Search results for: SELFISH BEHAVIOR - Bridge of Knowledge

Search

Search results for: SELFISH BEHAVIOR

Search results for: SELFISH BEHAVIOR

  • QoS-sensitive selfish behavior in ad hoc wireless lans: a stochastic game model

    Publication

    - Year 2006

    Rozważany jest prosty model stacji sieci bezprzewodowej wprowadzają-cych ruch elastyczny przy wymaganiu minimalnej przepływności. Każda stacja, okresowo przełączając się na egoistyczną konfigurację MAC, próbuje wyeliminować inne stacje z ubiegania się o pasmo sieci. Dla powstającej w ten sposób gry zastosowano model gry markowowskiej i pokazano istnienie symetrycznego punktu równowagi strategicznej.

  • An Idea Bag strategy to discourage selfish behavior under random token MAC protocols for wireless LANs

    Publication

    - Year 2006

    Dla klasy protokołów MAC opartych na przypadkowo krążącym żetonie dononano rozdziału polityki wyłaniania zwycięzcy od strategii wyboru szczeliny dla żądania dostępu. Wyróżniono klasę protokołów RT/ECD, dla której zidentyfikowano typ wynikowej gry niekooperacyjnej. Pokazano, że gra ta zasadniczo różni się od wieloosobowego dylematu więźnia. Zaprojektowano heurystyczną strategię asymptotycznie zniechęcającą do zachowań egoistycznych...

  • DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes

    Publication

    - Year 2009

    . Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm to avoid end-to-end routes containing ill-reputed...

  • A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks

    Publication

    - Year 2018

    In wireless networks, stations can improve their received quality of service (QoS) by handling packets of source flows with higher priority. Additionally, in cooperative relay networks, the relays can handle transit flows with lower priority. We use game theory to model a two-hop relay network where each of the two involved stations can commit such selfish QoS manipulation. We design and evaluate a reputation-based incentive scheme...

    Full text available to download

  • Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks

    Publication

    Multihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...

    Full text available to download

  • Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures

    Publication

    In IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...

    Full text available to download

  • Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network

    Publication

    - Year 2017

    In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...

    Full text available to download

  • Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks

    Publication

    Quality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...

    Full text available to download

  • A framework for detection of selfishness in multihop mobile ad hoc networks

    The paper discusses the need for a fully-distributed selfishness detection mechanism dedicated for multihop wireless ad hoc networks which nodes may exhibit selfish forwarding behaviour. The main contribution of this paper is an introduction to a novel approach for detecting and coping with the selfish nodes. Paper describes a new framework based on Dempster-Shafer Theory called Dempster-Shafer Theory-based Selfishness Detection...

    Full text available to download

  • Traffic Remapping Attacks in Ad Hoc Networks

    Publication

    - IEEE COMMUNICATIONS MAGAZINE - Year 2018

    Ad hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...

    Full text available to download

  • Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs

    Publication

    - IEEE COMMUNICATIONS LETTERS - Year 2017

    In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...

    Full text available to download

  • Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes

    Publication

    - Year 2019

    A novel node misbehavior detection system called GIFTED is proposed for a multihop wireless ad hoc network (WAHN) whose nodes may selfishly refuse to forward transit packets. The system guesses the nodes’ intrinsic forwarding trustworthiness (IFT) by analyzing end-to-end path performance rather than utilizing unreliable and incentive incompatible low-layer mechanisms. It can work with occasional IFT jumps, directional antennae,...

    Full text available to download

  • Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network

    The capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...

    Full text available to download

  • Support for research biobanks among medical students in the Republic of Kazakhstan

    Publication

    Background: Over the past few years, several biobanks have been organized in the Republic of Kazakhstan (RoK). As research biobanks are becoming an increasingly important tool for precision medicine, they require competent biobankers who will help disseminate the idea of biobanking throughout the society and support donation for research purposes. This study aimed to assess the support for research...

    Full text to download in external service