...
首页> 外文期刊>IEEE communications letters >Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
【24h】

Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs

机译:特设WLAN中阻塞匿名流量重新映射攻击的威胁的可信度

获取原文
获取原文并翻译 | 示例
           

摘要

In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the arising noncooperative game in which the attackers decide whether to continue a TRA when threatened and honest stations decide whether to start jamming when the TRA is continued. Using a Maynard Smith setting, we prove that the threats are credible to a rational attacker, who will then refrain from playing the game and remain honest.
机译:在ad hoc网络中,自私站点可以通过执行流量重新映射攻击(TRA),即错误地将其流量分配给较高优先级来追求更高的服务质量(QoS),这可能会损害诚实站点的QoS。为了阻止攻击者,诚实的站点可以宣布他们对感知到的QoS的不满。如果这种威胁失败,则可以启动代价高昂的数据帧干扰防御。我们分析了出现的非合作博弈,其中攻击者在受到威胁时决定是否继续执行TRA,诚实的站点在TRA继续执行时确定是否开始干扰。使用梅纳德·史密斯(Maynard Smith)的设置,我们证明了威胁对合理的攻击者是可信的,然后他们将避免玩游戏并保持诚实。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号