Skip to main content

An Efficient and Secured Media Access Mechanism Using the Intelligent Coordinator in Low-Rate WPAN Environment

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3682))

  • 729 Accesses

Abstract

The convenience of IEEE 802.15.4 (Low-rate Wireless Personal Area Network) based wireless access network will lead to widespread deployment in the evolutionary computing and adaptive systems. However, this use is predicated on an implicit assumption of confidentiality and availability. In this environment, malicious device may obtain an unfair share of the channel bandwidth. For example, IEEE 802.15.4 requires nodes competing for getting access to the channel to wait for a ’backoff’ interval, randomly selected from a specified range, before initiating a transmission. Malicious devices may wait for smaller ’backoff’ intervals than well-behaved devices, thereby obtaining an unfair advantage. Such misbehavior can seriously degrade the throughput of well-behaved devices. In this paper, we proposed an intelligent coordinator, a modification to IEEE 802.15.4 specification to simplify the prevention of such malicious devices. Proposed coordinator is able to ascertain whether to apply PTP (Priority Time Period). Simulation results indicate that our prevention mechanism is successful in handling MAC layer misbehavior. We plan to foster our solution in the evolutionary computing systems through further development.

This work was supported by University ITRC Project of MIC. Dr. C.S.Hong is the corresponding author.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IEEE Standard for Wireless Medium Access Control and Physical Layer Specification for Low-Rate Wireless Personal Area Networks, P802.15.4 (2003)

    Google Scholar 

  2. Kyasanur, P., Vaidya, N.H.: Detection and handling of MAC layer misbehavior in wireless networks. In: Dependable Systems and Networks 2003, June 2003, pp. 173–182 (2003)

    Google Scholar 

  3. Gupta, V., Krishnamurthy, S., Faloutsos, M.: Denial of service attacks at the MAC layer in wireless ad hoc networks. In: MILCOM 2002 Proceedings, October 2002, vol. 2, pp. 1118–1123 (2002)

    Google Scholar 

  4. Noubir, G., Lin, G.: Low-Power DoS Attacks in Data Wireless LANs and Countermeasures. ACM MobiHoc, Poster Session (2003)

    Google Scholar 

  5. Messerges, T.S., Cukier, J., et al.: A security design for a general purpose, selforganizing, multihop ad hoc wireless network. In: Proceedings of the 1st ACM workshop Security of Ad Hoc and Sensor Network (2003)

    Google Scholar 

  6. Sastry, N., Wagner, D.: Security Consideration for IEEE 802.15.4 Networks. In: WiSe 2004 Proceeding, pp. 32–42 (2004)

    Google Scholar 

  7. Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in Mobile Ad Hoc Networks: Challenges and solutions. Wireless Communications 11(1), 38–47 (2004)

    Article  Google Scholar 

  8. Aad, I., Castelluccia, C.: Differentiation mechanisms for IEEE 802.11. In: IEEE INFOCOM (April 2001)

    Google Scholar 

  9. Barry, M., Campbell, A.T., Veres, A.: Distributed Control Algorithms for Service Differentiation in Wireless Packet Networks. In: IEEE INFOCOM (April 2001)

    Google Scholar 

  10. Kanodia, V., Li, C., Sabharwal, A., Sadeghi, B., Knightly, E.: Distributed Multi-Hop Scheduling and Medium Access with Delay and Throughput Constraints. In: MOBICOM (August 2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Heo, J., Hong, C.S. (2005). An Efficient and Secured Media Access Mechanism Using the Intelligent Coordinator in Low-Rate WPAN Environment. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552451_63

Download citation

  • DOI: https://doi.org/10.1007/11552451_63

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28895-4

  • Online ISBN: 978-3-540-31986-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics