dc.creator | Radosavac, S. | en |
dc.creator | Baras, J. S. | en |
dc.creator | Moustakides, G. V. | en |
dc.date.accessioned | 2015-11-23T10:46:18Z | |
dc.date.available | 2015-11-23T10:46:18Z | |
dc.date.issued | 2006 | |
dc.identifier | 10.1145/1180345.1180362 | |
dc.identifier.isbn | 9781595935540 | |
dc.identifier.isbn | 1595935541 | |
dc.identifier.uri | http://hdl.handle.net/11615/32573 | |
dc.description.abstract | Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existing links. In this work we consider node misbehavior in the Medium Access Control (MAC) layer and its effects on the performance of the network layer. In order to capture uncertainty of the attacker's strategy as well as the unpredictable nature of the wireless medium, we quantify the optimal attack strategy by using the principle of minimum cross-entropy. Following that, we apply the obtained results for analysis of the IEEE 802.11 DCF MAC protocol and investigate the effects of such optimal attacks on the network layer. Finally, we evaluate the robustness of two different routing protocols against the worst-case MAC layer attacks and justify the need for the MAC layer-based Intrusion Detection Sytems (IDS). Copyright 2007 ACM. | en |
dc.source.uri | http://www.scopus.com/inward/record.url?eid=2-s2.0-34547422843&partnerID=40&md5=6857d2fe96c016a3a887bdd3f2ca7916 | |
dc.subject | Ad-hoc networks | en |
dc.subject | Cross-layer | en |
dc.subject | MAC layer | en |
dc.subject | Minmax robust detection | en |
dc.subject | Protocol misbehavior | en |
dc.subject | Intrusion Detection Sytems (IDS) | en |
dc.subject | Wireless ad hoc networks | en |
dc.subject | Ad hoc networks | en |
dc.subject | Intrusion detection | en |
dc.subject | Medium access control | en |
dc.subject | Optimization | en |
dc.subject | Predictive control systems | en |
dc.subject | Routing protocols | en |
dc.subject | Computer crime | en |
dc.title | Impact of optimal MAC layer attacks on the network layer | en |
dc.type | conferenceItem | en |