Skip to main content

Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network

  • Conference paper
  • 836 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5060))

Abstract

The security of wireless mesh network has been more and more important these days. Although many works have been done to analyze the MAC layer misbehavior such as the selfish node which changes its backoff time to make itself more profits in 802.11 DCF mechanisms, most of them are under the assumption that the backoff time of the sender can be correctly detected. However because of the hidden node problem, misdiagnosing occurs fre-quently. In this paper, we propose a method to detect the backoff time of the sender using multiple detectors. It can avoid the misdiagnosing due to the hidden node problem. We also propose an algorithm to calculate the detection results using weighting parameters get by the probability that the detect nodes will suffer from the hidden node problems. The simulation result shows that the proposed method has a better performance in detecting the backoff time.

This work was supported by National Natural Science Foundation of China under Grant No.60572047, Program for new Century Excellent Talents in University NCET-06-0642, and the National High-Tech Research and Development Program ("863"Program) of China under Grants No.2006AA01Z267 and No. 2007AA01Z215.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IEEE standard for Wireless LAN-Medium Access Control and Physical Layer Specification, P802.11 (1999)

    Google Scholar 

  2. Guang, L., Assi, C.: Vulnerabilities of ad hoc network routing protocols to MAC misbehavior. In: IEEE/ACM Wimob (2005)

    Google Scholar 

  3. Guang, L., Assi, C.: On the resiliency of ad hoc networks to MAC layer misbehavior. In: Workshop on PE-WASUN, ACM MsWiM (2005)

    Google Scholar 

  4. Konorski, J.: Protection of Fairness for Multimedia Traffic Streams in a Non-Cooperative Wireless LAN Setting. In: van Sinderen, M., Nieuwenhuis, L.J.M. (eds.) PROMS 2001. LNCS, vol. 2213, Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. MacKenzie, A.B., Wicker, S.B.: Game Theory and the Design of Self-Configuring, Adaptive Wireless Networks. IEEE Comm.Magazine 39(11), 126–131 (2000)

    Article  Google Scholar 

  6. Michiardi, P., Molva, R.: Game Theoretic Analysis of Security in Mobile Ad Hoc Networks. Technical Report RR-02-070, Institut Eurecom (2002)

    Google Scholar 

  7. Cardenas, A.A., Radosavac, S., Baras, J.S.: Detection and Prevention of MAC Layer Misbehavior in Ad Hoc Networks. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (2004)

    Google Scholar 

  8. Kyasanur, P., Vaidya, N.H.: Selfish MAC Layer Misbehavior in Wireless Networks. IEEE Transactions on mobile computing (2005)

    Google Scholar 

  9. Guang, L., Assi, C.: Mitigating Smart Selfish MAC Layer Misbehavior in Ad Hoc Networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Chunming Rong Martin Gilje Jaatun Frode Eika Sandnes Laurence T. Yang Jianhua Ma

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, F., Qu, Y., Bai, B., Zhang, F., Huang, C. (2008). Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds) Autonomic and Trusted Computing. ATC 2008. Lecture Notes in Computer Science, vol 5060. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69295-9_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69295-9_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69294-2

  • Online ISBN: 978-3-540-69295-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics