mac-layer acknowledgment as a tool to detect routing misbehavior
نویسندگان
چکیده
the establishment as well as the survival of mobile ad-hoc networks relies on the cooperation of nodes for performing network operations such as routing and packet forwarding. in these networks, misbehaving nodes can severely degrade network’s performance by not cooperating in networking operations. in this paper, we study the issue of node misbehavior in packet forwarding. to counter this type of misbehavior, we propose a scheme based on the overhearing of mac-layer acknowledgements. our main idea centers on the exploitation of the fact that the impartial nodes within the intersection of the transmission zones of the ack-transmitter and its successor overhear the transmitted acknowledgments by these two nodes. therefore, if an ack-transmitter emits an ack for an in-transit packet, but on a timeout, no ack is sensed from its successor, acknowledging the receipt of the packet, the misbehavior of the ack-transmitter will be noticed by the impartial overhearing nodes and reported to the original data packet transmitter, i.e. to the node preceding the ack-transmitter. we have conducted a series of ns-2 simulation experiments to evaluate the performance of our scheme.
منابع مشابه
Detection and Prevention of MAC Layer Misbehavior for Ad
Selfish behavior at the MAC layer can have devastating side effects on the performance of wireless networks, similar to the effects of DoS attacks. In this paper we focus on the prevention and detection of the manipulation of the backoff mechanism by selfish nodes in 802.11. We first propose an algorithm to ensure honest backoffs when at least one, either the receiver or the sender is honest. T...
متن کاملA Statistical Approach to detect NAV Attack at MAC layer
This paper proposes and investigates a statistical approach to detect the NAV attack in MAC layer. We present simulation and analytical results showing that the NAV attack can under perform the standard 802.11 MAC protocol. Further no approach has been explicitly specified to detect this attack. This approach is a simpler method to detect NAV attack using Glomosim simulator. In this work we inv...
متن کاملDetection and Handling of MAC Layer Misbehavior in Wireless Networks
Selfish hosts in wireless networks that fail to adhere to the MAC protocol may obtain an unfair share of the channel bandwidth. We present modifications to the IEEE 802.11 backoff mechanism to simplify detection of such selfish hosts. We also present a correction scheme for penalizing greedy misbehavior which attempts to restrict the misbehaving nodes to a fair share of the channel bandwidth. S...
متن کاملDiagnosing and Penalizing MAC Layer Misbehavior in Wireless Networks
Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel. In this environment, selfish hosts that fail to adhere to the MAC protocol may obtain an unfair share of the channel bandwidth. For example, IEEE 802.11 requires nodes competing for access to the channel to wait for a “backoff” interval, randomly ...
متن کاملMultivariate Control Chart for the Detection of MAC Layer Misbehavior in Mobile ad Hoc Networks
The share nature of the transmission channel in IEEE 802.11 makes the network vulnerable to several attacks like the MAC layer misbehavior which can be similar to denial of service attack. In this way cheating node by choosing smaller backoff timer attempts to increase its resources at the expense to other stations which respect the protocol. In this paper, we suggest a novel detection scheme o...
متن کاملPerformance Analysis under MAC Layer Misbehavior Attack in Mobile Ad-Hoc Networks
This work presents a multi-criteria analysis of the MAC (media access control) layer misbehavior of the IEEE (Institute of Electrical and Electronics Engineers) 802.11 standard, whose principle is to cheat at the protocol to increase the transmission rate by greedy nodes at the expense of the other honest nodes. In fact, IEEE 802.11 forces nodes for access to the channel to wait for a back off ...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
journal of computer and roboticsجلد ۳، شماره ۲، صفحات ۹۵-۱۰۲
کلمات کلیدی
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023