How MIMO cross-layer design enables QoS while detecting non-cooperative nodes in wireless multi-hop networks

Wireless Multi-hop Networks (WMNs) are based on the cooperation between nodes. The non-cooperative (selfish) nodes can affect the quality of services (QoS) delivered by the network. The solutions proposed in the literature are based on the monitoring mechanism to detect non-cooperative nodes. However, the monitoring mechanism has to tackle a significant false alarm rate. The origin of these issues is mainly related to the interferences and the costs of the monitoring mechanism. In WMNs based on Single-Input Single-Output (SISO) technology, the interferences at the monitor (detector) node can affect the assessment and the accuracy of the monitor node's observation. In this paper, we use Multi-Input and Multi-Output (MIMO) technology to tackle these drawbacks and to perform the monitoring mechanism without affecting the QoS. We propose a new MAC protocol based on the well-known SPACE-MAC protocol, named MIMODog. The collision at the monitor node can be avoided by tuning the antennas' weights. Therefore, the signal coming from other nodes than the monitored one can be nullified. Thus, this solution allows an important improvement of the accuracy of the monitor node's observation. Moreover, we propose a monitoring capacity analysis using graph theory particularly Conflict Graph (CG), and asymptotic study. We illustrate that the capacity consumed in the case of MIMODog is costly compared to SPACE-MAC, but the accuracy of the observation is better. We demonstrate that the number of monitor nodes is ź ( M / n ln n ) for a MIMO network with randomly located nodes n, each equipped with M antennas. Indeed, numerical results illustrate that by using MIMODog, the network can have a constant improvement M on an asymptotic number of monitor nodes compared to SISO 802.11 DCF MAC.

[1]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[2]  Abderrahim Benslimane,et al.  Cross-Layer Approach to Improve the Monitoring Process for Mobile Ad Hoc Networks Based on IEEE 802.11 , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[3]  J.-P. Hubaux,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[4]  Hakim Badis An efficient bandwidth guaranteed routing for ad hoc networks using ieee 802.11 with interference consideration , 2007, MSWiM '07.

[5]  Maxim Raya,et al.  DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.

[6]  Haiying Shen,et al.  Analysis of a Hybrid Reputation Management System for Mobile Ad hoc Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[7]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[8]  Bruno Schulze,et al.  RETENTION: A reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments , 2013, J. Netw. Comput. Appl..

[9]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[10]  Mourad Debbabi,et al.  A Secure Mechanism Design-Based and Game Theoretical Model for MANETs , 2010, Mob. Networks Appl..

[11]  Valeria Simoncini,et al.  Variable Accuracy of Matrix-Vector Products in Projection Methods for Eigencomputation , 2005, SIAM J. Numer. Anal..

[12]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[13]  Yu Cheng,et al.  Selfish misbehavior detection in 802.11 based wireless networks: An adaptive approach based on Markov decision process , 2013, 2013 Proceedings IEEE INFOCOM.

[14]  J.-P. Hubaux,et al.  Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.

[15]  Abderrahim Benslimane,et al.  Cross-Layer approach to improve the monitoring process for Mobile Ad Hoc Networks based on , 2007 .

[16]  Levente Buttyán,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.

[17]  Abderrahmane Baadache,et al.  Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks , 2012, J. Netw. Comput. Appl..

[18]  Jean C. Walrand,et al.  Bandwidth guaranteed routing for ad-hoc networks with interference consideration , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).

[19]  Yiwei Thomas Hou,et al.  On the Asymptotic Capacity of Multi-Hop MIMO Ad Hoc Networks , 2011, IEEE Transactions on Wireless Communications.

[20]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[21]  L. Lovász A Characterization of Perfect Graphs , 1972 .

[22]  Piet Van Mieghem,et al.  Degree distribution and hopcount in wireless ad-hoc networks , 2003, The 11th IEEE International Conference on Networks, 2003. ICON2003..

[23]  Abderrahim Benslimane,et al.  Toward a cross-layer monitoring process for mobile ad hoc networks , 2009, Secur. Commun. Networks.

[24]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[25]  Abderrezak Rachedi,et al.  MIMODog: How to solve the problem of selfish misbehavior detection mechanism in MANETs using MIMO technology , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[26]  Mario Gerla,et al.  SPACE-MAC: enabling spatial reuse using MIMO channel-aware MAC , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[27]  Lavy Libman,et al.  Conflicts and Incentives in Wireless Cooperative Relaying: A Distributed Market Pricing Framework , 2011, IEEE Transactions on Parallel and Distributed Systems.

[28]  Sheng Zhong,et al.  A reputation system for wireless mesh networks using network coding , 2011, J. Netw. Comput. Appl..