Skip to main content
Log in

A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks

  • Regular Paper
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

Medium access control (MAC) protocols such as IEEE 802.11 are used in wireless networks for sharing of the wireless medium. The random nature of the protocol operation together with the inherent difficulty of monitoring in the open poses significant challenges. All nodes are expected to comply with the protocol rules. But, some nodes in order to gain greater benefits misbehave by not complying with the rules. One such selfish misbehavior is waiting for smaller back-off intervals when compared to the other nodes in the same subnet. Such selfish misbehavior is being tackled in this paper. A diagnosis scheme and a penalty scheme are being proposed for overcoming such selfish-misbehavior at MAC layer of mobile ad hoc networks which could be extended to other types of networks also.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Moscibroda T, Wattenhofer R. The complexity of connectivity in wireless networks. In Proc. IEEE INFOCOM, Barcelona, Spain, April 23–29, 2006, pp.1–3.

  2. Alberto Lopez Toledo, Xiaodong Wang. Robust detection of selfish misbehavior in wireless networks. IEEE Journal on Selected Areas in Communications, August 2007, 25(6): 1124–1134.

    Article  Google Scholar 

  3. Lopez Toledo A, Vercauteren T, Wang X. Adaptive optimization of IEEE 802.11 DCF based on Bayesian estimation of the number of competing terminals. IEEE Transaction on Mobile Computing, Nov. 2006, 5(9): 1283–1296.

    Article  Google Scholar 

  4. Li M, Prabhakaran B. MAC Layer Admission Control and Priority Re-Allocation for Handling QoS Guarantees in Non-Cooperative Wireless LANs Mobile Networks and Applications. Springer Science & Business Media, Inc., 2005, pp.947–959.

  5. Jin Y, Kesidis G. Distributed contention window control for selfish users in IEEE 802.11 wireless LANs. IEEE Journal on Selected Areas in Communications, August 2007, 25(6): 1113–1123.

    Article  Google Scholar 

  6. Lopez Toledo A, Wang X. A robust Kolmogorov-Smirnov detector for misbehavior in IEEE 802.11 DCF. In Proc. IEEE International Conference on Communications (ICC’07), Glasgow, UK, June 24–28, 2007, pp.1564–1569.

  7. Chen L, Leneutre J. Selfishness, not always a nightmare: Modeling selfish MAC behaviors in wireless mobile ad hoc networks. In Proc. the 27th International Conference on Distributed Computing Systems (ICDCS'07), Toronto, Canada, June 25–29, p.16.

  8. Jang-Won Lee, Ao Tang, Jianwei Huang, Mung Chiang, A Robert Calderbank. Reverse-engineering MAC: A non-cooperative game model. IEEE Journal on Selected Areas in Communications, August 2007, 25(6): 1135–1147.

    Article  Google Scholar 

  9. Venkata Nishanth Lolla, Lap Kong Law, Srikanth V Krishnamurthy. Detecting MAC layer back-off timer violations in mobile ad hoc networks. In Proc. the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), Lisbon, Portugal, July 4-7, 2006, pp.63-73.

  10. Kyasanur P, Vaidya N. Selfish MAC layer misbehavior in wireless networks. IEEE Transactions on Mobile Computing, September 2005.

  11. Mackenzie B, Wicker S B. Game theory and the design of self-configuring, adaptive wireless networks. IEEE Communications Magazine, 2000, 39(11): 126–131.

    Article  Google Scholar 

  12. Raya M, Hubaux J P, Aad I. DOMINO: A system to detect greedy behavior in IEEE 802.11 hotspots. In Proc.MOBISYS'04, Boston, USA, June 6-9, 2004, pp.84–97.

  13. Cardenas A A, Radosavac S, Baras J S. Detection and prevention of MAC layer misbehavior for ad hoc networks. Technical Report, Univ. Maryland, 2004.

  14. Fall K, Varadhan K. Ns notes and documentation. UC Berkeley, LBL, USC/ISI, Xerox PARC, 2003.

  15. Jin Y, Kesidis G. Charge sensitive and incentive compatible end to end window-based control for selfish users. IEEE JSAC Special Issue on Network Economics and Pricing, May 2006, 24(5): 952–961.

    Google Scholar 

  16. Konorski J. Multiple access in ad-hoc wireless LANs with non-cooperative stations. In Proc. NETWORKING, Coimbra, Portugal, LNCS 2345, Springer, May 15–19, 2002, pp.1141–1146.

  17. MacKenzie B, Wicker S B. Stability of multipacket slotted aloha with selfish users and perfect information. In Proc. Infocom 2003, San Francisco, CA, IEEE, March 30–April 3, 2003, pp.1583–1597.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raja Gunasekaran.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Gunasekaran, R., Uthariaraj, V.R., Yamini, U. et al. A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks. J. Comput. Sci. Technol. 24, 472–481 (2009). https://doi.org/10.1007/s11390-009-9238-z

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-009-9238-z

Keywords

Navigation