期刊文献+

A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks 被引量:4

A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks
原文传递
导出
摘要 Medium access control (MAC) protocols such as IEEE 802.11 are used in wireless networks for sharing of the wireless medium. The random nature of the protocol operation together with the inherent difficulty of monitoring in the open poses significant challenges. All nodes are expected to comply with the protocol rules. But, some nodes in order to gain greater benefits misbehave by not complying with the rules. One such selfish misbehavior is waiting for smaller back-off intervals when compared to the other nodes in the same subnet. Such selfish misbehavior is being tackled in this paper. A diagnosis scheme and a penalty scheme are being proposed for overcoming such selfish-misbehavior at MAC layer of mobile ad hoc networks which could be extended to other types of networks also. Medium access control (MAC) protocols such as IEEE 802.11 are used in wireless networks for sharing of the wireless medium. The random nature of the protocol operation together with the inherent difficulty of monitoring in the open poses significant challenges. All nodes are expected to comply with the protocol rules. But, some nodes in order to gain greater benefits misbehave by not complying with the rules. One such selfish misbehavior is waiting for smaller back-off intervals when compared to the other nodes in the same subnet. Such selfish misbehavior is being tackled in this paper. A diagnosis scheme and a penalty scheme are being proposed for overcoming such selfish-misbehavior at MAC layer of mobile ad hoc networks which could be extended to other types of networks also.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第3期472-481,共10页 计算机科学技术学报(英文版)
关键词 WLANS MAC layer DCF CONTENTION BACKOFF WLANs, MAC layer, DCF, contention, backoff
  • 相关文献

参考文献17

  • 1Moscibroda T, Wattenhofer R. The complexity of connectivity in wireless networks. In Proc. IEEE INFOCOM, Barcelona, Spain, April 23-29, 2006, pp.1-3.
  • 2Alberto Lopez Toledo, Xiaodong Wang. Robust detection of selfish misbehavior in wireless networks. IEEE Journal on Selected Areas in Communications, August 2007, 25(6): 1124-1134.
  • 3Lopez Toledo A, Vercauteren T, Wang X. Adaptive optimization of IEEE 802.11 DCF based on Bayesian estimation of the number of competing terminals. IEEE Transaction on Mobile Computing, Nov. 2006, 5(9): 1283-1296.
  • 4Li M, Prabhakaran B. MAC Layer Admission Control and Priority Re-Allocation for Handling QoS Guarantees in Non- Cooperative Wireless LANs Mobile Networks and Applications. Springer Science & Business Media, Inc., 2005, pp.947- 959.
  • 5Jin Y, Kesidis G. Distributed contention window control for selfish users in IEEE 802.11 wireless LANs. IEEE Journal on Selected Areas in Communications, August 2007, 25(6): 1113-1123.
  • 6Lopez Toledo A, Wang X. A robust Kolmogorov-Smirnov detector for misbehavior in IEEE 802.11 DCF. In Proc. IEEE International Conference on Communications (ICC'O), Glasgow, UK, June 24-28, 2007, pp.1564-1569.
  • 7Chen L, Leneutre J. Selfishness, not always a nightmare: Modeling selfish MAC behaviors in wireless mobile ad hoc networks. In Proc. the 27th International Conference on Dis- tributed Computing Systems (ICDCS'09), Toronto, Canada, June 25-29, 2007, p.16.
  • 8Jang-Won Lee, Ao Tang, Jianwei Huang, Mung Chiang, A Robert Calderbank. Reverse-engineering MAC: A non- cooperative game model. IEEE Journal on Selected Areas in Communications, August 2007, 25(6): 1135-1147.
  • 9Venkata Nishanth Lolla, Lap Kong Law, Srikanth V Krishnamurthy. Detecting MAC layer back-off timer violations in mobile ad hoc networks. In Proc. the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), Lisbon, Portugal, July 4-7, 2006, pp.63-73.
  • 10Kyasanur P, Vaidya N. Selfish MAC layer misbehavior in wireless networks. IEEE Transactions on Mobile Computing, September 2005.

同被引文献19

  • 1陈真勇,唐龙,唐泽圣,熊璋.以鲁棒性为目标的数字多水印研究[J].计算机学报,2006,29(11):2037-2043. 被引量:37
  • 2吴文丽,刘玉树,赵基海.一种新的混合聚类算法[J].系统仿真学报,2007,19(1):16-18. 被引量:18
  • 3谭长庚,罗文燕,陈松乔,王建新.移动Ad hoc网络中节点合作性研究综述[J].计算机科学,2007,34(4):24-27. 被引量:8
  • 4LAN/MAN Standards Committee of the IEEE Computer Society. Wireless medium access control and physical layer specifications for low-rate wireless personal area networks [ S]. Piscataway: IEEE Press, 2003.
  • 5LI H P, MAO J L, GUO N, et al. Study on throughput of network with selfish nodes based on IEEE 802.15.4 [ C]// Advanced Re- search on Computer Education, Simulation and Modeling. Berlin: Springer, 2011:411-417.
  • 6CAGALJ M, GANERIWAL S, AAD I, et al. On selfish behavior in CSMA/CA networks [ C]// INFOCOM 2005: Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communi- cations Societies. Washington, DC: IEEE Computer Society, 2005: 2513 - 2524.
  • 7KYASANUR P, VAIDYA N. Detection and handling of MAC layer misbehavior in wireless networks [ C]//Proceedings of the 2003 In- ternational Conference on Dependable Systems and Networks. Wash-ington, DC: IEEE Computer Society, 2003:173-182.
  • 8RADOSAVAC S, BARAS J S, KOUTSOPOULOS I. A framework for MAC protocol misbehavior detection in wireless networks [ C]// Proceedings of the 4th ACM Workshop on Wireless Security. New York: ACM Press, 2005:33-42.
  • 9刘春风.IEEE802.11无线AdHoc网络MAC层自私行为研究[D].天津:天津大学,2008.
  • 10柯志亨,程荣祥.NS仿真实验--多媒体和无线网络通信[M].北京:电子工业出版社,2009.

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部