Abstract
The convenience of IEEE 802.15.4 (Low-rate Wireless Personal Area Network) based wireless access network will lead to widespread deployment in the evolutionary computing and adaptive systems. However, this use is predicated on an implicit assumption of confidentiality and availability. In this environment, malicious device may obtain an unfair share of the channel bandwidth. For example, IEEE 802.15.4 requires nodes competing for getting access to the channel to wait for a ’backoff’ interval, randomly selected from a specified range, before initiating a transmission. Malicious devices may wait for smaller ’backoff’ intervals than well-behaved devices, thereby obtaining an unfair advantage. Such misbehavior can seriously degrade the throughput of well-behaved devices. In this paper, we proposed an intelligent coordinator, a modification to IEEE 802.15.4 specification to simplify the prevention of such malicious devices. Proposed coordinator is able to ascertain whether to apply PTP (Priority Time Period). Simulation results indicate that our prevention mechanism is successful in handling MAC layer misbehavior. We plan to foster our solution in the evolutionary computing systems through further development.
This work was supported by University ITRC Project of MIC. Dr. C.S.Hong is the corresponding author.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
IEEE Standard for Wireless Medium Access Control and Physical Layer Specification for Low-Rate Wireless Personal Area Networks, P802.15.4 (2003)
Kyasanur, P., Vaidya, N.H.: Detection and handling of MAC layer misbehavior in wireless networks. In: Dependable Systems and Networks 2003, June 2003, pp. 173–182 (2003)
Gupta, V., Krishnamurthy, S., Faloutsos, M.: Denial of service attacks at the MAC layer in wireless ad hoc networks. In: MILCOM 2002 Proceedings, October 2002, vol. 2, pp. 1118–1123 (2002)
Noubir, G., Lin, G.: Low-Power DoS Attacks in Data Wireless LANs and Countermeasures. ACM MobiHoc, Poster Session (2003)
Messerges, T.S., Cukier, J., et al.: A security design for a general purpose, selforganizing, multihop ad hoc wireless network. In: Proceedings of the 1st ACM workshop Security of Ad Hoc and Sensor Network (2003)
Sastry, N., Wagner, D.: Security Consideration for IEEE 802.15.4 Networks. In: WiSe 2004 Proceeding, pp. 32–42 (2004)
Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in Mobile Ad Hoc Networks: Challenges and solutions. Wireless Communications 11(1), 38–47 (2004)
Aad, I., Castelluccia, C.: Differentiation mechanisms for IEEE 802.11. In: IEEE INFOCOM (April 2001)
Barry, M., Campbell, A.T., Veres, A.: Distributed Control Algorithms for Service Differentiation in Wireless Packet Networks. In: IEEE INFOCOM (April 2001)
Kanodia, V., Li, C., Sabharwal, A., Sadeghi, B., Knightly, E.: Distributed Multi-Hop Scheduling and Medium Access with Delay and Throughput Constraints. In: MOBICOM (August 2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Heo, J., Hong, C.S. (2005). An Efficient and Secured Media Access Mechanism Using the Intelligent Coordinator in Low-Rate WPAN Environment. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552451_63
Download citation
DOI: https://doi.org/10.1007/11552451_63
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28895-4
Online ISBN: 978-3-540-31986-3
eBook Packages: Computer ScienceComputer Science (R0)