Mobile Communications Engineering
Mobile Communications Engineering
Performance of Collision Avoidance Protocols in Single-Channel Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Detection and prevention of MAC layer misbehavior in ad hoc networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Selfish MAC Layer Misbehavior in Wireless Networks
IEEE Transactions on Mobile Computing
Impact of interference on multi-hop wireless network performance
Wireless Networks - Special issue: Selected papers from ACM MobiCom 2003
DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots
IEEE Transactions on Mobile Computing
The worst-case time complexity for generating all maximal cliques and computational experiments
Theoretical Computer Science - Computing and combinatorics
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
A fuzzy logic based scheme to detect adaptive cheaters in wireless lan
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Hi-index | 0.00 |
While the problem of greedy behavior at the MAC layer has been widely explored in the context of wireless local area networks, its study for multi-hop wireless networks still almost an unexplored and unexplained problem. Indeed, in a wireless local area network, an access point mostly forwards packets sent by wireless nodes over the wired link. In this case, a greedy node can easily get more bandwidth share and starve all other associated contending nodes by intelligently manipulating the MAC layer parameters. However, in wireless ad hoc environment, all packets are transmitted in a multi-hop fashion over wireless links. Therefore, if a greedy node behaves similarly as in WLAN case, trying to starve its neighbors, then its next hop forwarding node will also be prevented to forward its own traffic, which leads to an end-to-end throughput collapse. In this paper, we show that in order to have a more beneficial greedy behavior in wireless ad hoc networks, a node must adopt a different approach than in WLAN to achieve a better performance of its own flows. We then present a strategy to launch such greedy attack in a proactive routing based wireless ad hoc network. Through the extensive simulations, the obtained results show that by applying the proposed algorithm, a greedy node can gain more bandwidth than its neighbors and keep the end-to-end throughput of its own flows highly reasonable.