Abstract
The characteristics of ad hoc networks, such as the absence of infrastructure, dynamic topology, shared wireless medium and resource-constrained environment pose various security challenges. Most of the previous research focused on the detection of the misbehavior after it occurred. However, in this paper we propose a new way of thinking to evade the occurrence of misbehavior. In our scheme, Local Most Trustworthy node (LMT node) is allowed to assign the backoff values to originator, rather than permitting the originator to choose the backoff values by itself. With this MAC layer misbehavior avoidance mechanism, the misuse of the backoff in MAC layer in 802.11 DCF can be prevented.
Similar content being viewed by others
References
Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., & Jamalipour, A. (2007). A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Communications, 14(5), 85–91.
Wang, D., Hu, M., & Zhi, H. (2008). A survey of secure routing in ad hoc networks. In Web-age information management (pp. 482–486).
IEEE 802.11 Standard for wireless LAN. (1999). Medium access control (MAC) and physical layer (PHY) specification. IEEE Inc.
Cagalj, M., Ganeriwal, S., Aad, I., & Hubaux, J. P. (2004). On cheating in CSMA/CA ad hoc networks. EPFL, Tech. rep., 1–16.
Kyasanur, P., & Vaidya, N. (2003). Detection and handling of MAC layer misbehavior in wireless networks. In International conference on dependable systems and networks (pp. 173–182).
Sergio, M., Giuli, T. J., Kevin, L., & Mary, B. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In International conference on mobile computing and networking (pp. 255–265).
Faragó, A. (2002). Scalable analysis and design of ad hoc networks via random graph theory. In Workshop on discrete algorithms and methods for MOBILE computing and communications (pp. 43–50).
Tsumoto, S., & Hirano, S. (2003). Visualization of rule’s similarity using multidimensional scaling. In Data mining (pp. 339–346).
Li, G., Needham, R., & Yahalom, R. (1990). Reasoning about belief in cryptographic protocols. In Proc. IEEE symposium on security and privacy (pp. 234–248).
Giruka, V. C., & Singhal, M. (2005). Hello protocols for ad-hoc networks: overhead and accuracy tradeoff. In World of wireless mobile and multimedia networks (pp. 13–16).
Perkins, C. E., & Royer, E. M. (1999). Ad-hoc on-demand distance vector routing. In Mobile computing systems and applications (pp. 90–100).
Abusalah, L., Khokhar, A., & Guizani, M. (2008). A survey of secure mobile ad hoc routing protocols. IEEE Communications Surveys and Tutorials, 10(4), 78–93.
Krco, S., & Dupcinov, M. (2003). Improved neighbor detection algorithm for AODV routing protocol. IEEE Communications Letters, 7(12), 584–586.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shi, F., Baek, J., Song, J. et al. A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks. Telecommun Syst 52, 2397–2406 (2013). https://doi.org/10.1007/s11235-011-9552-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-011-9552-y