A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is
Lecture Notes in Computer Science
A realistic approach is used to determine the impact of contention window manipulation and RTS/CTS cheating. It is explained why IEEE 802.11e ad-hoc networks are more prone to misbehaviour. ... The limitations of the IEEE 802.11e standard in providing QoS in the presence of misbehaving nodes is also presented. ... This work has been carried out under the Polish Ministry of Science and Higher Education grant no. N51739133. ...doi:10.1007/978-3-540-85209-4_14 fatcat:4742aleom5cgph2mvvdlmr5b7i
The widespread deployment of wireless networks and hot spots that employ the IEEE 802.11 technology has forced network designers to put emphasis on the importance of ensuring efficient and fair use of ... In this work we propose a novel framework for detection of intelligent adaptive adversaries in the IEEE 802.11 MAC by addressing the problem of detection of the worst-case scenario attacks. ... Problem Motivation and Sequential Detection We focus on monitoring the behavior of node A for the single-hop communication with node B in Figure 2 . ...doi:10.1145/1380564.1380567 fatcat:7fxiu4e3l5cxrgmjbnsijlbeny