MAC layer misbehavior in wireless networks: challenges and solutions

IEEE 802.11 CSMA/CA has been widely deployed as the primary MAC protocol for ad hoc networks and wireless LANs. It was designed with the assumption that nodes would follow proper operation of the protocol. Nodes, however, may choose to deviate in order to either obtain an unfair share of the available bandwidth or disrupt the services of the network. Accordingly, a misbehavior rooted at the MAC layer can be classified as selfish or malicious behavior. This article surveys the research activities related to MAC layer misbehavior; based on the operating principles and the objective of misbehaving nodes, we classify MAC layer misbehavior and present descriptions for each solution. We conclude with a brief summary of the key ideas and a general direction for future work.

[1]  Saurabh Ganeriwal,et al.  On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[2]  Chadi Assi,et al.  Interlayer Attacks in Mobile Ad Hoc Networks , 2006, MSN.

[3]  Maxim Raya,et al.  DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.

[4]  Adam Wolisz,et al.  Analyzing and improving the IEEE 802.11-MAC protocol for wireless LANs , 1996, Proceedings of MASCOTS '96 - 4th International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[5]  Michalis Faloutsos,et al.  Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.

[6]  Sang Kyu Lee,et al.  Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[7]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[8]  John S. Baras,et al.  A framework for MAC protocol misbehavior detection in wireless networks , 2005, WiSe '05.

[9]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[10]  Jerzy Konorski MAC Contention in a Wireless LAN with Noncooperative Anonymous Stations , 2006, J. Networks.

[11]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[12]  Chadi Assi,et al.  A Self-Adaptive Detection System for MAC Misbehavior in Ad Hoc Networks , 2006, 2006 IEEE International Conference on Communications.

[13]  John S. Baras,et al.  Detection and prevention of MAC layer misbehavior in ad hoc networks , 2004, SASN '04.

[14]  Chadi Assi,et al.  Modeling and analysis of predictable random backoff in selfish environments , 2006, MSWiM '06.

[15]  Srikanth V. Krishnamurthy,et al.  Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[16]  Nitin H. Vaidya,et al.  Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.