Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Detection and prevention of MAC layer misbehavior in ad hoc networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Selfish MAC Layer Misbehavior in Wireless Networks
IEEE Transactions on Mobile Computing
On the resiliency of mobile ad hoc networks to MAC layer misbehavior
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Modeling and analysis of predictable random backoff in selfish environments
Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
MAC layer misbehavior effectiveness and collective aggressive reaction approach
Sarnoff'10 Proceedings of the 33rd IEEE conference on Sarnoff
Hi-index | 0.24 |
MAC layer misbehavior due to selfish or malicious reasons can significantly degrade the performance of mobile ad hoc networks. Currently, detection systems for handling selfish misbehavior has been proposed and studied. In this paper we study a new class of malicious misbehaviors that causes transmission timeout of MAC frames at either the transmitter side or the receiver side. A misbehaving node fully cooperates by forwarding packets for other nodes and completely adheres to the proper selection of backoff intervals; however, it maliciously forces the forwarding operation to fail in order to either disrupt the route discovery process or cause damage to the existing flows routed through itself. We design and implement a new detection and reaction system DREAM (a system for Detection and REAction to timeout mac layer Misbehavior) that identifies the malicious nodes through a set of monitoring and reaction procedures. Once a misbehaving node is detected, the system reacts, by adapting simple protocol parameters, to mitigate the negative effects. We describe the detection system and the different reaction procedures for different misbehaviors. We evaluate through network simulations the effectiveness of the system in detecting malicious nodes and improving the network performance.