Abstract
The security of wireless mesh network has been more and more important these days. Although many works have been done to analyze the MAC layer misbehavior such as the selfish node which changes its backoff time to make itself more profits in 802.11 DCF mechanisms, most of them are under the assumption that the backoff time of the sender can be correctly detected. However because of the hidden node problem, misdiagnosing occurs fre-quently. In this paper, we propose a method to detect the backoff time of the sender using multiple detectors. It can avoid the misdiagnosing due to the hidden node problem. We also propose an algorithm to calculate the detection results using weighting parameters get by the probability that the detect nodes will suffer from the hidden node problems. The simulation result shows that the proposed method has a better performance in detecting the backoff time.
This work was supported by National Natural Science Foundation of China under Grant No.60572047, Program for new Century Excellent Talents in University NCET-06-0642, and the National High-Tech Research and Development Program ("863"Program) of China under Grants No.2006AA01Z267 and No. 2007AA01Z215.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
IEEE standard for Wireless LAN-Medium Access Control and Physical Layer Specification, P802.11 (1999)
Guang, L., Assi, C.: Vulnerabilities of ad hoc network routing protocols to MAC misbehavior. In: IEEE/ACM Wimob (2005)
Guang, L., Assi, C.: On the resiliency of ad hoc networks to MAC layer misbehavior. In: Workshop on PE-WASUN, ACM MsWiM (2005)
Konorski, J.: Protection of Fairness for Multimedia Traffic Streams in a Non-Cooperative Wireless LAN Setting. In: van Sinderen, M., Nieuwenhuis, L.J.M. (eds.) PROMS 2001. LNCS, vol. 2213, Springer, Heidelberg (2001)
MacKenzie, A.B., Wicker, S.B.: Game Theory and the Design of Self-Configuring, Adaptive Wireless Networks. IEEE Comm.Magazine 39(11), 126–131 (2000)
Michiardi, P., Molva, R.: Game Theoretic Analysis of Security in Mobile Ad Hoc Networks. Technical Report RR-02-070, Institut Eurecom (2002)
Cardenas, A.A., Radosavac, S., Baras, J.S.: Detection and Prevention of MAC Layer Misbehavior in Ad Hoc Networks. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (2004)
Kyasanur, P., Vaidya, N.H.: Selfish MAC Layer Misbehavior in Wireless Networks. IEEE Transactions on mobile computing (2005)
Guang, L., Assi, C.: Mitigating Smart Selfish MAC Layer Misbehavior in Ad Hoc Networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, F., Qu, Y., Bai, B., Zhang, F., Huang, C. (2008). Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds) Autonomic and Trusted Computing. ATC 2008. Lecture Notes in Computer Science, vol 5060. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69295-9_23
Download citation
DOI: https://doi.org/10.1007/978-3-540-69295-9_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69294-2
Online ISBN: 978-3-540-69295-9
eBook Packages: Computer ScienceComputer Science (R0)