CFP last date
20 December 2024
Reseach Article

Identifying and Averting the MAC Layer Misbehavior in AD-HOC Networks

by Mary Cherian, Nikita Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 143 - Number 7
Year of Publication: 2016
Authors: Mary Cherian, Nikita Singh
10.5120/ijca2016910261

Mary Cherian, Nikita Singh . Identifying and Averting the MAC Layer Misbehavior in AD-HOC Networks. International Journal of Computer Applications. 143, 7 ( Jun 2016), 41-45. DOI=10.5120/ijca2016910261

@article{ 10.5120/ijca2016910261,
author = { Mary Cherian, Nikita Singh },
title = { Identifying and Averting the MAC Layer Misbehavior in AD-HOC Networks },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2016 },
volume = { 143 },
number = { 7 },
month = { Jun },
year = { 2016 },
issn = { 0975-8887 },
pages = { 41-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume143/number7/25092-2016910261/ },
doi = { 10.5120/ijca2016910261 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:45:45.091346+05:30
%A Mary Cherian
%A Nikita Singh
%T Identifying and Averting the MAC Layer Misbehavior in AD-HOC Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 143
%N 7
%P 41-45
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The all-encompassing nature of the ad- hoc network and its design architecture in the multi-hop communication system, where trust value of the participant nodes cannot be necessarily taken for granted, is prone to selfish misbehavior by participant nodes. Therefore, the compliance of the MAC layer protocol has become pertinent to the proper functioning of the network. The optimal performance of the network and the judicious and fare usage of network resources can only be achieved by reliable and timely detection of illegitimate protocol operation. In this paper, it is envisaged that the determination factor quantifies the probability of the misbehavior whereas the trust value quantifies the probability of the well-behaved nodes. Thus, these values provide fair insight into the behavioral pattern of any ad-hoc network. The robust detection framework is, therefore implemented to timely notification of the selfish node. Here, the inherent defense mechanism is also incorporated which enhances efficiency, efficacy of the network and provides fare utilization of resources among the nodes. Proposed scheme is validated through simulation results using NS2.

References
  1. V. Gupta, S. Krishnamurthy and M. Faloutsos, “Denial of service attacks at the MAC layer in wireless ad hoc networks,” in Proc. IEEE Mil. Commun. Conf., Anaheim, CA, USA, Oct. 2002, pp. 1118-1123.
  2. M. Raya, J. Hubaux, and I. Aad, “Domino: A system to detect greedy behavior in ieee 802.11 hotspots,” in Proc. ACM 2nd Int. Conf. Mobile Syst., Appl. Serv., Boston, MA, USA, Jun. 2004, pp. 84–97.
  3. S. Radosavac, J. S. Babaras, and L. Koutsopoulos, “A framework for MAC protocol misbehavior detection in wireless networks,” in Proc. 4th ACM Workshop Wireless Security, Cologne, Germany, Sep. 2005, pp. 33–42.
  4. J. Konorski, “Multiple access in ad-hoc wireless lans with nonco- operative stations,” in Proc. 2nd Netw. Conf., 2002, pp. 1141–1146.
  5. P. Kyasanur and N. Vaidya, “Selfish MAC layer misbehavior in wireless network,” IEEE Trans. Mobile Comput., vol. 4, no. 5, pp. 502–516, Sep. 2005.
  6. Asad Ali, “Improving the performance of the IEEE 802.11 Distributed Coordination Function”, in International Journal of Computer and Communication Engineering, vol. 2, no. 1, pp. 16-19, 2013.
  7. Behrouza A Forouzan and Sophia Chung Fegan,”Wireless LANs”, in Data Communications and Networking, 4th edi. New York: McGraw-Hill, 2007, pp. 424–425.
  8. Ming Li, Sergio Salinas, Pan Li, Jinyuan Sun and Xiaoxia Huang, “MAC layer selfish misbehavior in IEEE 802.11 ad hoc networks: detection and defense”, in IEEE transactions on mobile computing, vol. 14, no. 6, pp. 1206–1210, 2015.
  9. T. W. Anderson and D. A. Darling, “Asymptotic theory of certain ‘Goodness of Fit’ criteria based on stochastic processes,” Ann. Math. Stat., vol. 23, no. 2, pp. 193–212, 1952.
Index Terms

Computer Science
Information Sciences

Keywords

Ad-hoc networks selfish misbehavior MAC layer determination factor trust value.