Title Page
Abstract
Contents
I. Introduction 11
II. Related Work 14
1. Selfish Attack 14
2. Jamming Attack 16
III. IEEE802.11 Mechanism 18
1. DCF Mechanism 18
2. Multi-Link Operation 21
IV. Attack Model 23
1. Simulation Environment 23
2. Selfish Attack 27
3. Jamming Attack 29
V. Selective Attack Mitigation Model 33
1. Dataset 33
2. Classification Algorithms 37
3. Count Based Prediction 38
4. Selective Attack Mitigation 39
VI. Performance Evaluation 42
1. Attack Response Simulation Result and Analysis 42
2. Attack Detection Result and Analysis 45
VII. Conclusion 47
References 48
논문개요 52
TABLE 1. Simulation parameters 25
TABLE 2. Parameters for deceptive jammer 31
TABIE 3. Data set combponents 35
FIGURE 1. Infrastructure mode of WLAN system 18
FIGURE 2. DCF mechanism 20
FIGURE 3. Network performance of WLAN simulation model 26
FIGURE 4. Network performance of selfish attack model 28
FIGURE 5. Network performance of jamming attack model 32
FIGURE 6. SAMM model pipeline 36
FIGURE 7. Comparative analysis of collided control packets and average throughput varying CW values 41
FIGURE 8. Performance evaluation varying number of nodes 44
FIGURE 9. Comparison of attack detection model 45