A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks

The characteristics of ad hoc networks, such as the absence of infrastructure, dynamic topology, shared wireless medium and resource-constrained environment pose various security challenges. Most of the previous research focused on the detection of the misbehavior after it occurred. However, in this paper we propose a new way of thinking to evade the occurrence of misbehavior. In our scheme, Local Most Trustworthy node (LMT node) is allowed to assign the backoff values to originator, rather than permitting the originator to choose the backoff values by itself. With this MAC layer misbehavior avoidance mechanism, the misuse of the backoff in MAC layer in 802.11 DCF can be prevented.

[1]  Jaewoo Chung,et al.  Mobile Computing Systems and Applications , 2011, IEEE Pervasive Comput..

[2]  Srdjan Krco,et al.  Improved neighbor detection algorithm for AODV routing protocol , 2003, IEEE Communications Letters.

[3]  Ian Witten,et al.  Data Mining , 2000 .

[4]  Mingzeng Hu,et al.  A Survey of Secure Routing in Ad Hoc Networks , 2008, 2008 The Ninth International Conference on Web-Age Information Management.

[5]  Nitin H. Vaidya,et al.  Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[6]  Shusaku Tsumoto,et al.  Visualization of rule's similarity using multidimensional scaling , 2003, Third IEEE International Conference on Data Mining.

[7]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[8]  Saurabh Ganeriwal,et al.  On Cheating in CSMA/CA Ad Hoc Networks , 2004 .

[9]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[10]  Mohsen Guizani,et al.  A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.

[11]  András Faragó Scalable analysis and design of ad hoc networks via random graph theory , 2002, DIALM '02.

[12]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[13]  Mukesh Singhal,et al.  Hello protocols for ad-hoc networks: overhead and accuracy tradeoffs , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[14]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.