Performance Analysis under MAC Layer Misbehavior Attack in Mobile Ad-Hoc Networks
نویسندگان
چکیده
This work presents a multi-criteria analysis of the MAC (media access control) layer misbehavior of the IEEE (Institute of Electrical and Electronics Engineers) 802.11 standard, whose principle is to cheat at the protocol to increase the transmission rate by greedy nodes at the expense of the other honest nodes. In fact, IEEE 802.11 forces nodes for access to the channel to wait for a back off interval, randomly selected from a specified range, before initiating a transmission. Greedy nodes may wait for smaller back-off intervals than honest nodes, and then obtaining an unfair assignment. In the first of our works a state of art on the research on IEEE 802.11 MAC layer misbehavior are presented. Then the impact of this misbehavior at the reception is given, and we will generalize this impact on a large scale. An analysis of the correlation between the throughput and the inter-packets time is given. Afterwards, we will define a new metric for measuring the performance and capability of the network.
منابع مشابه
A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملMultivariate Control Chart for the Detection of MAC Layer Misbehavior in Mobile ad Hoc Networks
The share nature of the transmission channel in IEEE 802.11 makes the network vulnerable to several attacks like the MAC layer misbehavior which can be similar to denial of service attack. In this way cheating node by choosing smaller backoff timer attempts to increase its resources at the expense to other stations which respect the protocol. In this paper, we suggest a novel detection scheme o...
متن کاملDetection and Prevention of MAC Layer Misbehavior for Ad Hoc Networks
It is known that 802.11 is not resilient to selfish behavior and denial of service (DoS) attacks targeting the MAC layer. In this study, we assess the performance of the CSMA/CA scheme and investigate its efficiency with regard to security and information assurance in mobile ad hoc wireless networks. We investigate several variants of selfish node behaviors that abuse the random choice of Conte...
متن کاملImpact of MAC Layer on the Performance of Routing Protocols in Mobile Ad hoc Networks
Mobile Ad hoc Networks is an autonomous system of mobile nodes connected by multi-hop wireless links without centralized infrastructure support. As mobile communication gains popularity, the need for suitable ad hoc routing protocols will continue to grow. Efficient dynamic routing is an important research challenge in such a network. Bandwidth constrained mobile devices use on-demand approach ...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کامل