MAC Layer Misbehavior on Ad Hoc Networks

One of the major challenges in ad hoc networks is to ensure nodal collaboration. Nevertheless, collaboration may lead to undesired results when nodes can exploit their siblings for their own benefits. Until recently, the research community focused on ensuring nodal cooperation at the network layer. In this work we focus on node behavior at the medium access control (MAC) layer. more specifically, this work focus on mechanisms to evaluate nodal activity and verify whether a node is adhering to the protocol rules or not. We show that misconduct at the MAC layer can have serious implications in terms of throughput. Our main contribution is a mechanism that enables nodes to monitor neighboring activity and assess their conduct based on the observed information.

[1]  David Simplot-Ryl,et al.  Secure Mobile Ad hoc Routing , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[2]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[3]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[4]  Dharma P. Agrawal,et al.  Mobile Ad hoc Networking , 2002 .

[5]  Qi He,et al.  SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[6]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[7]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[8]  Stefan Schlott,et al.  Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks , 2004, ESAS.

[9]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[10]  Kevin Barraclough,et al.  I and i , 2001, BMJ : British Medical Journal.

[11]  Stefano Basagni,et al.  Mobile Ad Hoc Networking , 2010 .

[12]  Jean-Pierre Hubaux,et al.  Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .

[13]  Marco Conti,et al.  Mobile Ad-hoc Networking - Minitrack Introduction , 2001, HICSS.

[14]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[15]  Matthew S. Gast,et al.  802.11 Wireless Networks: The Definitive Guide , 2002 .

[16]  Yang Xiao,et al.  IEEE 802.11e: QoS provisioning at the MAC layer , 2004, IEEE Wireless Communications.

[17]  Maxim Raya,et al.  DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.

[18]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[19]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).