Detection and prevention of selfish and misbehaving nodes at MAC layer in mobile ad hoc networks

被引:0
|
作者
Gunasekaran, R. [1 ]
Uthariaraj, V. Rhymend [1 ]
Sudharsan, R. [1 ]
Priyadarshini, S. Sujitha [1 ]
Yamini, U. [1 ]
机构
[1] Anna Univ, Dept Informat, Madras 600025, Tamil Nadu, India
关键词
ad hoc networks; mobile ad hoc networks; MAC layer; DCF; back off;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless networks all nodes contending to access the medium are supposed to follow the rules of the Medium Access Control (MAC) layer. Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use a distributed contention resolution mechanism for sharing the wireless channel. The hosts competing for access to the channel are required to wait for a "back off" interval, randomly selected from a specified range, before initiating a transmission. Selfish nodes (or misbehaving nodes) tempt to manipulate their back off parameters to gain more access to the channel, and hence have higher performance than their fair share. Here, the problem of detection of node misbehavior in the MAC layer, with the objective to provide an optimum performance is being considered. This framework captures the presence of uncertainty of attacks.
引用
收藏
页码:1857 / 1860
页数:4
相关论文
共 50 条
  • [1] Detection of colluding misbehaving nodes in Mobile Ad hoc and Wireless Mesh Networks
    Graffi, Kalman
    Mogre, Parag S.
    Hollick, Matthias
    Steinmetz, Ralf
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 5097 - 5101
  • [2] New approach for selfish nodes detection in mobile ad hoc networks
    Djenouri, Djamel
    Badache, Nadjib
    2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 288 - 294
  • [3] Random feedbacks for selfish nodes detection in mobile ad hoc networks
    Djenouri, D
    Ouali, N
    Mahmoudi, A
    Badache, N
    OPERATIONS AND MANAGEMENT IN IP-BASED NETWORKS, PROCEEDINGS, 2005, 3751 : 68 - 75
  • [4] Modeling and Analysis of Connectivity in Mobile Ad Hoc Networks with Misbehaving Nodes
    Xing, Fei
    Wang, Wenye
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 1879 - 1884
  • [5] Selfish Attack Detection in Mobile Ad hoc Networks
    Ghonge, Mangesh M.
    Jawandhiya, P. M.
    Thakare, V. M.
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [6] Scenario Based Evaluation of the Impact of Misbehaving Nodes in Mobile Ad hoc Networks
    Gopalakrishnan, K.
    Uthariaraj, V. Rhymend
    FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 45 - +
  • [7] Mitigating smart selfish MAC layer misbehavior in ad hoc networks
    Guang, Lei
    Assi, Chadi
    WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 116 - +
  • [8] Advanced detection of selfish or malicious nodes in ad hoc networks
    Kargl, F
    Klenk, A
    Schlott, S
    Weber, M
    SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 152 - 165
  • [9] A Service Negotiation Model for Selfish nodes in the Mobile Ad hoc networks
    Yang, Yang
    Guo, Shao-yong
    Qiu, Xue-song
    Meng, Luo-ming
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [10] A gradual solution to detect selfish nodes in mobile ad hoc networks
    Djenouri D.
    Badache N.
    International Journal of Wireless and Mobile Computing, 2010, 4 (04) : 264 - 274