Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers.
Svetlana RadosavacAlvaro A. CárdenasJohn S. BarasGeorge V. MoustakidesPublished in: J. Comput. Secur. (2007)
Keyphrases
- ad hoc networks
- mac protocol
- mac layer
- routing protocol
- medium access control
- wireless ad hoc networks
- network topology
- cross layer
- quality of service
- wireless networks
- routing algorithm
- end to end
- network simulator
- mobile ad hoc networks
- channel assignment
- wireless sensor networks
- end to end delay
- multi channel
- peer to peer
- multi hop
- key management
- mobile nodes
- mobile networks
- physical layer
- wifi
- energy efficient
- cellular networks
- wireless mesh networks
- data transmission
- energy consumption
- base station
- real time
- sensor nodes
- video streaming
- qos requirements
- sensor networks