Experimenting with commodity 802.11 hardware: Overview and future directions

P Serrano, P Salvador, V Mancuso… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
The huge adoption of 802.11 technologies has triggered a vast amount of experimentally-
driven research works. These works range from performance analysis to protocol …

BoDMaS: bio-inspired selfishness detection and mitigation in data management for ad-hoc social networks

AM Ahmed, X Kong, L Liu, F Xia, S Abolfazli, Z Sanaei… - Ad Hoc Networks, 2017 - Elsevier
Existing data management protocols for socially-aware networks assume that users are
cooperative when participating in operations such as data forwarding. However, selfishness …

CNN-based intrusion classification for IEEE 802.11 wireless networks

Q Duan, X Wei, J Fan, L Yu, Y Hu - 2020 IEEE 6th International …, 2020 - ieeexplore.ieee.org
WiFi has been widely deployed to facilitate home, office, or even stadium-scale wireless
access to the Internet, and will be an essential part of the future wireless network through …

Covert DCF: A DCF-based covert timing channel in 802.11 networks

R Holloway, R Beyah - … Conference on Mobile Ad-Hoc and …, 2011 - ieeexplore.ieee.org
Covert communications have been used for many decades. Accordingly, when digital
communications moved to the forefront it was natural that covert channels be proposed to …

A green approach for selfish misbehavior detection in 802.11-based wireless networks

T Hayajneh, G Almashaqbeh, S Ullah - Mobile Networks and Applications, 2015 - Springer
IEEE 802.11 is one of the most well-established and widely used standard for wireless LAN.
Its Medium Access control (MAC) layer assumes that the devices adhere to the standard's …

Fast and efficient countermeasure for MAC layer misbehavior in MANETs

S Djahel, Z Zhang, F Nait-Abdesselam… - IEEE Wireless …, 2012 - ieeexplore.ieee.org
In this paper, we deal with backoff cheating technique in IEEE802. 11 based MANETs and
propose a novel scheme, dubbed HsF-MAC (Hash Function based MAC protocol), to cope …

Evaluating network layer selfish behavior and a method to detect and mitigate its effect in MANETs

MA Hussain, A Nadeem, O Khan… - 2012 15th …, 2012 - ieeexplore.ieee.org
A Mobile Ad Hoc Network (MANET) is an infrastructureless network of autonomous devices
formed dynamically. At network layer routing protocols in MANETs expect every node to …

[PDF][PDF] Performance improvement of mobile ad hoc network using particle swarm optimization

R Kalaiarasi, D Sridharan - Journal of Computational Information …, 2013 - researchgate.net
Improving security and reduction of misbehaving nodes in Mobile Ad hoc Network (MANET)
is an important research domain. Misbehavior may seriously degrade the throughput …

A framework for secure routing in mobile ad hoc networks

PM John, P Vivekanandan - IEEE-International Conference On …, 2012 - ieeexplore.ieee.org
Mobile Ad Hoc Network (MANET) is a collection of mobile nodes (hosts) which communicate
with each other via wireless links either directly or relying on other nodes as routers. In …

Unleashing the shrew: A stealth greedy targeted attack on TCP traffic in wireless LANs

L Gu, J Zhang, B Bensaou - 39th Annual IEEE Conference on …, 2014 - ieeexplore.ieee.org
This paper presents a new jamming attack in wireless LANs that deliberately targets uplink
TCP acknowledgements (TCP-ACKs) of downlink TCP flows. To ensure immunity to …