A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks

被引:11
|
作者
Shi, Fei [1 ]
Baek, Jaejong [1 ]
Song, Jooseok [1 ]
Liu, Weijie [2 ]
机构
[1] Yonsei Univ, Dept Comp Sci, Seoul 120749, South Korea
[2] Yonsei Univ, Dept Informat & Ind Engn, Seoul 120749, South Korea
基金
新加坡国家研究基金会;
关键词
MAC; Trust management; Misbehavior avoidance; Ad hoc network;
D O I
10.1007/s11235-011-9552-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The characteristics of ad hoc networks, such as the absence of infrastructure, dynamic topology, shared wireless medium and resource-constrained environment pose various security challenges. Most of the previous research focused on the detection of the misbehavior after it occurred. However, in this paper we propose a new way of thinking to evade the occurrence of misbehavior. In our scheme, Local Most Trustworthy node (LMT node) is allowed to assign the backoff values to originator, rather than permitting the originator to choose the backoff values by itself. With this MAC layer misbehavior avoidance mechanism, the misuse of the backoff in MAC layer in 802.11 DCF can be prevented.
引用
收藏
页码:2397 / 2406
页数:10
相关论文
共 50 条
  • [1] A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks
    Fei Shi
    Jaejong Baek
    Jooseok Song
    Weijie Liu
    [J]. Telecommunication Systems, 2013, 52 : 2397 - 2406
  • [2] MAC-Layer Selfish Misbehavior in IEEE 802.11 Ad Hoc Networks: Detection and Defense
    Li, Ming
    Salinas, Sergio
    Li, Pan
    Sun, Jinyuan
    Huang, Xiaoxia
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (06) : 1203 - 1217
  • [3] A Novel Reaction Scheme against the MAC Layer Misbehavior in Mobile Ad Hoc Networks
    El Houssaini, Mohammed-Alamine
    Aaroud, Abdessadek
    El Hore, Ali
    Ben-Othman, Jalel
    [J]. 7TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2016)/THE 6TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2016), 2016, 98 : 64 - 71
  • [4] MAC Layer Misbehavior on Ad Hoc Networks
    Nagel, Nicole R.
    Shokranian, Ruzbeh
    Bordim, Jacir L.
    Nakano, K.
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 538 - +
  • [5] MAC Layer Misbehavior on Ad Hoc Networks
    Nagel, N.
    Shokranian, R.
    Bordim, J. L.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (11): : 1 - 7
  • [6] Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
    Radosavac, S.
    Cardenas, Alvaro A.
    Baras, John S.
    Moustakides, George V.
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (01) : 103 - 128
  • [7] Vulnerability assessment of ad hoc networks to MAC layer misbehavior
    Guang, Lei
    Assi, Chadi
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2007, 7 (06): : 703 - 715
  • [8] Prevent-Scan: A Novel MAC Layer Scheme For The IEEE 802.11 Handoff
    Rebai, A. R.
    Haddar, B.
    Hanafi, S.
    [J]. 2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS 2009), 2009, : 540 - +
  • [9] Misbehavior analysis of IEEE 802.11 MAC layer in mobile ad hoc network using stochastic reward nets
    Tabari, Meisam Yadollahzadeh
    Pouyan, Ali A.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
  • [10] A new predictive approach for the MAC layer misbehavior in IEEE 802.11 networks
    El Houssaini, Mohammed-Alamine
    Nabou, Abdellah
    Hadir, Abdelali
    El Houssaini, Souad
    El Kafi, Jamal
    [J]. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2024, 20 (02) : 240 - 261