Logo
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • English 
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • Login
View Item 
  •   University of Thessaly Institutional Repository
  • Επιστημονικές Δημοσιεύσεις Μελών ΠΘ (ΕΔΠΘ)
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ.
  • View Item
  •   University of Thessaly Institutional Repository
  • Επιστημονικές Δημοσιεύσεις Μελών ΠΘ (ΕΔΠΘ)
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ.
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.
Institutional repository
All of DSpace
  • Communities & Collections
  • By Issue Date
  • Authors
  • Titles
  • Subjects

Competition and cooperation in wireless access misbehavior

Thumbnail
Author
Koutsopoulos, I.
Date
2011
DOI
10.1109/WIOPT.2011.5930027
Keyword
competition and cooperation
game theory
Wireless access misbehavior
Access points
Back-off
IEEE 802.11s
Malicious entity
Nash equilibrium point
Neighboring nodes
Simple types
Topology parameters
Wireless access
Competition
Mobile ad hoc networks
Optimization
Standards
Wireless networks
Metadata display
Abstract
With the proliferation of access points and terminals, wireless access misbehavior emerges as important means of protocol misuse, whereby network entities aim at obtaining higher channel share than the one in legitimate operation. We consider the instantiation of misbehavior in the back-off mechanism in IEEE 802.11. First, we study the competition between two malicious entities that affect each other. Each entity has some private target gain in terms of access probability and attempts to misuse the protocol to its benefit so as to prolong the time until detection. We derive conditions for existence of the unique Nash Equilibrium Point (NEP). This is influenced by attacker gains and topology parameters that capture the level of contention from neighboring nodes. These quantities need to be small in order for the NEP to exist. Next, we consider simple types of cooperation between attackers that aim at alleviating the contention caused to each other. © 2011 IEEE.
URI
http://hdl.handle.net/11615/29964
Collections
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ. [19735]
htmlmap 

 

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister (MyDspace)
Help Contact
DepositionAboutHelpContact Us
Choose LanguageAll of DSpace
EnglishΕλληνικά
htmlmap