] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[54] Periklis Chatzimisios,et al. Effectiveness of RTS/CTS handshake in IEEE 802.11a Wireless LANs , 2004 .
[55] Younghwan Yoo,et al. Airtime Fairness for IEEE 802.11 Multirate Networks , 2008, IEEE Transactions on Mobile Computing.
[56] Luca Vollero,et al. Providing Service Guarantees in 802.11e EDCA WLANs with Legacy Stations , 2010, IEEE Transactions on Mobile Computing.
[57] Marc Portoles-Comeras,et al. IEEE 802.11 downlink traffic shaping scheme for multi-user service enhancement , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..
[58] Moustafa Youssef,et al. A framework for wireless LAN monitoring and its applications , 2004, WiSe '04.
[59] Neeraj Jaggi,et al. MAC layer misbehavior effectiveness and collective aggressive reaction approach , 2010, 2010 IEEE Sarnoff Symposium.
[60] Kensuke Fukuda,et al. The impact and implications of the growth in residential user-to-user traffic , 2006, SIGCOMM 2006.
[61] Dong Zhou,et al. A scalable and adaptive clock synchronization protocol for IEEE 802.11-based multihop ad hoc networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[62] N. Yazdani,et al. Service differentiation and fairness in IEEE 802.11 DCF , 2005, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.
[63] Sang Kyu Lee,et al. Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[64] Douglas J. Leith,et al. Thwarting Selfish Behavior in 802.11 WLANs , 2013, IEEE/ACM Transactions on Networking.
[65] Seungjoon Lee,et al. Maranello: Practical Partial Packet Recovery for 802.11 , 2010, NSDI.
[66] Hari Balakrishnan,et al. An analysis of short-term fairness in wireless media access protocols (poster session) , 2000, SIGMETRICS '00.
[67] Khaled Hatem Almotairi. Inverse Binary Exponential Backoff: Enhancing Short-term Fairness for IEEE 802.11 Networks , 2013, ISWCS.
[68] Santosh Biswas,et al. Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization , 2014, International Journal of Machine Learning and Cybernetics.
[69] Frank Kelly,et al. Charging and rate control for elastic traffic , 1997, Eur. Trans. Telecommun..
[70] Kang G. Shin,et al. A Lightweight Passive Online Detection Method for Pinpointing Misbehavior in WLANs , 2011, IEEE Transactions on Mobile Computing.
[71] Weihua Zhuang,et al. An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[72] John S. Baras,et al. A framework for MAC protocol misbehavior detection in wireless networks , 2005, WiSe '05.
[73] David Malone,et al. Practical node policing in 802.11WLANs , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[74] Albert Banchs,et al. Detecting selfish configurations in 802.11 WLANs , 2010, IEEE Communications Letters.
[75] David Malone,et al. WiFo: A diagnostic tool for IEEE 802.11 MAC , 2015, 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[76] Qiu Qiang,et al. MAC protocol enhancements for QoS guarantee and fairness over the IEEE 802.11 wireless LANs , 2002, Proceedings. Eleventh International Conference on Computer Communications and Networks.
[77] Jerzy Konorski,et al. Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting , 2001, PROMS.
[78] Ilenia Tinnirello,et al. Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[79] Martin Heusse,et al. Performance anomaly of 802.11b , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[80] Ruby B. Lee,et al. Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures , 2004, PDCS.
[81] Soung Chang Liew,et al. Improving Throughput and Fairness by Reducing Exposed and Hidden Nodes in 802.11 Networks , 2008, IEEE Transactions on Mobile Computing.
[82] Soufiene Djahel,et al. Fast and Efficient Countermeasure for MAC Layer Misbehavior in MANETs , 2012, IEEE Wireless Communications Letters.
[83] John S. Baras,et al. Detection and prevention of MAC layer misbehavior in ad hoc networks , 2004, SASN '04.
[84] Tim Moors,et al. Fairness and capacity trade-off in IEEE 802.11 WLANs , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[85] William A. Arbaugh,et al. Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .
[86] C. Chellappan,et al. A mitigation model for TCP SYN flooding with IP spoofing , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[87] Marcel Dischinger,et al. The local and global effects of traffic shaping in the internet , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[88] Sridhar Iyer,et al. Mitigating the exposed node problem in IEEE 802.11 ad hoc networks , 2003, Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712).
[89] John V. Guttag,et al. Time-based Fairness Improves Performance in Multi-Rate WLANs , 2004, USENIX Annual Technical Conference, General Track.
[90] Trong-Minh Hoang,et al. An analytical model for estimating the impact of MAC layer misbehavior in IEEE 802.11 networks , 2014, 2014 IEEE Symposium on Wireless Technology and Applications (ISWTA).
[91] David Malone,et al. Exploiting the capture effect to improve WLAN throughput , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[92] Brahim Bensaou,et al. On max-min fairness and scheduling in wireless ad-hoc networks: analytical framework and implementation , 2001, MobiHoc.
[93] David Malone,et al. Mitigating collisions through power-hopping to improve 802.11 performance , 2014, Pervasive Mob. Comput..
[94] Michael G. Barry,et al. Supporting service differentiation in wireless packet networks using distributed control , 2001, IEEE J. Sel. Areas Commun..
[95] Srikanth V. Krishnamurthy,et al. Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks , 2012, IEEE Transactions on Mobile Computing.
[96] Jaume Barceló,et al. Prototyping Distributed Collision-Free MAC Protocols for WLANs in Real Hardware , 2013, MACOM.
[97] Xuemin Shen,et al. Maintaining Utility Fairness Using Weighting Factors in Wireless Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[98] JongWon Kim,et al. Active capture of wireless traces: overcome the lack in protocol analysis , 2008, WiNTECH '08.
[99] Xiaodong Wang,et al. Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.
[100] Yunbae Kim,et al. Design and Analysis of Medium Access Protocol: Throughput and Short-Term Fairness Perspective , 2015, IEEE/ACM Transactions on Networking.
[101] Raj Jain,et al. A Quantitative Measure Of Fairness And Discrimination For Resource Allocation In Shared Computer Systems , 1998, ArXiv.
[102] Andrzej Duda,et al. Understanding the Performance of 802.11 Networks , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.
[103] Ilenia Tinnirello,et al. On the fidelity of IEEE 802.11 commercial cards , 2005, First International Conference on Wireless Internet (WICON'05).
[104] Srikanth Kandula,et al. Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.
[105] Thierry Turletti,et al. Performance analysis under finite load and improvements for multirate 802.11 , 2005, Comput. Commun..
[106] Paul Barford,et al. Generating representative Web workloads for network and server performance evaluation , 1998, SIGMETRICS '98/PERFORMANCE '98.
[107] Ilenia Tinnirello,et al. Wireless MAC processors: Programming MAC protocols on commodity Hardware , 2012, 2012 Proceedings IEEE INFOCOM.
[108] Srikanth V. Krishnamurthy,et al. On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks , 2010, IEEE Transactions on Wireless Communications.
[109] Kate Ching-Ju Lin,et al. On Exploiting Spatial-Temporal Uncertainty in Max-Min Fairness in Underwater Sensor Networks , 2010, IEEE Communications Letters.
[110] Ilenia Tinnirello,et al. Temporal fairness provisioning in multi-rate contention-based 802.11e WLANs , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[111] A. W. Rix,et al. Quality VoIP — An Engineering Challenge , 2001 .
[112] Sachin Katti,et al. Full duplex radios , 2013, SIGCOMM.
[113] Christoph Neumann,et al. An Empirical Study of Passive 802.11 Device Fingerprinting , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[114] Szymon Szott,et al. Detecting backoff misbehaviour in IEEE 802.11 EDCA , 2011, Eur. Trans. Telecommun..
[115] C. Vlachou,et al. Fairness of MAC protocols: IEEE 1901 vs. 802.11 , 2013, 2013 IEEE 17th International Symposium on Power Line Communications and Its Applications.
[116] Suman Banerjee,et al. Airshark: detecting non-WiFi RF devices using commodity WiFi hardware , 2011, IMC '11.
[117] Hyunsoo Yoon,et al. Distributed Fair Scheduling for Wireless Mesh Networks Using IEEE 802.11 , 2010, IEEE Transactions on Vehicular Technology.
[118] Vincenzo Mancuso,et al. A Survey on Opportunistic Scheduling in Wireless Communications , 2013, IEEE Communications Surveys & Tutorials.
[119] Guillem Femenias,et al. A refined 3D Markov model for non-saturated IEEE 802.11 DCF netwoks , 2013, 2013 IFIP Wireless Days (WD).
[120] David Malone,et al. Policing 802.11 MAC Misbehaviours , 2013, IEEE Transactions on Mobile Computing.
[121] Sagar Naik,et al. A new fairness index for radio resource allocation in wireless networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[122] Thierry Turletti,et al. Saturation throughput analysis of error-prone 802.11 wireless networks: Research Articles , 2005 .
[123] Michalis Faloutsos,et al. Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[124] Ilenia Tinnirello,et al. An experimental testbed and methodology for characterizing IEEE 802.11 network cards , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[125] David Malone,et al. Modeling the 802.11 distributed coordination function in non-saturated conditions , 2005, IEEE Communications Letters.
[126] Jie Xiong,et al. SecureArray: improving wifi security with fine-grained physical-layer information , 2013, MobiCom.
[127] Haitao Wu,et al. Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[128] Leandros Tassiulas,et al. Achieving proportional fairness using local information in Aloha networks , 2004, IEEE Transactions on Automatic Control.
[129] Ilenia Tinnirello,et al. MAClets: active MAC protocols over hard-coded devices , 2012, CoNEXT '12.
[130] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[131] Carla-Fabiana Chiasserini,et al. Smart traffic scheduling in 802.11 WLANs with access point , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[132] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[133] Héctor L. Velayos Munoz,et al. Performance measurements of the saturation throughput in IEEE 802.11 access points , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).
[134] Giulio Iannello,et al. ACKS: a technique to reduce the impact of legacy stations in 802.11e EDCA WLANs , 2005, IEEE Communications Letters.
[135] Kameswari Chebrolu,et al. Design and evaluation of a new MAC protocol for long-distance 802.11 mesh networks , 2005, MobiCom '05.
[136] Anja Klein,et al. Practical OFDMA in wireless networks with multiple transmitter-receiver pairs , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[137] Douglas J. Leith,et al. Proportional Fairness in 802.11 Wireless LANs , 2011, IEEE Communications Letters.