000149005 001__ 149005
000149005 005__ 20250124153130.0
000149005 0247_ $$2doi$$a10.1109/TNET.2014.2369535
000149005 0248_ $$2sideral$$a94588
000149005 037__ $$aART-2016-94588
000149005 041__ $$aeng
000149005 100__ $$aBanchs,A.
000149005 245__ $$aThwarting Selfish Behavior in 802.11 WLANs
000149005 260__ $$c2016
000149005 5060_ $$aAccess copy available to the general public$$fUnrestricted
000149005 5203_ $$aThe 802.11e standard enables user configuration of several MAC parameters, making WLANs vulnerable to users that selfishly configure these parameters to gain throughput. In this paper, we propose a novel distributed algorithm to thwart such selfish behavior. The key idea of the algorithm is for stations to react, upon detecting a misbehavior, by using a more aggressive configuration that penalizes the misbehaving station. We show that the proposed algorithm guarantees global stability while providing good response times. By conducting an analysis of the effectiveness of the algorithm against selfish behaviors, we also show that a misbehaving station cannot obtain any gain by deviating from the algorithm. Simulation results confirm that the proposed algorithm optimizes throughput performance while discouraging selfish behavior. We also present an experimental prototype of the proposed algorithm demonstrating that it can be implemented on commodity hardware.
000149005 536__ $$9info:eu-repo/grantAgreement/EC/FP7/318115/EU/Connectivity management for eneRgy Optimised Wireless Dense networks/CROWD$$9info:eu-repo/grantAgreement/ES/UZ/CUD2013-05
000149005 540__ $$9info:eu-repo/semantics/openAccess$$aAll rights reserved$$uhttp://www.europeana.eu/rights/rr-f/
000149005 590__ $$a3.376$$b2016
000149005 591__ $$aCOMPUTER SCIENCE, HARDWARE & ARCHITECTURE$$b7 / 52 = 0.135$$c2016$$dQ1$$eT1
000149005 591__ $$aTELECOMMUNICATIONS$$b19 / 88 = 0.216$$c2016$$dQ1$$eT1
000149005 591__ $$aENGINEERING, ELECTRICAL & ELECTRONIC$$b49 / 259 = 0.189$$c2016$$dQ1$$eT1
000149005 591__ $$aCOMPUTER SCIENCE, THEORY & METHODS$$b13 / 104 = 0.125$$c2016$$dQ1$$eT1
000149005 592__ $$a0.93$$b2016
000149005 593__ $$aComputer Networks and Communications$$c2016$$dQ1
000149005 593__ $$aSoftware$$c2016$$dQ1
000149005 593__ $$aElectrical and Electronic Engineering$$c2016$$dQ1
000149005 593__ $$aComputer Science Applications$$c2016$$dQ1
000149005 655_4 $$ainfo:eu-repo/semantics/article$$vinfo:eu-repo/semantics/acceptedVersion
000149005 700__ $$0(orcid)0000-0001-9052-9554$$aOrtin,J.$$uUniversidad de Zaragoza
000149005 700__ $$aGarcia-Saavedra,A.
000149005 700__ $$aLeith,D. J.
000149005 700__ $$aSerrano,P.
000149005 7102_ $$15008$$2560$$aUniversidad de Zaragoza$$bDpto. Ingeniería Electrón.Com.$$cÁrea Ingeniería Telemática
000149005 773__ $$g24, 1 (2016), 492-505$$pIEEE/ACM trans. netw.$$tIEEE-ACM TRANSACTIONS ON NETWORKING$$x1063-6692
000149005 8564_ $$s340448$$uhttps://zaguan.unizar.es/record/149005/files/texto_completo.pdf$$yPostprint
000149005 8564_ $$s3445000$$uhttps://zaguan.unizar.es/record/149005/files/texto_completo.jpg?subformat=icon$$xicon$$yPostprint
000149005 909CO $$ooai:zaguan.unizar.es:149005$$particulos$$pdriver
000149005 951__ $$a2025-01-24-14:48:50
000149005 980__ $$aARTICLE