Nie znaleźliśmy wyników w zadanych kryteriach!
Ale mamy wyniki w innych katalogach.Filtry
wszystkich: 1281
-
Katalog
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: TRAFFIC REMAPPING
-
Traffic Remapping Attacks in Ad Hoc Networks
PublikacjaAd hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublikacjaQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublikacjaMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublikacjaIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublikacjaIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...
-
TRAFFIC
Czasopisma -
Promet-Traffic & Transportation
Czasopisma -
Traffic Injury Prevention
Czasopisma -
Traffic Type Influence on QoS Network Performance of Streaming Traffic Class
PublikacjaFeasibility study on QoS routing proved that the traffic type influence the network performance. The performance is defined here as a number of packets serviced by the network. In the paper additional element - buffers lengths used in service system was verified in terms of dependencies with routing performance. We present results obtained by simulation for many simulation scenarios. Analysis was done for two different network...
-
Comparison of Traffic Flow Models with Real Traffic Data Based on a Quantitative Assessment
PublikacjaThe fundamental relationship of traffic flow and bivariate relations between speed and flow, speed and density, and flow and density are of great importance in transportation engineering. Fundamental relationship models may be applied to assess and forecast traffic conditions at uninterrupted traffic flow facilities. The objective of the article was to analyze and compare existing models of the fundamental relationship. To that...