Detection and handling of MAC layer misbehavior in wireless networks
- 22 June 2004
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 173-182
- https://doi.org/10.1109/dsn.2003.1209928
Abstract
Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mech- anisms for sharing the wireless channel. In this environ- ment, selfish hosts that fail to adhere to the MAC protocol may obtain an unfair share of the channel bandwidth. For example, IEEE 802.11 requires nodes competing for access to the channel to wait for a "backoff" interval, randomly selected from a specified range, before initiating a trans- mission. Selfish nodes may wait for smaller backoff inter- vals than well-behaved nodes, thereby obtaining an unfair advantage. We present modifications to the IEEE 802.11 protocol to simplify detection of such selfish hosts. We also present a correction scheme for penalizing selfish misbe- havior. Simulation results indicate that our detection and correction schemes are successful in handling MAC layer misbehavior.Keywords
This publication has 9 references indexed in Scilit:
- Robust congestion signalingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Detection and handling of MAC layer misbehavior in wireless networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Characterizing intrusion tolerant systems using a state transition modelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Self-organized network-layer security in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2002
- AriadnePublished by Association for Computing Machinery (ACM) ,2002
- Intrusion detection in wireless ad-hoc networksPublished by Association for Computing Machinery (ACM) ,2000
- TCP congestion control with a misbehaving receiverACM SIGCOMM Computer Communication Review, 1999
- Securing ad hoc networksIEEE Network, 1999