Taking advantage of jamming in wireless networks: A survey

H Al-Mefleh, O Al-Kofahi - Computer Networks, 2016 - Elsevier
There has been an increasing interest in jamming-based solutions to improve the
performance of wireless networks. In such schemes, users would deliberately jam the …

A new predictive approach for the MAC layer misbehavior in IEEE 802.11 networks

MA El Houssaini, A Nabou, A Hadir… - International Journal of …, 2023 - emerald.com
Purpose Ad hoc mobile networks are commonplace in every aspect of our everyday life.
They become essential in many industries and have uses in logistics, science and the …

Discouraging traffic remapping attacks in local ad hoc networks

J Konorski, S Szott - IEEE transactions on wireless …, 2014 - ieeexplore.ieee.org
Quality of Service (QoS) is usually provided in ad hoc networks using a class-based
approach which, without dedicated security measures in place, paves the way to various …

Fair two‐party computation with rational parties holding private types

Y Wang, DS Wong, C Zhao, Q Xu - Security and …, 2015 - Wiley Online Library
Rational secure two‐party computation (RSTPC) applies game theory to cryptographic
protocols, where rational parties only care about how to maximize their utilities. Fairness can …

A survey oj various approaches to detect selfishness in wireless ad-hoc networks

SN Shah, RH Jhaveri - … on Green Computing and Internet of …, 2015 - ieeexplore.ieee.org
Ad hoc is a Latin word which describes solutions for this or specific purpose. In the world of
computer network, an ad hoc network refers to a network connection which established for a …

A novel reaction scheme against the MAC layer misbehavior in mobile ad hoc networks

MA El Houssaini, A Aaroud, A El Hore… - Procedia Computer …, 2016 - Elsevier
Abstract Medium Access Control (MAC) protocol provides a fair access to the wireless
channel through a distributed algorithm called the binary exponential back-off. The share …

Carrot and Stick: Incentivizing Cooperation Between Nodes in Multihop Wireless Ad Hoc Networks

K Rydzewski - International Conference on Ad Hoc Networks, 2020 - Springer
A novel, holistic approach to cooperation incentivization in multihop wireless ad hoc
networks is introduced. The concept utilizes a reputation metric to tailor a response to …

[PDF][PDF] Analysis of a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network.

J Konorski, S Szott - CoRR, 2019 - academia.edu
Multi-hop ad hoc networks are susceptible to selfish misbehavior such as traffic remapping
attacks (TRAs). Selfish nodes launching such attacks acquire unduly high quality of service …

Enabling autonomicity in wireless mesh networks with the ETSI AFI GANA reference model

S Szott, J Gozdecki, K Kosek‐Szott… - … Journal of Network …, 2017 - Wiley Online Library
The distributed nature of wireless mesh networks (WMNs) allows them to benefit from
multiple autonomic functionalities. However, the existing landscape of self‐x solutions (eg …

Assessing the cooperativeness of users in Wi-Fi networks

S Szott, G Ptaszek, L Janowski - 2014 11th International …, 2014 - ieeexplore.ieee.org
Wi-Fi networks are based on the cooperation of users in sharing a common resource—the
radio channel. This is a security risk because users may behave selfishly to increase their …