Robust mitigation of selfish misbehavior in wireless networks

被引:2
|
作者
Nobar, Sina Khoshabi [1 ]
Niya, Javad Musevi [1 ]
机构
[1] Univ Tabriz, Fac Elect & Comp Engn, Tabriz, Iran
关键词
selfish misbehavior; greedy node; MAC misbehavior; security; wireless network; MAC LAYER MISBEHAVIOR;
D O I
10.1002/sec.1141
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Medium access standards rely on complete cooperation of network nodes to provide fair access to common medium. But a selfish user can manipulate its network adapter to gain more access to valuable network resources. Existence of a selfish node in a network can severely degrade performance of well-behaved nodes. As a result, these well-behaved nodes experience drastic throughput drop and large amount of delay. In this paper, a modification to IEEE 802.11 MAC layer is proposed, which reduces the cheating possibility of the selfish node. In the proposed method, next transmitter is selected by current receiver and announced to neighbor nodes. This selection is based on channel usage ratio of neighbor nodes. The specified transmitter starts its transmission immediately after current transmission regardless of its backoff value. Main advantages of the proposed method over existing ones are its capability to mitigate various selfish misbehaviors, robustness against adaptive selfish strategies (a selfish node with ability to change its strategy to deceive security system), and high resiliency against aggressive selfish node (a node with high intention to do selfish behavior). Also, in absence of any selfish node, proposed method does not disturb normal operation of the network. If the proposed method is employed, performance of the network (in terms of throughput of well-behaved nodes and fairness) is approximately not affected in presence of selfish node. This improvement in performance metrics is illustrated by simulating various strategies for selfish node and comparing the results with similar approaches. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1772 / 1779
页数:8
相关论文
共 50 条
  • [41] An adaptive trust system for misbehavior detection in wireless sensor networks
    Saidi, Ahmed
    WIRELESS NETWORKS, 2024, 30 (04) : 2589 - 2615
  • [42] Detection, penalization and handling of misbehavior in ad hoc wireless networks
    Bora, Revoti Prasad
    Harihar, Dheeraj
    Sehrawat, Saurabh
    Recent Advances in Engineering and Computer Science 2007, 2006, 62 : 44 - 48
  • [43] Detection, penalization and handling of misbehavior in ad hoc wireless networks
    Bora, Revoti Prasad
    Harihar, Dheeraj
    Sehrawat, Saurabh
    IMECS 2006: International Multiconference of Engineers and Computer Scientists, 2006, : 949 - 953
  • [44] A Lightweight and Robust Interference Mitigation Scheme for Wireless Body Sensor Networks in Realistic Environments
    Liang, Shipeng
    Ge, Yu
    Jiang, Shengming
    Tan, Hwee Pink
    2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 1697 - 1702
  • [45] Broadcast Storm Mitigation from Unintentional Misbehavior in Vehicular Ad Hoc Networks
    Sharshembiev, Kumar
    Yoo, Seong-Moo
    Elmahdi, Elbasher
    2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2018, : 925 - 930
  • [46] A Two-Step Selfish Misbehavior Detector for IEEE 802.11-based Ad Hoc Networks
    Cao, Xianghui
    Liu, Lu
    Cheng, Yu
    Cai, Lin X.
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [47] Improved back-off algorithm for detecting misbehavior in wireless networks
    Liu, Zhi-Xin
    Zhang, Wei
    Hua, Chang-Chun
    Guan, Xin-Ping
    Kongzhi yu Juece/Control and Decision, 2009, 24 (11): : 1652 - 1656
  • [48] AIS for misbehavior detection in wireless sensor networks: Performance and design principles
    Drozda, Martin
    Schaust, Sven
    Szczerbicka, Helena
    2007 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-10, PROCEEDINGS, 2007, : 3719 - 3726
  • [49] An analytic framework for modeling and detecting access layer misbehavior in wireless networks
    Radosavac, Svetlana
    Moustakides, George
    Baras, John S.
    Koutsopoulos, Iordanis
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (04)
  • [50] Misbehavior Constraint MAC Protocol (MC-MAC) for Wireless Networks
    Ma, Yupeng
    Li, Yonggang
    Zhang, Zhizhong
    Li, Haixing
    COMMUNICATIONS AND NETWORKING, CHINACOM 2018, 2019, 262 : 656 - 664