作者: Jerzy Konorski , Szymon Szott
关键词:
摘要: In IEEE 802.11 networks, selfish stations can pursue a better quality of service through MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow new angle attack: tamper with either source traffic, transit or both. We consider the applicability variants in two-hop topology, quantify impact, study defense measures.