Skip to main content

A Game Theoretic Approach Against the Greedy Behavior in MAC IEEE 802.11

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 10542))

Abstract

In recent years, mobile ad hoc networks are invading more and more our daily lives. Indeed, several persons are linked daily to ad hoc networks, which aim to exchange data via smartphones, computers, or tablets. A mobile ad hoc network is a group of mobile stations equipped with wireless transmitters/receivers without fixed infrastructure use or centralized administration. In this sense, the network can be seen as a random graph due to the motion of nodes. The change of the network topology based on the time when nodes move or adjust their transmission and reception parameters. The design of these networks is characterized by its vulnerability to denial of service (DOS) attacks such as the greedy behavior (MAC layer misbehavior). In this paper, we formalized the reaction against this malicious behavior of the MAC layer by game theory. We have developed a model in the extensive form of our reaction scheme and a resolution of the game by Kühn’s algorithm. A validation of results though the NS2 network simulator is then given to the end.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. IEEE Standards Association, IEEE 802.11 Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Standards Association, pp. 818–840, March 2012

    Google Scholar 

  2. Giri, V.R., Jaggi, N.: MAC layer misbehavior effectiveness and collective aggressive reaction approach. In: Proceeding of 2010 IEEE Sarnoff Symposium, Princeton, USA (2010)

    Google Scholar 

  3. El Houssaini, M., Aaroud, A., Elhore, A., Ben-Othman, J.: Analysis and simulation of MAC layer misbehavior in mobile ad-hoc networks. In: Proceedings of the 5th International Workshop on Codes, Cryptography and Communication Systems, pp. 50–54 (2014)

    Google Scholar 

  4. El Houssaini, M., Aaroud, A., Elhore, A., Ben-Othman, J.: Real-time detection of MAC layer misbehavior in mobile ad hoc networks. Appl. Comput. Inform. (2015). doi:10.1016/j.aci.2015.11.001

    Google Scholar 

  5. El Houssaini, M., Aaroud, A., Elhore, A., Ben-Othman, J.: Multivariate control chart for the detection of MAC layer misbehavior in mobile ad hoc networks. Procedia Comput. Sci. 83, 58–65 (2016)

    Article  Google Scholar 

  6. El Houssaini, M., Aaroud, A., El Hore, A., Ben-Othman, J.: A novel reaction scheme against the MAC layer misbehavior in mobile ad hoc networks. Procedia Comput. Sci. 98, 64–71 (2016)

    Article  Google Scholar 

  7. Abegunde, J., Xiao, H., Spring, J.: A resilient MAC protocol for wireless networks. In: Presented at IMA Conference on Game Theory and its Applications, Oxford, UK (2014)

    Google Scholar 

  8. Kyasanur, P., Vaidya, N.H.: Handling MAC layer misbehavior in wireless networks. In: Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking, Atlanta, USA (2002)

    Google Scholar 

  9. Osborne, M.J.: An Introduction to Game Theory, 1st edn. Oxford University Press, England (2003)

    Google Scholar 

  10. El Houssaini, M., Aaroud, A., El Hore, A., Ben-Othman, J.: Performance analysis under MAC layer misbehavior attack in mobile Ad-Hoc networks. Comput. Technol. Appl. 6, 37–44 (2015)

    Google Scholar 

  11. Information Sciences Institute, The Network Simulator –ns-2, Information Sciences Institute (1995). http://www.isi.edu/nsnam/ns/. Accessed 9 Nov 2016

  12. Bai, F., Helmy, A.: A Survey of mobility modeling and analysis in wireless ad-hoc networks. In: Wireless Ad-Hoc and Sensor Networks (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed-Alamine El Houssaini .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

El Houssaini, MA., Aaroud, A., Hore, A.E., Ben-Othman, J. (2017). A Game Theoretic Approach Against the Greedy Behavior in MAC IEEE 802.11. In: Sabir, E., García Armada, A., Ghogho, M., Debbah, M. (eds) Ubiquitous Networking. UNet 2017. Lecture Notes in Computer Science(), vol 10542. Springer, Cham. https://doi.org/10.1007/978-3-319-68179-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68179-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68178-8

  • Online ISBN: 978-3-319-68179-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics