Multivariate control chart for the detection of MAC layer misbehavior in mobile ad hoc networks

被引:2
作者
El Houssaini, Mohammed-Alamine [1 ]
Aaroud, Abdessadek [1 ]
El Hore, Ali [1 ]
Ben-Othman, Jalel [2 ]
机构
[1] Chouaib Doukkali Univ, Dept Comp Sci, Fac Sci, El Jadida, Morocco
[2] Univ Paris 13, Galilee Inst, Dept Comp Sci, Paris, France
来源
7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS | 2016年 / 83卷
关键词
Mobile ad hoc network; IEEE; 802.11; MAC layer misbehavior; Statistical process control;
D O I
10.1016/j.procs.2016.04.099
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The share nature of the transmission channel in IEEE 802.11 makes the network vulnerable to several attacks like the MAC layer misbehavior which can be similar to denial of service attack. In this way cheating node by choosing smaller backoff timer attempts to increase its resources at the expense to other stations which respect the protocol. In this paper, we suggest a novel detection scheme of such attack using a multivariate control chart currently exist in industrial management with a large success. Our proposed strategy comes to replace the univariate Shewhart control chart which already exists in the literature research for the detection of greedy nodes, because it reduces the number of control chart. As we will prove by NS-2 simulations, the proposed mechanism doesn't require any modification to the 802.11 standard, it works in real time and very easy in implementation though it appears somewhat complicated because of the computation of the mean and the covariance matrix in the absence of the MAC layer misbehavior attack. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:58 / 65
页数:8
相关论文
共 15 条
[1]  
[Anonymous], APPL COMPUTING INFOR
[2]  
Bai F., 2004, WIRELESS AD HOC SENS
[3]   A tool for automating network simulation and processing tracing data files [J].
Bouras, Christos ;
Charalambides, Savvas ;
Drakoulelis, Michalis ;
Kioumourtzis, Georgios ;
Stamos, Kostas .
SIMULATION MODELLING PRACTICE AND THEORY, 2013, 30 :90-110
[4]  
Douglas Montgomery C., 2008, INTRO STAT QUALITY C
[5]  
El Houssaini M., 2015, COMPUTER TECHNOLOGY, V6, P37
[6]  
Gupta V., 2002, IEEE MILCOM AN CAL
[7]  
Han Y., 2013, IJMUE, V8, P175
[8]  
Houssaini MAE, 2014, 2014 5TH WORKSHOP ON CODES, CRYPTOGRAPHY AND COMMUNICATION SYSTEMS (WCCCS' 14), P50, DOI 10.1109/WCCCS.2014.7107918
[9]  
IEEE Standards Association, 2012, 80211 IEEE, P818
[10]  
Information Sciences Institute, 1995, NETWORK SIMULATOR NS