Search results for: AUTONOMOUS NODES, GAME THEORY, IEEE 802.11, QUALITY OF SERVICE (QOS) SECURITY, SELFISH ATTACKS, WIRELESS NETWORKS - Bridge of Knowledge

Search

Search results for: AUTONOMOUS NODES, GAME THEORY, IEEE 802.11, QUALITY OF SERVICE (QOS) SECURITY, SELFISH ATTACKS, WIRELESS NETWORKS

Filters

total: 11738
filtered: 6398

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: AUTONOMOUS NODES, GAME THEORY, IEEE 802.11, QUALITY OF SERVICE (QOS) SECURITY, SELFISH ATTACKS, WIRELESS NETWORKS

  • Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks

    Publication

    Multihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...

    Full text available to download

  • Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network

    Publication

    - Year 2017

    In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...

    Full text available to download

  • Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks

    Publication

    Quality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...

    Full text available to download

  • Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures

    Publication

    In IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...

    Full text available to download

  • A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks

    Publication

    - Year 2018

    In wireless networks, stations can improve their received quality of service (QoS) by handling packets of source flows with higher priority. Additionally, in cooperative relay networks, the relays can handle transit flows with lower priority. We use game theory to model a two-hop relay network where each of the two involved stations can commit such selfish QoS manipulation. We design and evaluate a reputation-based incentive scheme...

    Full text available to download

  • Traffic Remapping Attacks in Ad Hoc Networks

    Publication

    - IEEE COMMUNICATIONS MAGAZINE - Year 2018

    Ad hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...

    Full text available to download

  • Quality of service games in an IEEE 802.11 ad hoc wireless LAN

    Publication

    - Year 2006

    W pracy wykazano, że gdy wymaganie na minimalną przepływnośc stacji przekracza wielkość wyznaczoną przez punkt optimum w sensie Pareto, okazjonalna egoistyczna konfiguracja MAC pozwala stacjom uczestniczyć w grze typu kolejkowego, w której wypłatą jest uzyskana przepływność. Zaprezentowano przykładowe scenariusze takiej gry oraz dokonano jej analizy przy pomocy modelu gry stochastycznej, wykazując istnienie punktu równowagi oraz...

  • QoS-sensitive selfish behavior in ad hoc wireless lans: a stochastic game model

    Publication

    - Year 2006

    Rozważany jest prosty model stacji sieci bezprzewodowej wprowadzają-cych ruch elastyczny przy wymaganiu minimalnej przepływności. Każda stacja, okresowo przełączając się na egoistyczną konfigurację MAC, próbuje wyeliminować inne stacje z ubiegania się o pasmo sieci. Dla powstającej w ten sposób gry zastosowano model gry markowowskiej i pokazano istnienie symetrycznego punktu równowagi strategicznej.

  • On the fast BSS transition algorithms in the IEEE 802.11r local area wireless networks

    Handover performance is critical to support multimedia services that are becoming increasingly available over the wireless devices. The high transition delay can be unaccepted for such services or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features, included in recent IEEE 802.11-2007 standard, add management frames that are...

    Full text available to download

  • Performance of FAN conception of traffic control in IP QoS networks

    Publication

    - Year 2008

    In this paper we present the architectural implementation of Flow Aware Networking (FAN), a new approach for realizing QoS guarantees in the Internet. We also propose FAN traffic control algorithm which performs traffic control on flow level. Using the proposed FAN node model, we conduct simulation research to prove if FAN can be a new approach for realizing QoS guarantees. The basis of this research is finding a way to guarantee...

    Full text to download in external service

  • Service and Path Discovery Extensions for Self-forming IEEE 802.11s Wireless Mesh Systems

    Publication

    - Year 2012

    With the rapid growth of the quantity and capabilities of end-user electronic devices, both stationary and mobile, they are employed in increasing number of applications. In this situation, wireless network technologies begin to play a crucial role as networks access technologies, as cable-based solutions tend to be of limited utility in case of easily portable or mobile devices. Resulting development of wireless technologies reached...

  • A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS

    The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....

    Full text to download in external service

  • Evaluation of IEEE 802.21 Handover between IEEE 802.11 and UMTS Networks

    Publication

    The paper presents IEEE 802.21 - the ongoing standard for network handovers - illustrating its functional features, and considering and simulating a set of scenarios of mobile stations moving between IEEE 802.11 and UMTS networks. In order to evaluate the performance of IEEE 802.21 hanover packet loses and switching delays caused by hanover procedures are investigated. The authors discuss example results of simulation experiments...

    Full text available to download

  • Assessment of Connectivity-based Resilience to Attacks Against Multiple Nodes in SDNs

    Publication
    • D. Santos
    • A. de Sousa
    • C. Mas-Machuca
    • J. Rak

    - IEEE Access - Year 2021

    In Software Defined Networks (SDNs), the control plane of a network is decoupled from its data plane. For scalability and robustness, the logically centralized control plane is implemented by physically placing different controllers throughout the network. The determination of the number and placement of controllers is known as the Controller Placement Problem (CPP). In the regular (i.e., failure-free) state, the control plane...

    Full text available to download

  • Modulo N Backoff Scheme for effective QoS differentiation and increased bandwidth utilization in IEEE 802.11 networks

    Publication

    The paper presents a new "modulo N" channel access scheme for wireless Local Area Networks (WLANs). The novel solution derives from the Distributed Coordination Function (DCF) of the IEEE 802.11 standard, further elaborated as Enhanced Distribution Channel Access (EDCA) by the 802.11e draft specification. The main innovation concerns improvement of the binary exponential backoff scheme used for collision avoidance in 802.11 networks....

    Full text available to download

  • Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm

    Publication

    - Year 2014

    We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...

    Full text to download in external service

  • Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs

    Publication

    - IEEE COMMUNICATIONS LETTERS - Year 2017

    In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...

    Full text available to download

  • Trust Management Method for Wireless Sensor Networks

    Publication

    - Year 2017

    A Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...

    Full text available to download

  • Evaluation of IEEE 802.11E extensions for quality of service

    Publication

    - Year 2003

    Zaprezentowano założenia wersji "e" standardu 802.11, wspierającej obsługę zróżnicowanych, pod względem potrzeb QoS, strumień ruchu. Przeprowadzono różnorodne badania symulacyjne dla opcji EDCF oraz HCF tego standardu. Wskazano na mankamenty oraz zalety nowych rozwiązań.

  • Service-based Resilience via Shared Protection in Mission-critical Embedded Networks

    Publication

    - IEEE Transactions on Network and Service Management - Year 2021

    Mission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...

    Full text available to download

  • A station strategy to deter backoff attacks in IEEE 802.11 LANs

    Publication

    Dla konstrukcji strategii zapobiegającej atakom na mechanizm odczekania w sieciach lokalnych IEEE 802.11 zastosowano wybór konfiguracji MAC sterowany przez liczniki etapów gry z losowymi wartościami początkowymi. Wykazano, że przy pewnych warunkach nałożonych na rozkady prawdopodobieństwa liczników standardowe ustawienia parametrów MAC stają się punktem doskonałej równowagi strategicznej.

    Full text to download in external service

  • New Tool for Examining QoS in the VToIP Service

    Publication

    This paper is dedicated to the subject of measuring QoS in the Video Telephony over IP (VToIP) service. QoS measurement models in general and then models designed specifically for measuring QoS in the VToIP service are presented. A new numerical tool for examining the quality of VToIP video streams VToIP is described. The tool’s functionality is then put to the test in a number of analysis scenarios. The results and insights gained...

    Full text available to download

  • Service-based Resilience for Embedded IoT Networks

    Publication

    - Year 2020

    Embedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....

    Full text to download in external service

  • MAC-layer vulnerabilities of IEEE 802.11 wireless networks

    Publication

    Dla sieci bezprzewodowych pracujących według standardu IEEE 802.11 przeprowadzono analizę symulacyjną i badania pomiarowe w specjalnie zestawionej konfiguracji w celu określenia rozdziału pasma transmisyjnego pomiędzy stacje uczciwe i stacje atakujące wybrane mechanizmy protokołu MAC.

  • Measures of region failure survivability for wireless mesh networks

    Publication

    - WIRELESS NETWORKS - Year 2015

    Wireless mesh networks (WMNs) are considered as a promising alternative to wired local, or metropolitan area networks. However, owing to their exposure to various disruptive events, including natural disasters, or human threats, many WMN network elements located close to the failure epicentre are frequently in danger of a simultaneous failure, referred to as a region failure. Therefore, network survivability, being the ability...

    Full text available to download

  • Service restoration in survivable networks under attacks

    Publication

    W artykule dokonano porównania jakości odtwarzania usług w przeżywalnych sieciach optycznych, uszkadzanych w wyniku awarii fizycznych oraz na skutek ataków. Przeanalizowano wariant ochrony ścieżek ('path protection') poprzez wyznaczane zawczasu ścieżki zabezpieczające. Z uwagi na NP-zupełność problemu optymalizacji doboru tras w przeżywalnych sieciach optycznych, zaproponowano efektywny algorytm heurystyczny SCNDP. Autorski symulator...

  • Determining QoS in the Video Telephony Service in an IP Environment

    Publication

    - LECTURE NOTES IN COMPUTER SCIENCE - Year 2010

    IP networks are indispensable nowadays. They are among the most efficient platforms. The constantly growing number of users and new services in these networks - the largest being the Internet - requires a good quality of any application used.Determining the QoS in real-time services is particularly important. This work is dedicated to exactly this aspect of the real-time service Video Telephony over IP (VToIP). First, the ITU-T...

  • Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios

    Publication

    - IEEE Access - Year 2020

    During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...

    Full text available to download

  • Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes

    Publication

    - Year 2019

    A novel node misbehavior detection system called GIFTED is proposed for a multihop wireless ad hoc network (WAHN) whose nodes may selfishly refuse to forward transit packets. The system guesses the nodes’ intrinsic forwarding trustworthiness (IFT) by analyzing end-to-end path performance rather than utilizing unreliable and incentive incompatible low-layer mechanisms. It can work with occasional IFT jumps, directional antennae,...

    Full text available to download

  • Self-Organizing Wireless Nodes Monitoring Network

    The concept of data monitoring system and self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the wireless monitoring system for containers, and the second is the mobile monitoring system for gas air pollution measurements.

  • End-to-end service survivability under attacks on networks

    Publication

    - Year 2005

    W artykule zaproponowano model znajdowania przeżywalnych i odpornych na ataki połączeń od końca do końca dla sieci o topologii bezskalowej. Głównymi założeniami są: zróżnicowanie sposobu zapewniania przeżywalności połączeń w zależności od klasy ruchu oraz omijanie przez ścieżki aktywne węzłów, narażonych na ataki (tzw. centrów). Wprowadzono nową metrykę dla wyznaczania ścieżek, proporcjonalną do wymaganej jakości obsługi połączeń,...

  • Service restoration in survivable networks under malicious attacks

    Publication

    W artykule przedstawiono porównanie jakości odtwarzania usług w przeżywalnych sieciach optycznych poddanych awariom losowym oraz celowym działaniom niszczącym (atakom). Założenia odnośnie przeżywalności są następujące: ochrona od krańca do krańca, rozłączność węzłowa każdej pary ścieżek: aktywnej i zabezpieczającej.Z powodu NP-zupełności problemu przeżywalnego doboru tras i przydziału długości fali w sieciach optycznych, zaproponowano...

  • End-to-end service survivability under attacks on networks

    W artykule zaproponowano model znajdowania przeżywalnych i odpornych na ataki połączeń od końca do końca dla sieci o topologii bezskalowej. Głównymi założeniami są: zróżnicowanie sposobu zapewniania przeżywalności połączeń w zależności od klasy ruchu oraz omijanie przez ścieżki aktywne węzłów, narażonych na ataki (tzw. centrów). Wprowadzono nową metrykę dla wyznaczania ścieżek, proporcjonalną do wymaganej jakości obsługi połączeń,...

    Full text available to download

  • Communication Networks in the Service of the Environmental Monitoring

    In the paper selected issues relating to communication networks in the services of the environmental monitoring (EM) have been described. It is divided into three main parts: introduction, wire and wireless networks. At the beginning of the basic definitions were explained. The wire part focuses on a plain old telephone service (POTS), an integrated services digital network (ISDN), a digital subscriber line (DSL) and a fiber-optic...

  • Influence of the jitter buffer on the quality of service VoIP.

    Publication

    - Year 2011

    VoIP (Voice over IP) is a modern service with enormous potential for yet further growth. It uses the already available and universally implemented IP transport platform. One significant problem, however, is ensuring the Quality of Service, abbreviated QoS. This paper addresses exactly that issue. In an extensive investigation the influence of jitter buffers on QoS is being examined in depth. Two implementations, namely a passive...

    Full text to download in external service

  • Interworking and Cross-layer Service Discovery Extensions for IEEEE802.11s Wireless Mesh Standard

    With the rapid popularization of mobile end-user electronic devices wireless network technologies begin to play a crucial role as networks access technologies. While classic point-to-multipoint wireless access systems, based on fixed infrastructure of base stations providing access to clients, remain the main most popular solution, an increasing attention is devoted to wireless mesh systems, where each connecting client can extend...

    Full text available to download

  • Distributed protection against non-cooperative node behavior in multi-hop wireless networks

    Publication

    An important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...

  • Quality of service in optical burst switched networks

    Publication

    In the paper analytical models of two service differentiation schemes for optical burst switched network: extended offset time based and PPS (Preemptive Priority Scheme) are revised. Also accordance of analytical models for those schemes is studied when complete class isolation is assumed. Furthermore authors introduce an analytical model which describes an effective degree of isolation when burst switched network employs both...

  • Quality of service in optical burst switched networks

    In the paper analytical models of two service differentiation schemes for optical burst switched network: extended offset time based and PPS (Preemptive Priority Scheme) are revised. Also accordance of analytical models for those schemes is studied when complete class isolation is assumed. Furthermore authors introduce an analytical model which describes an effective degree of isolation when burst switched network employs both...

  • Impact of SDN Controller’s Performance on Quality of Service

    Publication

    Software Defined Networking is a paradigm in network architecture; that is quickly becoming commonplace in modern telecommunication systems. It facilitates network customization for the requirements of different applications and simplifies the implementation of new services. Since its proposal, a significant evolution in its functionality has occurred. However, this development brought along problems of efficiency and performance,...

    Full text available to download

  • A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks

    Publication

    - Year 2021

    For traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...

    Full text to download in external service

  • Cross-layer mDNS/ARP integration for IEEE 802.11s Wireless mesh Network

    Publication

    - Year 2016

    Popularization of mobile computing devices created a need for robust, efficient and ubiquitous methods of communication and network access. At the same time, evolution and standardization of Wireless Local Area Network (WLAN) technologies made them an attractive solution for building of complex network systems. Moreover, growing maturity of WLAN standards such as IEEE 802.11 allows for introduction of WLAN architectures other than...

    Full text to download in external service

  • Equilibria of wireless multihoming game

    Terminale podłączone do wielu sieci bezprzewodowych modelowane są jako uczestnicy gry niekooperacyjnej, której symetryczny punkt równowagi Nasha w strategiach mieszanych wyznaczono dla przypadku sieci WLAN standardu IEEE 802.11. Udziały pasma w punkcie równowagi okazują się niższe w porównaniu ze środowiskiem terminali stosujących ustawienia standardowe.

  • Playing CSMA/CA game to deter backoff attacks in ad hoc wireless LANs

    Publication

    - Year 2005

    Przedstawiono wieloetapowe strategie konfiguracji okien rywalizacyjnych w mechanizmie CSMA/CA dla bezprzewodowych sieci lokalnych silnie obciążonych ruchem, zapewniające osiągnięcie doskonałego punktu równowagi Nasha przy konfiguracji standardowej. Wykonano badania symulacyjne dla oceny zbieżności skumulowanych udziałów w pasmie transmisyjnym do wartości w równowadze.

  • Mobile Networks' Analysis in Terms of QoS Performance Assessment

    Publication

    - Year 2023

    Quality of service (QoS) assessment is one of the basic processes carried out by mobile network operators (MNOs) and regulators of the telecommunications market. Usually, professional companies carry out measurements for various country areas and use cases (scenarios). In this paper, we show exemplary measurement results carried out in drive tests in the vicinity of the Polish capital by a professional company. The measurement...

    Full text to download in external service

  • Cooperative Data Transmission in Wireless Vehicular Networks

    Publication

    - Year 2017

    The paper presents issues related to the cooperative transmission in wireless vehicular networks. Cooperative transmission involves the use of mobile terminals as relay stations to improve the transmission quality, improve network performance and reduce energy consumption. The paper presents the methods used to implement cooperative transmission and the types of cooperative networks.

  • Explainable AI for Inspecting Adversarial Attacks on Deep Neural Networks

    Deep Neural Networks (DNN) are state of the art algorithms for image classification. Although significant achievements and perspectives, deep neural networks and accompanying learning algorithms have some important challenges to tackle. However, it appears that it is relatively easy to attack and fool with well-designed input samples called adversarial examples. Adversarial perturba-tions are unnoticeable for humans. Such attacks...

    Full text available to download

  • Wireless LAN with noncooperative anonymous stations: QOS provisioning via war of attrition

    Publication

    - Year 2009

    MAC-layer QoS provision necessitates an admission scheme to grant a requested QoS notwithstanding subse-quent requests. For an ad hoc WLAN with anonymous stations, we assume a degree of power awareness to propose a session- rather than frame-level bidding for bandwidth. Next we analyze the underlying Bayesian war of attrition game.

  • Using trust management model for detection of faulty nodes in Wireless Sensor Networks

    Full text available to download

  • Structural and Temporal Topic Models of Feedbacks on Service Quality – A Path to Theory Development?

    Publication

    - Year 2020

    There is growing interest in applying computational methods in analysing large amount of data without sacrificing rigour in Information Systems research. In this paper, we demonstrate how the use of structural and temporal topic modelling can be employed to produce insights of both theoretical and practical importance from the analysis of textual comments on the quality of services in hospitals. As a first step, we revealed the...

    Full text to download in external service