2009
DOI: 10.1109/tnet.2008.926510
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Detection Algorithms for MAC Layer Misbehavior: Theory and Experiments

Abstract: Abstract-We revisit the problem of detecting greedy behavior in the IEEE 802.11 MAC protocol by evaluating the performance of two previously proposed schemes: DOMINO and the Sequential Probability Ratio Test (SPRT). Our evaluation is carried out in four steps. We first derive a new analytical formulation of the SPRT that considers access to the wireless medium in discrete time slots. Then, we introduce an analytical model for DOMINO. As a third step, we evaluate the theoretical performance of SPRT and DOMINO w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
35
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 50 publications
(35 citation statements)
references
References 19 publications
0
35
0
Order By: Relevance
“…3, jamming causes extended SINR drops. Based on this, we deploy a cumulative-sum (cusum) algorithm [14] able to detect abrupt changes of the SINR. In previous works [15,11,16,17] we show that maximum performance, in terms of false alarms/detection probability, is achieved when considering the maximum minus the minimum values of SINR within a short and long windows.…”
Section: Attack Detectionmentioning
confidence: 99%
“…3, jamming causes extended SINR drops. Based on this, we deploy a cumulative-sum (cusum) algorithm [14] able to detect abrupt changes of the SINR. In previous works [15,11,16,17] we show that maximum performance, in terms of false alarms/detection probability, is achieved when considering the maximum minus the minimum values of SINR within a short and long windows.…”
Section: Attack Detectionmentioning
confidence: 99%
“…Cardenas et al [5] consider the sequential probability ratio test. However, their work is about detecting MAClayer misbehaviours and not attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Cusum belongs to the category of the Cusum algorithms, detecting changes of a certain distribution (change-point detection), and it has been widely used in the literature for anomaly-based intrusion detection (e.g. [5,11,[26][27][28]). In general, there are two types of Cusum algorithms: (i) parametric and (ii) non-parametric.…”
Section: Jamming Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…WLAN Access Point or a Wireless Mesh Router) that monitors the behavior of its neighbors during equal-length time intervals and then uses several mechanisms (e.g. simple tests [5] logic based tests [8] or statistical methods [6]) to analyze the collected information and detect any misbehavior. In the second category, the backoff algorithm is changed in most solutions in order to make the backoff value predictable or give the receiver node a control over it.…”
mentioning
confidence: 99%