Szczegóły publikacji

Opis bibliograficzny

Credibility of threats to jam anonymous traffic remapping attacks in ad hoc WLANs / Jerzy Konorski, Szymon SZOTT // IEEE Communications Letters ; ISSN 1089-7798. — 2017 — vol. 21 no. 3, s. 624–627. — Bibliogr. s. 627, Abstr. — Publikacja dostępna online od: 2016-12-14

Autorzy (2)

Słowa kluczowe

QoSgame theoryIEEE 802.11ad hoc networksEDCAselfish behaviortraffic remapping

Dane bibliometryczne

ID BaDAP104557
Data dodania do BaDAP2017-05-19
Tekst źródłowyURL
DOI10.1109/LCOMM.2016.2639483
Rok publikacji2017
Typ publikacjiartykuł w czasopiśmie
Otwarty dostęptak
Czasopismo/seriaIEEE Communications Letters

Abstract

In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the arising noncooperative game in which the attackers decide whether to continue a TRA when threatened and honest stations decide whether to start jamming when the TRA is continued. Using a Maynard Smith setting, we prove that the threats are credible to a rational attacker, who will then refrain from playing the game and remain honest.

Publikacje, które mogą Cię zainteresować

artykuł
#83165Data dodania: 29.8.2014
Discouraging traffic remapping attacks in local ad hoc networks / Jerzy Konorski, Szymon SZOTT // IEEE Transactions on Wireless Communications ; ISSN 1536-1276. — 2014 — vol. 13 no. 7, s. 3752–3767. — Bibliogr. s. 3766, Abstr.
artykuł
#115612Data dodania: 13.9.2018
Selfish attacks in two-hop IEEE 802.11 relay networks: impact and countermeasures / Szymon SZOTT, Jerzy Konorski // IEEE Wireless Communications Letters ; ISSN 2162-2337. — 2018 — vol. 7 no. 4, s. 658–661. — Bibliogr. s. 661, Abstr.