A survey of MAC layer solutions to the hidden node problem in ad-hoc networks

K Kosek-Szott - Ad Hoc Networks, 2012 - Elsevier
Ad-hoc networks suffer from the problem of hidden nodes (terminals), which leads to severe
degradation of network throughput. This survey gives a comprehensive overview of Medium …

[HTML][HTML] Real-time detection of MAC layer misbehavior in mobile ad hoc networks

A Aaroud, MA El Houssaini, A El Hore… - Applied Computing and …, 2017 - Elsevier
The MAC layer misbehavior of the IEEE 802.11 standard can have a negative impact on the
wireless network's performance, similar to the effects of denial of service attacks. The goal of …

A wireless multi-hop protocol for real-time applications

D Tardioli, D Sicignano, JL Villarroel - Computer Communications, 2015 - Elsevier
Abstract Mobile Ad-hoc NETworks (MANETs) have been gaining increasing popularity in
recent years thanks to their ease of deployment and the low cost of their components. The …

Selfish insider attacks in IEEE 802.11 s wireless mesh networks

S Szott - IEEE Communications Magazine, 2014 - ieeexplore.ieee.org
The IEEE 802.11 s amendment for wireless mesh networks does not provide incentives for
stations to cooperate and is particularly vulnerable to selfish insider attacks in which a …

[PDF][PDF] An IEEE 802.11 EDCA model with support for analysing networks with misbehaving nodes

S Szott, M Natkaniec, AR Pach - EURASIP Journal on Wireless …, 2010 - Springer
We present a novel model of IEEE 802.11 EDCA with support for analysing networks with
misbehaving nodes. In particular, we consider backoff misbehaviour. Firstly, we verify the …

Detecting backoff misbehaviour in IEEE 802.11 EDCA

S Szott, M Natkaniec… - European Transactions on …, 2011 - Wiley Online Library
In this paper, we suggest the use of the chi‐square test for detecting backoff misbehaviour in
IEEE 802.11 EDCA networks. A performance evaluation is performed to compare the chi …

Discouraging traffic remapping attacks in local ad hoc networks

J Konorski, S Szott - IEEE transactions on wireless …, 2014 - ieeexplore.ieee.org
Quality of Service (QoS) is usually provided in ad hoc networks using a class-based
approach which, without dedicated security measures in place, paves the way to various …

Wireless link prediction and triggering using modified Ornstein–Uhlenbeck jump diffusion process

E Chin, D Chieng, V Teh, M Natkaniec, K Loziak… - Wireless networks, 2014 - Springer
Through time domain observation, typical wireless signal strength values seems to exhibit
some forms of mean-reverting and discontinuous “jumps” behaviour. Motivated by this fact …

Selfish behavior in ieee 802.11 ah networks: A detection algorithm and mitigation strategies

Y Georgiev, R Verhoeven, N Meratnia - Sensors, 2022 - mdpi.com
One of the latest protocols developed for the Internet of Things networks is IEEE 802.11 ah,
proposed by the WiFi Alliance. The new channel access mechanism in IEEE 802.11 ah …

Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game‐theoretic approach

S Szott, M Natkaniec, AR Pach - Security and Communication …, 2013 - Wiley Online Library
Selfish users are known to be a severe security threat for wireless ad hoc networks. In
particular, they can exploit mechanisms designed to assure quality of service (QoS) in the …