Browse Technical Reports - Electrical and Computer Engineering by Subject "network security"

  • Kim, Dongho; Chiang, Jerry T.; Hu, Yih-Chun; Perrig, Adrian; Kumar, P.R. (2010-09)
    Congestion control algorithms seek to optimally utilize network resources by allocating a certain rate for each user. However, malicious clients can disregard the congestion control algorithms and induce congestion at ...

    application/pdf

    application/pdfPDF (250kB)
  • Chang, Sang-Yoon; Hu, Yih-Chun (2010-08-09)
    In reservation-based MAC protocols, adversaries that have compromised a node can perform an efficient denial-of service attack by sending excessive reservation requests. Attackers, having thus prevented legitimate users ...

    application/pdf

    application/pdfPDF (702kB)