Application of Sequential Detection Schemes for Obtaining Performance Bounds of Greedy Users in the IEEE 802.11 MAC

Application of Sequential Detection Schemes for Obtaining Performance Bounds of Greedy Users in the IEEE 802.11 MAC

Title : Application of Sequential Detection Schemes for Obtaining Performance Bounds of Greedy Users in the IEEE 802.11 MAC
Authors :
Radosavac, Svetlan
Baras, John, S.
Conference : IEEE Communications Magazine special issue on Security in Mobile Ad Hoc and Sensor Networks Vol. 46, pp. 148-154
Date: February 01 - February 01, 2008

The widespread deployment of wireless networks and hot spots that employ the IEEE 802.11 technology has forced network designers to put emphasis on the importance of ensuring efficient and fair use of network resources. In order to be able to evaluate the performance of the adversary, we define a set of security guarantees and requirements for an intrusion detection system and precisely define an adversary model. We then apply the proposed model for defining performance bounds of the worst-case adversary and the quickest detection IDS in the IEEE 802.11 MAC.

Download Full Paper