mac-layer acknowledgment as a tool to detect routing misbehavior

نویسندگان

mehdi keshavarz

department of electrical, computer & it, islamic azad university of qazvin, qazvin, iran

چکیده

the establishment as well as the survival of mobile ad-hoc networks relies on the cooperation of nodes for performing network operations such as routing and packet forwarding. in these networks, misbehaving nodes can severely degrade network’s performance by not cooperating in networking operations. in this paper, we study the issue of node misbehavior in packet forwarding. to counter this type of misbehavior, we propose a scheme based on the overhearing of mac-layer acknowledgements. our main idea centers on the exploitation of the fact that the impartial nodes within the intersection of the transmission zones of the ack-transmitter and its successor overhear the transmitted acknowledgments by these two nodes. therefore, if an ack-transmitter emits an ack for an in-transit packet, but on a timeout, no ack is sensed from its successor, acknowledging the receipt of the packet, the misbehavior of the ack-transmitter will be noticed by the impartial overhearing nodes and reported to the original data packet transmitter, i.e. to the node preceding the ack-transmitter. we have conducted a series of ns-2 simulation experiments to evaluate the performance of our scheme.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detection and Prevention of MAC Layer Misbehavior for Ad

Selfish behavior at the MAC layer can have devastating side effects on the performance of wireless networks, similar to the effects of DoS attacks. In this paper we focus on the prevention and detection of the manipulation of the backoff mechanism by selfish nodes in 802.11. We first propose an algorithm to ensure honest backoffs when at least one, either the receiver or the sender is honest. T...

متن کامل

A Statistical Approach to detect NAV Attack at MAC layer

This paper proposes and investigates a statistical approach to detect the NAV attack in MAC layer. We present simulation and analytical results showing that the NAV attack can under perform the standard 802.11 MAC protocol. Further no approach has been explicitly specified to detect this attack. This approach is a simpler method to detect NAV attack using Glomosim simulator. In this work we inv...

متن کامل

Detection and Handling of MAC Layer Misbehavior in Wireless Networks

Selfish hosts in wireless networks that fail to adhere to the MAC protocol may obtain an unfair share of the channel bandwidth. We present modifications to the IEEE 802.11 backoff mechanism to simplify detection of such selfish hosts. We also present a correction scheme for penalizing greedy misbehavior which attempts to restrict the misbehaving nodes to a fair share of the channel bandwidth. S...

متن کامل

Diagnosing and Penalizing MAC Layer Misbehavior in Wireless Networks

Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel. In this environment, selfish hosts that fail to adhere to the MAC protocol may obtain an unfair share of the channel bandwidth. For example, IEEE 802.11 requires nodes competing for access to the channel to wait for a “backoff” interval, randomly ...

متن کامل

Multivariate Control Chart for the Detection of MAC Layer Misbehavior in Mobile ad Hoc Networks

The share nature of the transmission channel in IEEE 802.11 makes the network vulnerable to several attacks like the MAC layer misbehavior which can be similar to denial of service attack. In this way cheating node by choosing smaller backoff timer attempts to increase its resources at the expense to other stations which respect the protocol. In this paper, we suggest a novel detection scheme o...

متن کامل

Performance Analysis under MAC Layer Misbehavior Attack in Mobile Ad-Hoc Networks

This work presents a multi-criteria analysis of the MAC (media access control) layer misbehavior of the IEEE (Institute of Electrical and Electronics Engineers) 802.11 standard, whose principle is to cheat at the protocol to increase the transmission rate by greedy nodes at the expense of the other honest nodes. In fact, IEEE 802.11 forces nodes for access to the channel to wait for a back off ...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
journal of computer and robotics

جلد ۳، شماره ۲، صفحات ۹۵-۱۰۲

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023