Vulnerability assessment of ad hoc networks to MAC layer misbehavior

被引:3
作者
Guang, Lei [1 ]
Assi, Chadi [1 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ H3G 1M8, Canada
关键词
ad hoc networks; MAC; routing; security; performance evaluation;
D O I
10.1002/wcm.391
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a new vulnerability for the IEEE 802.11 protocol and studies its impact on degrading the performance of ad hoc networks. A host that exploits this new simple, but practical, vulnerability could cause devastating effects on the proper operation of the network protocols and hence severely degrade the performance. In this work, a misbehaving node fully cooperates by forwarding packets for other nodes and completely adheres to the proper selection of backoff intervals; however, it maliciously forces the forwarding operation to fail in order to either disrupt the route discovery process or to cause damage to existing flows routed though that node. As a result, the medium around the misbehaving node will be less congested and hence the node will obtain an increased unfair access to the channel. We use network simulations to show that such malicious misbehaviors have devastating effect on demoting the network performance and disrupting the protocol functioning. Hence, necessary extensions for existing detection systems are required to mitigate the effects of these new vulnerabilities. Copyright (c) 2006 John Wiley & Sons, Ltd.
引用
收藏
页码:703 / 715
页数:13
相关论文
共 18 条
[1]  
AAD I, 2004, MOBICOM 04, P202, DOI DOI 10.1145/1023720.1023741
[2]  
[Anonymous], 2010, IEEE Standard 802.11a-1999
[3]  
Bellardo J, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P15
[4]  
CARDENAS A, 2004, SASN 04, DOI DOI 10.1145/1029102.1029107
[5]  
FALL K, 2002, XEROX PARC
[6]  
Guang L, 2005, WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, P146
[7]  
GUANG L, 2005, PE WASUN05, P160, DOI DOI 10.1145/1080803.1089981
[8]  
GUPTA V, 2002, P MILCOM OCT 7 10
[9]  
Hu Y. C., 2002, P 8 ANN INT C MOB CO, P12, DOI DOI 10.1145/570645.570648
[10]   Selfish MAC layer misbehavior in wireless networks [J].
Kyasanur, P ;
Vaidya, NH .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2005, 4 (05) :502-516