Skip to main content

Selfish MAC Layer Misbehavior Detection Model for the IEEE 802.11-Based Wireless Mesh Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4847))

Abstract

CSMA/CA, the contention mechanism of the IEEE 802.11 DCF medium access protocol, has recently been found vulnerable to selfish attacks. Such attacks can greatly increase a selfish station’s bandwidth share at the expense of honest stations. Based on the in-depth research of the attack model of selfish behavior in WMN, the attack strategy of smart selfish nodes was focused, analyzed and according to its characteristics, a double-mode detection mechanism was proposed. The one mode is selfish attack detection to sequential data; the other is attack detection to non-sequential data transmission ground on statistics. Subsequently the selfish behavior detection model was proposed with the double-mode detection mechanism, which was finally simulated in ns-2. The simulation results indicated that the new selfish behavior detection model which used the double-mode detection mechanism is preferably adapt to the selfish attack behavior and can commendably solve the problem of smart selfish nodes in WMN.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Guang, L., Assi, C.: Modeling and Analysis of Predictable Random Backoff in Selfish Environment. In: MSWiM 2006, Terromolinos, Malaga Spain, October 2–6, 2006, pp. 86–90 (2006)

    Google Scholar 

  2. Guang, L., Assi, C.: Mitigating smart selfish MAC misbehavior in ad hoc networks. In: Proc. IEEE WiMob (June 2006)

    Google Scholar 

  3. Kyasanur, P., Vaidya, N.H.: Detection and Handling of MAC Layer Misbehavior in Wireless Networks. In: Proc. 2003 Int’l Conf. Dependable Systems and Networks, pp. 173–182 (2003)

    Google Scholar 

  4. Djenouri, D., Khelladi, L., Badache, A.N.: A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks, Communications Surveys & Tutorials, IEEE, Vol. Communications Surveys & Tutorials 7(4), 2–28 (2005)

    Article  Google Scholar 

  5. Kyasanur, P., Vaidya, N.: Selfish MAC layer misbehavior in wireless networks. IEEE Transactions on Mobile Computing (September 2005)

    Google Scholar 

  6. Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: real vulnerabilities and practical solutions, In: Proc. USENIX Security Symp., Washington DC, pp. 15–28 (August 2003)

    Google Scholar 

  7. Kyasanur, P., Vaidya, N.H.: Detection and handling of MAC layer misbehavior in wireless networks. In: Proc. Int. Conf. Dependable Systems and Networks, San Francisco, CA, pp. 173–182 (June 2003)

    Google Scholar 

  8. Raya, M., Hubaux, J.-P., Aad, I.: DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots. In: Proc. MobiSys, Boston, MA, pp. 84–97 (June 2004)

    Google Scholar 

  9. Cagalj, M., Ganeriwal, S., Aad, I., Hubaux, J.-P.: On selfish behavior in CSMA/CA networks. In: Proc. IEEE INFOCOM 2005, Miami, FL, pp. 1514–2513 (March 2005)

    Google Scholar 

  10. Radosavac, S., Baras, J.S.: A Framework for MAC Protocol Misbehavior Detection in Wireless Networks. In: Ngu, A.H.H., Kitsuregawa, M., Neuhold, E.J., Chung, J.-Y., Sheng, Q.Z. (eds.) WISE 2005. LNCS, vol. 3806, pp. 33–42. Springer, Heidelberg (2005)

    Google Scholar 

  11. Konorski, J.: A Game-Theoretic Study of CSMA/CA Under a Backoff Attack. IEEE/ACM Transactions on Networking 14(6), 1167–1177 (2006)

    Article  Google Scholar 

  12. Aad, I., Hubaux, J.P., Knightly, E.W.: Denial of service resilience in ad hoc networks. In: Proceedings of ACM MobiCom (September 2004)

    Google Scholar 

  13. Gupta, V., Krishnamurthy, S., Faloutsous, M.: Denial of service attacks at the MAC layer in wireless ad hoc networks. In: Proc. of MILCOM (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ming Xu Yinwei Zhan Jiannong Cao Yijun Liu

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, H., Xu, M., Li, Y. (2007). Selfish MAC Layer Misbehavior Detection Model for the IEEE 802.11-Based Wireless Mesh Networks. In: Xu, M., Zhan, Y., Cao, J., Liu, Y. (eds) Advanced Parallel Processing Technologies. APPT 2007. Lecture Notes in Computer Science, vol 4847. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76837-1_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-76837-1_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-76836-4

  • Online ISBN: 978-3-540-76837-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics