Detection and prevention of selfish and misbehaving nodes at MAC layer in mobile ad hoc networks

被引:0
|
作者
Gunasekaran, R. [1 ]
Uthariaraj, V. Rhymend [1 ]
Sudharsan, R. [1 ]
Priyadarshini, S. Sujitha [1 ]
Yamini, U. [1 ]
机构
[1] Anna Univ, Dept Informat, Madras 600025, Tamil Nadu, India
来源
2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4 | 2008年
关键词
ad hoc networks; mobile ad hoc networks; MAC layer; DCF; back off;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless networks all nodes contending to access the medium are supposed to follow the rules of the Medium Access Control (MAC) layer. Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use a distributed contention resolution mechanism for sharing the wireless channel. The hosts competing for access to the channel are required to wait for a "back off" interval, randomly selected from a specified range, before initiating a transmission. Selfish nodes (or misbehaving nodes) tempt to manipulate their back off parameters to gain more access to the channel, and hence have higher performance than their fair share. Here, the problem of detection of node misbehavior in the MAC layer, with the objective to provide an optimum performance is being considered. This framework captures the presence of uncertainty of attacks.
引用
收藏
页码:1857 / 1860
页数:4
相关论文
共 50 条
  • [21] Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes
    Su, Ming-Yang
    Chiang, Kun-Lin
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2010, 6221 : 253 - 260
  • [22] An auction based AODV protocol for mobile ad hoc networks with selfish nodes
    Demir, Cenker
    Comaniciu, Cristina
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 3351 - 3356
  • [23] Novel Routing Protocol for Mobile Ad hoc Networks with Selfish and Altruistic Nodes
    Kampitaki, Dimitra G.
    Economides, Anastasios A.
    2016 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MULTIMEDIA (TEMU), 2016, : 170 - 174
  • [24] Detecting Selfish Nodes and Motivating Cooperation in Mobile Ad-hoc Networks
    AbdelMohsen, Doaa
    Abdelkader, Tamer
    2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 301 - 306
  • [25] MAC layer anomaly detection in ad hoc networks
    Liu, Y
    Li, Y
    Man, H
    PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 402 - 409
  • [26] Using a cache scheme to detect selfish nodes in mobile ad hoc networks
    Liu, Hongxun
    Delgado-Frias, Jose G.
    Medidi, Sirisha
    PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INTERNET, AND INFORMATION TECHNOLOGY, 2007, : 61 - 66
  • [27] Multivariate control chart for the detection of MAC layer misbehavior in mobile ad hoc networks
    El Houssaini, Mohammed-Alamine
    Aaroud, Abdessadek
    El Hore, Ali
    Ben-Othman, Jalel
    7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 58 - 65
  • [28] A study on the prevention of sniffing nodes in mobile ad hoc networks
    Su, Ming-Yang
    Yeh, Sheng-Cheng
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (08) : 910 - 918
  • [29] ON THE OPTIMAL MAC LAYER CAPACITY OF DELAY TOLERANT MOBILE AD HOC NETWORKS WITH A FINITE NUMBER OF NODES
    Vassilaras, Spyridon
    Christou, Ioannis T.
    2011 IEEE 22ND INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2011, : 772 - 776
  • [30] Access control in ad hoc networks with selfish nodes
    Zhao, Dongmei
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (06): : 761 - 772