Browse Technical Reports - Electrical and Computer Engineering by Series/Report "UILU-ENG-2010-2509"

  • Chang, Sang-Yoon; Hu, Yih-Chun (2010-08-09)
    In reservation-based MAC protocols, adversaries that have compromised a node can perform an efficient denial-of service attack by sending excessive reservation requests. Attackers, having thus prevented legitimate users ...

    application/pdf

    application/pdfPDF (702Kb)