Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting
PROMS 2001 Proceedings of the 6th International Conference on Protocols for Multimedia Systems
Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations
NETWORKING '02 Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Detection and prevention of MAC layer misbehavior in ad hoc networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots
IEEE Transactions on Mobile Computing
Understanding congestion in IEEE 802.11b wireless networks
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Analysis of distributed intrusion detection systems using Bayesian methods
PCC '02 Proceedings of the Performance, Computing, and Communications Conference, 2002. on 21st IEEE International
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
Game theory and the design of self-configuring, adaptive wireless networks
IEEE Communications Magazine
Hi-index | 0.00 |
The CSMA/CA protocol is well known to handle the channel access to various users in wireless ad hoc networks using IEEE 802.11 technology. This protocol requires nodes to wait for some time before initiating a transmission to avoid collisions. As a result, the greedy behavior of some misbehaving nodes can try to lower their waiting time in order to access the channel earlier and penalize the other nodes. In order to avoid this misbehavior, we propose in this paper a model based on measuring the linear regression of nodes' access time to the channel. We have demonstrated that this model exhibits a linear regression between the different nodes' access time. This result has been also confirmed by simulations. In this model, each deviation from the estimated slope is considered as a source of cheating from a corresponding node. By using this detection model, we were able to detect most of the misbehaving nodes in wireless ad hoc networks without requiring modifications to the IEEE 802.11 MAC protocol.