Skip to main content
Log in

A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

The characteristics of ad hoc networks, such as the absence of infrastructure, dynamic topology, shared wireless medium and resource-constrained environment pose various security challenges. Most of the previous research focused on the detection of the misbehavior after it occurred. However, in this paper we propose a new way of thinking to evade the occurrence of misbehavior. In our scheme, Local Most Trustworthy node (LMT node) is allowed to assign the backoff values to originator, rather than permitting the originator to choose the backoff values by itself. With this MAC layer misbehavior avoidance mechanism, the misuse of the backoff in MAC layer in 802.11 DCF can be prevented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., & Jamalipour, A. (2007). A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Communications, 14(5), 85–91.

    Article  Google Scholar 

  2. Wang, D., Hu, M., & Zhi, H. (2008). A survey of secure routing in ad hoc networks. In Web-age information management (pp. 482–486).

    Google Scholar 

  3. IEEE 802.11 Standard for wireless LAN. (1999). Medium access control (MAC) and physical layer (PHY) specification. IEEE Inc.

  4. Cagalj, M., Ganeriwal, S., Aad, I., & Hubaux, J. P. (2004). On cheating in CSMA/CA ad hoc networks. EPFL, Tech. rep., 1–16.

  5. Kyasanur, P., & Vaidya, N. (2003). Detection and handling of MAC layer misbehavior in wireless networks. In International conference on dependable systems and networks (pp. 173–182).

    Google Scholar 

  6. Sergio, M., Giuli, T. J., Kevin, L., & Mary, B. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In International conference on mobile computing and networking (pp. 255–265).

    Google Scholar 

  7. Faragó, A. (2002). Scalable analysis and design of ad hoc networks via random graph theory. In Workshop on discrete algorithms and methods for MOBILE computing and communications (pp. 43–50).

    Google Scholar 

  8. Tsumoto, S., & Hirano, S. (2003). Visualization of rule’s similarity using multidimensional scaling. In Data mining (pp. 339–346).

    Google Scholar 

  9. Li, G., Needham, R., & Yahalom, R. (1990). Reasoning about belief in cryptographic protocols. In Proc. IEEE symposium on security and privacy (pp. 234–248).

    Google Scholar 

  10. Giruka, V. C., & Singhal, M. (2005). Hello protocols for ad-hoc networks: overhead and accuracy tradeoff. In World of wireless mobile and multimedia networks (pp. 13–16).

    Google Scholar 

  11. Perkins, C. E., & Royer, E. M. (1999). Ad-hoc on-demand distance vector routing. In Mobile computing systems and applications (pp. 90–100).

    Google Scholar 

  12. Abusalah, L., Khokhar, A., & Guizani, M. (2008). A survey of secure mobile ad hoc routing protocols. IEEE Communications Surveys and Tutorials, 10(4), 78–93.

    Google Scholar 

  13. Krco, S., & Dupcinov, M. (2003). Improved neighbor detection algorithm for AODV routing protocol. IEEE Communications Letters, 7(12), 584–586.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jooseok Song.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Shi, F., Baek, J., Song, J. et al. A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks. Telecommun Syst 52, 2397–2406 (2013). https://doi.org/10.1007/s11235-011-9552-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-011-9552-y

Keywords

Navigation