IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 5    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 5,May 2012
Detection Of Misbehavior at Mac Layer in Wireless Networks
Full Text(PDF, )  PP.909-912  
—MAC-misbehaviour, RTS re-transmission rate, throughput, back off value
The IEEE 802.11 CSMA/CA protocol is most commonly used MAC protocol for wireless network. This protocol is used to access the media. But IEEE 802.11 works properly only if all the stations obey the MAC protocol. Some node can substantially increase his share of bandwidth by slightly changing the parameters of MAC protocol, in order to increase their throughput. This cause throughput degradation of all well behaved node. In this paper, we proposed the detection scheme for such misbehavior at MAC layer in wireless networks.
[1] Y.-C. Hu and A. Perrig, “A survey of Secure Wireless AdHoc Routing”,IEEE Security & Privacy, Special Issue on Making Wireless Work, May/June 2004.

[2] P. Kyasanur and N. Vaidya, “Selfish MAC Layer Misbehavior in Wireless Networks,” IEEE Trans. Mobile Computing, Sept. 2005.

[3] [3] V. Gupta, S. Krishnamurthy, and M. Faloutsous, “Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks,” Proceedins of MILCOM, 2002.

[4] M. Raya, J. P. Hubaux, and I. Aad, “DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots,” IEEE Transaction Mobile Computing, 2006.

[5] J. Konorski. “Multiple access in ad hoc wireless LANs with noncooperative stations”. In NETWORKING, volume 2345 of LNCS, Springer, 2002.

[6] R. Jain, G. Babic, B. Nagendra and C. Lam, “Fairness, Call Establishment Latency and Other Performance Metrics”, Technical Report ATM Forum/96-1173, ATM Forum Document, Aug. 1996.

[7] C. He and J. C. Mitchell, “Analyzing and Improving the IEEE 802.11 MAC Protocol for Wireless LANs,” Proceedings of NDSS, Feb. 2005.

[8] A. C{rdenas, S. Radosavac, and J. S. Baras, “Detectionand Prevention of MAC Layer Misbehavior for Ad Hoc Networks,” ACM SASN, Oct. 2004.

[9] J. Bellardo and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions”,USENIX Symposium., 2003.

[10] L. Guang and C. Assi, “A Self-Adaptive Detection System for MAC Misbehavior in Ad Hoc Networks,” Proceedings of IEEE ICC, June 2006.

[11] L. Guang, C. Assi, and A. Benslimane, “Modeling and Analysis of Predictable Random Backoff in Selfish Environments,” Proc. ACM/IEEE MSWiM, Oct. 2006.

[12] S. Djahel and F. Na Abdesselam, “ FLSAC: A New Scheme to Defend Against Greedy Behavior in Wireless Mesh Networks”, International Journal of Communication Systems (IJCS), Wiley InterScience Publisher, 22(10):1245-1266, june 2009.

[13] IEEE Standards for Wireless LAN-Medium Access control and Physical Layer Specification, P802.11, 1999.

[14] NS3 home page. [Online Available] http://www.nsnam.org/.

Untitled Page