Paper Abstract and Keywords |
Presentation |
2016-04-21 14:25
A Study on Detection Method using Spectrum Analysis for Selfish Terminal with Manipulated MAC Parameters over WLAN Hiroyasu Obata, Ryo Hamamoto, Takahiro Matsumoto, Chisa Takano, Kenji Ishida (Hiroshima City Univ.) NS2016-4 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Because WLAN based on IEEE802.11 uses CSMA/CA for a media access control (MAC), each terminal can obtain a fair transmission opportunity.
Here because each terminal manages own MAC parameters, a malicious user might intentionally manipulate MAC parameters.
This study refers to a terminal using manipulated MAC parameters as a selfish terminal.
If the selfish terminal coexists with the terminals based on CSMA/CA, it is expected that the throughput of each terminal becomes unfair.
Therefore, a mechanism to detect and control the selfish terminal is required in order to secure the fair communication.
In order to detect the selfish terminal, we have proposed a ditection method.
However, the previous method has not been evaluated considering a case when the degree of manipulation changes.
Thus, this paper evaluates the performance of the previous method for the selfish terminal in this situation.
Then, we propose a new detection method using a spectrum analysis in order to extend the detection performance.
From the simulation results, we confirmed that the proposal can detect the selfish terminal and obtain lower false detection rate. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Wireless LAN / Selfish terminal / Detection method / Spectrum analysis / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 116, no. 8, NS2016-4, pp. 17-22, April 2016. |
Paper # |
NS2016-4 |
Date of Issue |
2016-04-14 (NS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
NS2016-4 |
Conference Information |
Committee |
NS |
Conference Date |
2016-04-21 - 2016-04-22 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
wakayama university |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Traffic, Network evaluation, Performance, Resource Management/Control, Traffic Engineering, Reliability, Resiliency |
Paper Information |
Registration To |
NS |
Conference Code |
2016-04-NS |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
A Study on Detection Method using Spectrum Analysis for Selfish Terminal with Manipulated MAC Parameters over WLAN |
Sub Title (in English) |
|
Keyword(1) |
Wireless LAN |
Keyword(2) |
Selfish terminal |
Keyword(3) |
Detection method |
Keyword(4) |
Spectrum analysis |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Hiroyasu Obata |
1st Author's Affiliation |
Hiroshima City University (Hiroshima City Univ.) |
2nd Author's Name |
Ryo Hamamoto |
2nd Author's Affiliation |
Hiroshima City University (Hiroshima City Univ.) |
3rd Author's Name |
Takahiro Matsumoto |
3rd Author's Affiliation |
Hiroshima City University (Hiroshima City Univ.) |
4th Author's Name |
Chisa Takano |
4th Author's Affiliation |
Hiroshima City University (Hiroshima City Univ.) |
5th Author's Name |
Kenji Ishida |
5th Author's Affiliation |
Hiroshima City University (Hiroshima City Univ.) |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2016-04-21 14:25:00 |
Presentation Time |
25 minutes |
Registration for |
NS |
Paper # |
NS2016-4 |
Volume (vol) |
vol.116 |
Number (no) |
no.8 |
Page |
pp.17-22 |
#Pages |
6 |
Date of Issue |
2016-04-14 (NS) |
|