Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Disabling Misbehavior with Traffic Constraints in WLANs

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Hwangnam-
dc.contributor.authorKim, Hwantae-
dc.contributor.authorPark, Wonkyun-
dc.contributor.authorBae, Mungyu-
dc.date.accessioned2021-09-05T02:46:42Z-
dc.date.available2021-09-05T02:46:42Z-
dc.date.created2021-06-15-
dc.date.issued2014-12-
dc.identifier.issn0010-4620-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/96717-
dc.description.abstractIn this paper, we deal with vulnerabilities in IEEE 802.11 DCF protocol itself and its interaction with transmission control protocol (TCP) protocol. Selfish configurations at medium access control or TCP layer give an increased bandwidth share for selfish stations, and malicious operations disturb overall network operations. We first analyzed the bandwidth allocation for each station under the assumption that all the stations behave well by obeying the protocol. We then expressed the bandwidth allocation with the traffic constraints in network calculus theory in order to guarantee the fair access for well-behaving stations in the presence of misbehaving stations. Based on the network calculus model, we constructed the framework of protecting well-behaving stations from malicious or selfish behaviors, called NetPro. We then built up the proposed NetPro framework in a simulation environment and an empirical test-bed, and we carried out a performance evaluation study. The results indicate that the proposed network calculus-based protection framework successfully secures well-behaving stations from selfish or malicious misbehaviors.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherOXFORD UNIV PRESS-
dc.subjectMAC LAYER MISBEHAVIOR-
dc.subjectBEHAVIOR-
dc.titleDisabling Misbehavior with Traffic Constraints in WLANs-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Hwangnam-
dc.identifier.doi10.1093/comjnl/bxt121-
dc.identifier.scopusid2-s2.0-84922586841-
dc.identifier.wosid000346332800004-
dc.identifier.bibliographicCitationCOMPUTER JOURNAL, v.57, no.12, pp.1817 - 1833-
dc.relation.isPartOfCOMPUTER JOURNAL-
dc.citation.titleCOMPUTER JOURNAL-
dc.citation.volume57-
dc.citation.number12-
dc.citation.startPage1817-
dc.citation.endPage1833-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusMAC LAYER MISBEHAVIOR-
dc.subject.keywordPlusBEHAVIOR-
dc.subject.keywordAuthormisbehavior-
dc.subject.keywordAuthornetwork calculus-
dc.subject.keywordAuthorIEEE 802.11-
dc.subject.keywordAuthorhot spots-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > School of Electrical Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Hwang nam photo

Kim, Hwang nam
공과대학 (전기전자공학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE