Marek Natkaniec

ORCID: 0000-0002-8230-773X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Networks and Protocols
  • Mobile Ad Hoc Networks
  • Advanced Wireless Network Optimization
  • Cooperative Communication and Network Coding
  • Bluetooth and Wireless Communication Technologies
  • Power Line Communications and Noise
  • Wireless Communication Networks Research
  • Opportunistic and Delay-Tolerant Networks
  • Internet Traffic Analysis and Secure E-voting
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced MIMO Systems Optimization
  • Network Security and Intrusion Detection
  • Smart Grid Security and Resilience
  • Network Traffic and Congestion Control
  • Transportation Systems and Safety
  • Energy Efficient Wireless Sensor Networks
  • Wireless Communication Security Techniques
  • Vehicular Ad Hoc Networks (VANETs)
  • Video Coding and Compression Technologies
  • Advanced Data Compression Techniques
  • Renewable energy and sustainable power systems
  • Advanced Steganography and Watermarking Techniques
  • Software-Defined Networks and 5G
  • Advanced Wireless Communication Techniques
  • Caching and Content Delivery

AGH University of Krakow
2016-2025

Jagiellonian University
2009-2025

Atlantic General Hospital
2012

Auerbach Associates (United States)
2009

National Tsing Hua University
2009

University of Science and Technology
2007

Alexandria University
2005

Texas Instruments (United States)
2003

Ritsumeikan University
2002

Institute of Metallurgy and Materials Science
1998-2002

In this survey we attempt to describe the Quality of Service (QoS) mechanisms employed by Medium Access Control (MAC) protocols designed for ad-hoc networks. We begin with background information: an overview related work, definition QoS and QoS-related metrics, a general description contention-free contention-based wireless networks, discussion issues affecting provisioning in as well novel classification mechanisms. Then, each mechanism is briefly explained implementation examples from...

10.1109/surv.2012.060912.00004 article EN IEEE Communications Surveys & Tutorials 2012-10-16

The purpose of this paper is to design and implement a complete system for monitoring detecting attacks anomalies in 5G wireless local area networks. Regrettably, the development most open source systems has been stopped, making them unable detect emerging forms threats. provides modular framework create add new detection rules as emerge. based on packet analysis modules incorporates machine learning models enhance its efficiency. use rule-based establishes strong basis identification...

10.3390/electronics12112355 article EN Electronics 2023-05-23

A smart grid constitutes an electrical infrastructure that integrates communication technologies to optimize electricity production, distribution, and consumption. Within the grid, IEEE 802.11 networks play a crucial role in facilitating between meters data collectors, operating within shared transmission medium. However, notable challenge arises due lack of certainty regarding genuine identity recipients. In response, we present solution—a novel covert channel leveraging backoff...

10.3390/en17030716 article EN cc-by Energies 2024-02-02

Smart grids are continuously evolving, incorporating modern technologies such as Wi-Fi, Zigbee, LoRaWAN or BLE. Wi-Fi commonly used to transmit data from measurement systems, distribution control and monitoring well network protection systems. However, since networks primarily operate on unlicensed frequency bands, this introduces significant security risks for sensitive transmission. In paper, we propose a novel highly efficient covert channels that utilize IEEE 802.11 Enhanced Distributed...

10.3390/en18020330 article EN cc-by Energies 2025-01-13

This paper presents a simulation analysis of the backoff mechanism presented in IEEE 802.11 standard. The obtained simulations allow us to determine effective throughput and mean packet delay versus offered load for different values contention window parameter number contending stations. choice CWmin CWmax parameters was analyzed. In particular, value dependence transmitting stations presented. results show that proper CW has substantial influence on network performance.

10.1109/iscc.2000.860678 article EN 2002-11-07

This paper presents an analysis of the IEEE 802.11ax networks' coexistence with legacy stations, namely 802.11ac, 802.11n, and 802.11a. The standard introduces several new features that can enhance network performance capacity. devices do not support these will continue to coexist newer devices, creating a mixed environment. usually leads deterioration in overall such networks; therefore, paper, we want show how reduce negative impact devices. In this study, investigate networks by applying...

10.3390/s23104964 article EN cc-by Sensors 2023-05-22

Current advancements within the WiFi domain, such as network densification, traffic offloading, and IoT support, pave way for increased user operator satisfaction with future (5G beyond) deployments. However, without seamless coexistence of novel legacy devices well between heterogeneous networks, goal ubiquitous effortless wireless access may be delayed. In this article, we identify several use cases based on current trends in research community developments IEEE 802.11 analyze...

10.1109/mnet.2017.1500284 article EN IEEE Network 2017-07-01

Wireless Local Area Networks (WLANs) have revolutionized modern communication by providing a user-friendly and cost-efficient solution for Internet access network resources. However, the increasing popularity of WLANs has also led to rise in security threats, including jamming, flooding attacks, unfair radio channel access, user disconnection from points, injection among others. In this paper, we propose machine learning algorithm detect Layer 2 threats through traffic analysis. Our approach...

10.3390/s23125507 article EN cc-by Sensors 2023-06-12

Two amendments to IEEE 802.11 have recently been published: 802.11aa and 802.11ae. Both enhance Quality of Service (QoS) provisioning in Wi-Fi networks by providing support for multicast transmission, enhanced audio video streaming, coping with inter-network interference, improved prioritization management frames. The proposed solutions either extend mechanisms already existing the standard or introduce new ones. Therefore, it is important researchers understand functionalities. To this end...

10.1109/mnet.2013.6678933 article EN IEEE Network 2013-11-01

The paper elaborates on how text analysis influences classification—a key part of the spam-filtering process. authors propose a multistage meta-algorithm for checking classifier performance. As result, algorithm allows fast selection best-performing classifiers as well higher-dimensionality data. last aspect is especially important when analyzing large datasets. approach cross-validation between different datasets supervised learning applied in meta-algorithm. Three machine-learning methods...

10.3390/electronics10172083 article EN Electronics 2021-08-27

The protection of users ICT networks, including smart grids, is a challenge whose importance constantly growing. Internet Things (IoT) or Energy (IoE) devices, as well network resources, store more and information about users. Large institutions use extensive security systems requiring large expensive resources. For grid users, this becomes difficult. Efficient methods are needed to take advantage limited sets traffic features. In paper, machine learning techniques verify events for...

10.3390/en16010329 article EN cc-by Energies 2022-12-28

Current Internet use is evolving, users are becoming mobile and expecting data services on the go. This fact presents big challenges opportunities to operators, which see increase in as a market still be exploited. However, current cellular technologies cannot accommodate demand that will arise when true Mobile evolves. Addressing these challenges, we present CARMEN project, vision of extend operators’ infrastructure by providing carrier grade through heterogeneous wireless mesh. The...

10.1109/pimrc.2008.4699961 article EN 2008-09-01

Abstract In this paper, we suggest the use of chi‐square test for detecting backoff misbehaviour in IEEE 802.11 EDCA networks. A performance evaluation is performed to compare with two other methods, known literature. To perform a suitable comparison, these methods are extended support and BEB mechanism. We assume model, which can be easily executed by selfish user. show that outperforms terms probability detection time required positively identify misbehaving node. Copyright © 2010 John...

10.1002/ett.1459 article EN European Transactions on Telecommunications 2010-11-30

A new analytical model of enhanced distributed channel access (EDCA) which builds on an existing comprehensive is presented. The implements virtual collisions and combines the advantages both accurate backoff countdown arbitration inter-frame space (AIFS) differentiation. correctness evaluated by comparison with ns-2 simulations two previous models. gives very good results.

10.1049/el.2011.0693 article EN Electronics Letters 2011-07-06

10.1109/mcom.2003.1179493 article EN IEEE Communications Magazine 2003-02-01

We present a novel model of IEEE 802.11 EDCA with support for analysing networks misbehaving nodes. In particular, we consider backoff misbehaviour. Firstly, verify the by extensive simulation analysis and comparing it to three other models. The results show that our behaves satisfactorily outperforms widely acknowledged Secondly, comparison in several scenarios nodes proves performs correctly these scenarios. proposed can, therefore, be considered as an original contribution area models

10.1155/2010/209895 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2010-11-14

Audio-video streaming in Wi-Fi (IEEE 802.11) wireless local area networks (WLANs) has recently attracted a lot of attention. In order to increase the granularity traffic prioritization and quality service (QoS) support defined by EDCA, intra-access category been introduced IEEE 802.11aa amendment. this paper, we present novel results which show how new mechanism impacts performance an access point (AP). Additionally, propose credit-based shaper algorithm (WCBSA), version CBSA adjusted...

10.1109/iscc.2014.6912499 article EN 2022 IEEE Symposium on Computers and Communications (ISCC) 2014-06-01

The rising interest in the security of network infrastructure, including edge devices, Internet Things, and smart grids, has led to development numerous machine learning-based approaches that promise improvement existing threat detection solutions. Among popular methods ensuring cybersecurity is use data science techniques big analyse online threats current trends. One important factor these can identify trends, attacks, events are invisible or not easily detectable even a administrator....

10.3390/en16124632 article EN cc-by Energies 2023-06-10

Vendors implement the MAC address randomization technique to prevent IEEE 802.11 client station devices from being tracked. Although it conceals device identity, cannot hide its occurring data transmission. This paper presents a novel covert channel that leverages create transmission inside networks. The secret are disposable random generated by as part of probe request frame while scanning network. concept channel, implementation, and performance metrics. study covers diverse scenarios,...

10.3390/app13148000 article EN cc-by Applied Sciences 2023-07-08

Through time domain observation, typical wireless signal strength values seems to exhibit some forms of mean-reverting and discontinuous "jumps" behaviour. Motivated by this fact, we propose a link prediction triggering (LPT) technique using modified Ornstein–Uhlenbeck (OU) jump diffusion process. The proposed which refer as OU-LPT is an integral component mesh network monitoring system developed ICT FP7 CARrier grade MEsh Network project. In particular, demonstrate how can be applied in the...

10.1007/s11276-013-0610-0 article EN cc-by Wireless Networks 2013-07-01

The ongoing evolution of network softwarization is particularly evident in mobile networks. 5G standard defines core functions as discrete processes, facilitating seamless virtualization. next crucial step to enable cloud-based deployments independent specific hardware and hypervisors. In this work, we propose a testbed designed for deployment. Our primary objective create an environment conducive experimenting with future research domain. We rigorously verified the deployment’s correctness,...

10.3390/app14167018 article EN cc-by Applied Sciences 2024-08-09

This paper presents a work in progress which deals with the important and unresolved problem of node misbehavior. A realistic approach is used to determine impact contention window manipulation on IEEE 802.11e ad-hoc networks. It explained why such networks are more prone Novel results pertaining standard presented. Simulation analysis done for several scenarios distinction made uplink downlink traffic. shown that misbehaving can jeopardize network performance, therefore, countermeasures...

10.1109/wcnc.2008.244 article EN IEEE Wireless Communications and Networking Conference 2008-03-01
Coming Soon ...