期刊文献+

Performance Analysis under MAC Layer Misbehavior Attack in Mobile Ad-Hoc Networks

Performance Analysis under MAC Layer Misbehavior Attack in Mobile Ad-Hoc Networks
下载PDF
导出
摘要 This work presents a multi-criteria analysis of the MAC (media access control) layer misbehavior of the IEEE (Institute of Electrical and Electronics Engineers) 802.11 standard, whose principle is to cheat at the protocol to increase the transmission rate by greedy nodes at the expense of the other honest nodes. In fact, IEEE 802.11 forces nodes for access to the channel to wait for a back off interval, randomly selected from a specified range, before initiating a transmission. Greedy nodes may wait for smaller back-off intervals than honest nodes, and then obtaining an unfair assignment. In the first of our works a state of art on the research on IEEE 802.11 MAC layer misbehavior are presented. Then the impact of this misbehavior at the reception is given, and we will generalize this impact on a large scale. An analysis of the correlation between the throughput and the inter-packets time is given. Afterwards, we will define a new metric for measuring the performance and capability of the network.
出处 《Computer Technology and Application》 2015年第1期37-44,共8页 计算机技术与应用(英文版)
关键词 Mobile ad-hoc networks MAC IEEE 802.11 misbehavior ns2 simulations. 性能分析 MAC层 行为 移动Ad 网络 攻击 IEEE 媒体访问控制
  • 相关文献

参考文献10

  • 1IEEE Standards Association. 2012. "IEEE 802.11 Standard for Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY) Specifications." IEEE Standards Association (March): 818-40.
  • 2Gupta, V., Krishnamurthy, S., and Faloutsos, M. 2002. "Denial of Service Attacks at the Mac Layer in Wireless Ad Hoc Networks." Presented at IEEE M1LCOM, Anaheim, California.
  • 3Tiwary, O. N. 2012. "Detection of Misbehaviour at MAC Layer in Wireless Networks." International Journal of Scientific and Engineering Research 3 (5), May: 909-12.
  • 4Han, Y., Seok, S., Song, W., Choi, D., and Huh, J. 2013. "Detection of Greedy Nodes in Wireless LAN through Comparing of Probability Distributions of Transmission Intervals." International Journal of Multimedia and Ubiquitous Engineering 8 (1), January: 175.
  • 5Cardenas, A. A., Radosavac, S., and Baras, J. S. 2004. "Detection and Prevention of MAC Layer Misbehavior in Ad Hoc Networks." In Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 17-22.
  • 6Hamieh, A., Ben-Othman, J., Gueroui, A., and Na'/t-Abdesselam, F. 2009. "Detecting Greedy Behaviors by Linear Correlation in Wireless Ad Hoc Networks." Presented at the IEEE International Conference on Communications (1EEE ICC), Dresden, Germany.
  • 7Raya, M., Hubaux, J. P., and Aad, 1. 2006. "DOMINO Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots." IEEE Transaction Mobile Computing 5 (12) 1691-705.
  • 8Information Sciences Institute. 1995. "The Network Simulator -ns-2." Information Sciences Institute. Accessed July 10, 2015. http://www.isi.edu/nsnam/ns/.
  • 9El Houssaini, M., Aaroud, A., Elhore, A., and Ben-Othman, J. 2014. "Analysis and Simulation of MAC Layer Misbehavior in Mobile Ad-Hoc Networks." In Proceedings of the 5th International Workshop on Codes, Cryptography and Communication Systems, 10.
  • 10Douglas Montgomery, C. 2008. Introduction to Statistical Quality Control, 6th ed. United States of America: John Wiley & Sons, Inc.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部