Proceedings of the 4th ACM Workshop on Wireless Security 2005
DOI: 10.1145/1080793.1080801
|View full text |Cite
|
Sign up to set email alerts
|

A framework for MAC protocol misbehavior detection in wireless networks

Abstract: The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main reasons for the growing interest in the issue of compliance to protocol rules. Reliable and timely detection of deviation from legitimate protocol operation is recognized as a prerequisite for ensuring efficient and fair use of network resources and minimizing performance losses. Nevertheless, the random nature of protocol operation toge… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
117
0
1

Year Published

2008
2008
2016
2016

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 104 publications
(118 citation statements)
references
References 11 publications
0
117
0
1
Order By: Relevance
“…It does not modify the protocol installed at the Access Point. In [3], the authors provide a detection rule for optimum performance worst-case attack. Their aim is to provide a solution with the help of mini max robust detection framework.…”
Section: Literature Surveymentioning
confidence: 99%
“…It does not modify the protocol installed at the Access Point. In [3], the authors provide a detection rule for optimum performance worst-case attack. Their aim is to provide a solution with the help of mini max robust detection framework.…”
Section: Literature Surveymentioning
confidence: 99%
“…Problem formulation deals with training the machine in the network based on unsupervised machine learning to plot the different cluster among the email is zombie spam or not, here the sequential probability testing plays a vital role in classifying the test data in to zombie spam or not and then training the system to clearly identify the zombie spam [6]. Here we have a trained set of data and the emails which were successfully classified by spot using the sequential probability testing In this section we formulate the spam zombie detection problem in a network.…”
Section: Problem Formulation Figure 1: Spot System Design[1]mentioning
confidence: 99%
“…Several works in the field were written by Baras et al: [1], [2], and [11]. In [2], an algorithm (named ERA-802.11) for ensuring randomness in ad-hoc networks is proposed.…”
Section: The Ieee 80211 Standardmentioning
confidence: 99%
“…It is also necessary to determine when to stop the observation and make a decision. This problem is discussed in [11]. The authors take into account an adaptive attacker and prove that a particular decision rule, the sequential probability ratio test (SPRT), is the optimal approach to minimizing the number of needed observations.…”
Section: The Ieee 80211 Standardmentioning
confidence: 99%