Disabling Misbehavior with Traffic Constraints in WLANs
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Hwangnam | - |
dc.contributor.author | Kim, Hwantae | - |
dc.contributor.author | Park, Wonkyun | - |
dc.contributor.author | Bae, Mungyu | - |
dc.date.accessioned | 2021-09-05T02:46:42Z | - |
dc.date.available | 2021-09-05T02:46:42Z | - |
dc.date.created | 2021-06-15 | - |
dc.date.issued | 2014-12 | - |
dc.identifier.issn | 0010-4620 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/96717 | - |
dc.description.abstract | In this paper, we deal with vulnerabilities in IEEE 802.11 DCF protocol itself and its interaction with transmission control protocol (TCP) protocol. Selfish configurations at medium access control or TCP layer give an increased bandwidth share for selfish stations, and malicious operations disturb overall network operations. We first analyzed the bandwidth allocation for each station under the assumption that all the stations behave well by obeying the protocol. We then expressed the bandwidth allocation with the traffic constraints in network calculus theory in order to guarantee the fair access for well-behaving stations in the presence of misbehaving stations. Based on the network calculus model, we constructed the framework of protecting well-behaving stations from malicious or selfish behaviors, called NetPro. We then built up the proposed NetPro framework in a simulation environment and an empirical test-bed, and we carried out a performance evaluation study. The results indicate that the proposed network calculus-based protection framework successfully secures well-behaving stations from selfish or malicious misbehaviors. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | OXFORD UNIV PRESS | - |
dc.subject | MAC LAYER MISBEHAVIOR | - |
dc.subject | BEHAVIOR | - |
dc.title | Disabling Misbehavior with Traffic Constraints in WLANs | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Hwangnam | - |
dc.identifier.doi | 10.1093/comjnl/bxt121 | - |
dc.identifier.scopusid | 2-s2.0-84922586841 | - |
dc.identifier.wosid | 000346332800004 | - |
dc.identifier.bibliographicCitation | COMPUTER JOURNAL, v.57, no.12, pp.1817 - 1833 | - |
dc.relation.isPartOf | COMPUTER JOURNAL | - |
dc.citation.title | COMPUTER JOURNAL | - |
dc.citation.volume | 57 | - |
dc.citation.number | 12 | - |
dc.citation.startPage | 1817 | - |
dc.citation.endPage | 1833 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | MAC LAYER MISBEHAVIOR | - |
dc.subject.keywordPlus | BEHAVIOR | - |
dc.subject.keywordAuthor | misbehavior | - |
dc.subject.keywordAuthor | network calculus | - |
dc.subject.keywordAuthor | IEEE 802.11 | - |
dc.subject.keywordAuthor | hot spots | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.