DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks

MAC layer misbehavior due to selfish or malicious reasons can significantly degrade the performance of mobile ad hoc networks. Currently, detection systems for handling selfish misbehavior has been proposed and studied. In this paper we study a new class of malicious misbehaviors that causes transmission timeout of MAC frames at either the transmitter side or the receiver side. A misbehaving node fully cooperates by forwarding packets for other nodes and completely adheres to the proper selection of backoff intervals; however, it maliciously forces the forwarding operation to fail in order to either disrupt the route discovery process or cause damage to the existing flows routed through itself. We design and implement a new detection and reaction system DREAM (a system for Detection and REAction to timeout mac layer Misbehavior) that identifies the malicious nodes through a set of monitoring and reaction procedures. Once a misbehaving node is detected, the system reacts, by adapting simple protocol parameters, to mitigate the negative effects. We describe the detection system and the different reaction procedures for different misbehaviors. We evaluate through network simulations the effectiveness of the system in detecting malicious nodes and improving the network performance.

[1]  John S. Baras,et al.  Detection and prevention of MAC layer misbehavior in ad hoc networks , 2004, SASN '04.

[2]  Chadi Assi,et al.  Vulnerabilities of ad hoc network routing protocols to MAC misbehavior , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[3]  Azzedine Boukerche,et al.  Wireless Communication and Mobile Computing , 2005, Handbook of Algorithms for Wireless Networking and Mobile Computing.

[4]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.

[5]  Chadi Assi,et al.  On the resiliency of mobile ad hoc networks to MAC layer misbehavior , 2005, PE-WASUN '05.

[6]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[7]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[8]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[9]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[10]  Jianhua Liu,et al.  Differential space-time modulation for DS-CDMA systems , 2002, Wirel. Commun. Mob. Comput..

[11]  Nitin H. Vaidya,et al.  Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.

[12]  Chadi Assi,et al.  Modeling and analysis of predictable random backoff in selfish environments , 2006, MSWiM '06.

[13]  Maxim Raya,et al.  DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.

[14]  Michalis Faloutsos,et al.  Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.

[15]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.