A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks

被引:8
作者
Gunasekaran, Raja [1 ]
Uthariaraj, Vaidheyanathan Rhymend [2 ]
Yamini, Uamapathy [1 ]
Sudharsan, Rajagopalan [1 ]
Priyadarshini, Selvaraj Sujitha [1 ]
机构
[1] Anna Univ, Dept Informat Technol, Madras 600044, Tamil Nadu, India
[2] Anna Univ, Ramanujan Comp Ctr, Chennai 600025, Tamil Nadu, India
关键词
WLANs; MAC layer; DCF; contention; back off;
D O I
10.1007/s11390-009-9238-z
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Medium access control (MAC) protocols such as IEEE 802.11 are used in wireless networks for sharing of the wireless medium. The random nature of the protocol operation together with the inherent difficulty of monitoring in the open poses significant challenges. All nodes are expected to comply with the protocol rules. But, some nodes in order to gain greater benefits misbehave by not complying with the rules. One such selfish misbehavior is waiting for smaller back-off intervals when compared to the other nodes in the same subnet. Such selfish misbehavior is being tackled in this paper. A diagnosis scheme and a penalty scheme are being proposed for overcoming such selfish-misbehavior at MAC layer of mobile ad hoc networks which could be extended to other types of networks also.
引用
收藏
页码:472 / 481
页数:10
相关论文
共 19 条
[1]  
Cardenas AlvaroA., 2004, DETECTION PREVENTION
[2]  
CHEN L, 2007, P 27 IEEE ICDCS 07 T, P16
[3]  
FALL K, 2003, NS NOTES DOCUMENTATI
[4]   Charge sensitive and incentive compatible end-to-end window-based control for selfish users [J].
Jin, YM ;
Kesidis, G .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (05) :952-961
[5]   Distributed contention window control for selfish users in IEEE 802.11 wireless LANs [J].
Jin, Youngmi ;
Kesidis, George .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2007, 25 (06) :1113-1123
[6]  
Konorski J., 2002, NETWORKING 2002. Networking Technologies, Services, and Protocols
[7]  
Performance of Computer and Communication Networks
[8]  
Mobile and Wireless Communications. Second International IFIP-TC6 Networking Conference. Proceedings (Lecture Notes in Computer Science Vol.2345), P1141
[9]  
KYASANUR P, 2005, IEEE T MOBILE CO SEP
[10]   Reverse-engineering MAC: A non-cooperative game model [J].
Lee, Jang-Won ;
Tang, Ao ;
Huang, Jianwei ;
Chiang, Mung ;
Calderbank, A. Robert .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2007, 25 (06) :1135-1147