MAC-Layer Traffic Shaping Defense Against WiFi Device Fingerprinting Attacks.
Mnassar AlyamiMohammed AlkhowaiterMansour Al GhanimCliff C. ZouYan SolihinPublished in: ISCC (2022)
Keyphrases
- wifi
- mac layer
- wireless networks
- cross layer
- ad hoc networks
- access points
- ddos attacks
- mac protocol
- wireless communication
- channel assignment
- cellular networks
- routing protocol
- physical layer
- network simulator
- mobile devices
- end to end
- quality of service
- multi hop
- application layer
- wireless channels
- wireless mesh networks
- network layer
- routing algorithm
- smart phones
- mobile ad hoc networks
- base station
- video streaming
- mobile networks
- mobile applications
- intrusion detection
- neural network
- mobile nodes
- energy consumption
- communication networks
- urban environments
- peer to peer
- watermarking scheme
- urban areas
- network architecture
- mobile phone
- wireless sensor networks