A New Mechanism to Detect Selfish Behavior in IEEE 802.11 Ad Hoc Networks

Selfish behavior at the MAC (Medium Access Control) layer can have devastating side effects on the performance of wireless ad hoc networks. In this work, we consider the problem of detecting selfish behavior at the MAC layer in IEEE 802.11 wireless networks when a selfish node can manipulate the backoff operation. We propose a simple and robust mechanism based on CUSUM (Cumulative Sum) test by tracing the statistics characteristic in real time to detect the selfish behavior. This method can be used with any random access MAC protocols and it does not require any modification on the existing protocols. The efficacy of this detection mechanism has been validated by a Qualnet simulator. Our simulation results show that the detection mechanism has short detection time and high detection accuracy.

[1]  Xiaodong Wang,et al.  Adaptive Optimization of IEEE 802.11 DCF Based on Bayesian Estimation of the Number of Competing Terminals , 2006, IEEE Transactions on Mobile Computing.

[2]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[3]  Xiaodong Wang,et al.  A Robust Kolmogorov-Smirnov Detector for Misbehavior in IEEE 802.11 DCF , 2007, 2007 IEEE International Conference on Communications.

[4]  Maxim Raya,et al.  DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.

[5]  B. Brodsky,et al.  Nonparametric Methods in Change Point Problems , 1993 .

[6]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[7]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[8]  John S. Baras,et al.  A framework for MAC protocol misbehavior detection in wireless networks , 2005, WiSe '05.

[9]  Levente Buttyán,et al.  Report on a working session on security in wireless ad hoc networks , 2003, MOCO.

[10]  Nitin H. Vaidya,et al.  Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[11]  Nitin H. Vaidya,et al.  Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.

[12]  E. S. Page CONTINUOUS INSPECTION SCHEMES , 1954 .

[13]  Michèle Basseville,et al.  Detection of abrupt changes: theory and application , 1993 .