Analysis and Simulation of MAC Layer Misbehavior in Mobile Ad-Hoc Networks

被引:0
|
作者
Houssaini, Mohammed-Alamine Ei [1 ]
Aaroud, Abdessadek [1 ]
El Hore, Ali [1 ]
Ben-Othman, Jalel [2 ]
机构
[1] Chouaib Doukkali Univ, Fac Sci, Dept Comp Sci, El Jadida, Morocco
[2] Paris 13 Univ, Dept Comp Sci, Galilee Inst, Paris, France
关键词
Mobile ad-hoc networks; MAC IEEE 802.11; misbehavior; ns2; simulations;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents an analysis and simulation of the MAC layer misbehavior of the IEEE 802.11 standard, whose the principle is cheating at the protocol level to increase the transmission rate by greedy nodes to the detriment of other honest nodes. First the standard and its MAC layer are recalled. Secondly, a state of art on the research undertaken on misbehavior of the IEEE 802.11 Standard are presented. Then the results of simulation on a critical type of deterministic cheating (no Backoff) are given and analysed. We simulate the impact of the problem of greedy behavior on receiving, and analyze two crucial metrics of this misbehavior which can be adopted for the development of a detection/reaction strategy.
引用
收藏
页码:50 / 54
页数:5
相关论文
共 50 条
  • [31] MAC schemes for ad-hoc wireless networks
    Loscri, V.
    [J]. 2007 IEEE 66TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, 2007, : 36 - 40
  • [32] A MAC Protocol based on Flexible RWT for Underwater Mobile Ad-hoc Networks
    Lee, Jin-Young
    Yun, Nam-Yeol
    Shin, Seung-Won
    Park, Soo-Hyun
    Muminov, Sardorbek
    Kim, Changhwa
    [J]. 2013 MTS/IEEE OCEANS - BERGEN, 2013,
  • [33] MAC-Layer Selfish Misbehavior in IEEE 802.11 Ad Hoc Networks: Detection and Defense
    Li, Ming
    Salinas, Sergio
    Li, Pan
    Sun, Jinyuan
    Huang, Xiaoxia
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (06) : 1203 - 1217
  • [34] Misbehavior detection in clustered ad-hoc networks with central control
    Vassilaras, S
    Vogiatzis, D
    Yovanof, GS
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 687 - 692
  • [35] Data Verification and Misbehavior Detection in Vehicular Ad-hoc Networks
    Ghaleb, Fuad A.
    Zainal, Anazida
    Rassam, Murad A.
    [J]. JURNAL TEKNOLOGI-SCIENCES & ENGINEERING, 2015, 73 (02):
  • [36] Virtual Mobile Ad-hoc Networks
    Lahav, Jonathan
    Stulman, Ariel
    [J]. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013), 2013, : 433 - 434
  • [37] Benefits of the IEEE 802.15.4's MAC Layer Acknowledgements in Ad-Hoc Networks: an Experimental Analysis
    Farooq, Muhammad Omer
    Kunz, Thomas
    [J]. 2016 INTERNATIONAL CONFERENCE ON SELECTED TOPICS IN MOBILE & WIRELESS NETWORKING (MOWNET), 2016, : 220 - 226
  • [38] Ad-hoc, mobile, and wireless networks
    Palattella, Maria Rita
    Scanzio, Stefano
    [J]. INTERNET TECHNOLOGY LETTERS, 2021, 4 (04)
  • [39] Mobile and ad-hoc local networks
    Hassanein, H
    Nikolaidis, I
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 41 (03): : 285 - 287
  • [40] Security in Mobile Ad-Hoc Networks
    Athulya, M. S.
    Sheeba, V. S.
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,