skip to main content
10.1145/1089803.1089981acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
Article

On the resiliency of mobile ad hoc networks to MAC layer misbehavior

Published: 10 October 2005 Publication History

Abstract

This paper describes a new vulnerability for the IEEE 802.11 protocol and studies its impact on degrading the performance of ad hoc networks. A host that exploits this new simple, but practical, vulnerability could cause devastating effects on the proper operation of the network protocols and hence severe performance degradation. Here, a misbehaving node fully cooperates by forwarding packets for other nodes and completely adheres to the proper selection of backoff intervals; however, it maliciously forces the forwarding operation to fail in order to either disrupt the route discovery process or to cause damage to existing flows routed though that node. As a result, the medium around the misbehaving node will be less congested and hence the node will obtain an increased unfair access to the channel. We use network simulations to show that such malicious misbehaviors have devastating effect on demoting the network performance and disrupting the protocol functioning. Hence, necessary extensions for existing detection systems are required to mitigate the effects of these new vulnerabilities.

References

[1]
Ieee802.11 wireless lan media access control (mac) and physical layer (phy) specifications. 1999.
[2]
I. Aad, J. P. Hubaux, and E. W. Knightly. Denial of service resilience in ad hoc networks. In Proceedings of ACM MobiCom, September 2004.
[3]
J. Bellardo and S. Savage. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In USENIX, 2003.
[4]
A. Cardenas, S. Radosavac, and J. S. Baras. Detection and prevention of mac layer misbehavior for ad hoc networks. In (SASN), October 2004.
[5]
K. Fall and K. Varadhan. ns notes and documentation. In http://www.isi.edu/nsnam/ns, 1999.
[6]
L. Guang and C. Assi. Vulnerabilities of ad hoc network routing protocols to mac misbehavior. In IEEE/ACM WIMOB, August 2005.
[7]
V. Gupta, S. Krishnamurthy, and M. Faloutsous. Denial of service attacks at the mac layer in wireless ad hoc networks. In Proceedings of MILCOM, 2002.
[8]
Y.-C. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad-hoc networks. In Proceedings of the MobiCom, September 2002.
[9]
P. Kyasanur and N. Vaidya. Selfish mac layer misbehavior in wireless networks. IEEE Transactions on Mobile Computing., April 2004.
[10]
D. Maltz, J. Broch, J. Jetcheva, and D. Johnson. The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networks. In IEEE JSAC, 1999.
[11]
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking, 2000.
[12]
P. Papadimitratos and Z. Haas. Secure routing for mobile ad hoc networks. In Proceedings of CNDS, 2002.
[13]
C. Perkins and E. Royer. Ad hoc on demand distance vector routing. In 2nd International Workshop on Mobile Computing Systems and Applications, February 1999.
[14]
M. Raya, J. P. Hubaux, and I. Aad. Domino: A system to detect greedy behavior in ieee 802.11 hotspots. In Proceedings of ACM MobiSys, June 2004.
[15]
F. A. Tobagi and L. Kleinrock. Packet switching in radio channels: The hidden terminal problem in carrier sense multiple access models and the busy tone solution. IEEE Transactions on Communications, December 1975.
[16]
J. Weinmiller, H. Woesner, and A. Wolisz. Analyzing and improving the ieee 802.11-mac protocol for wireless lans. In MASCOTS, Feb 1996.
[17]
Y. Zhou, D. Wu, and S. Nettles. Analyzing and preventing mac-layer denial of service attacks for stock 802.11 systems. In Workshop on Broadband Wireless Services and Applications, BROADNETS, October 2004.

Cited By

View all
  • (2013)A Game Theoretical Approach to DesignIT Policy and Ethics10.4018/978-1-4666-2919-6.ch066(1475-1497)Online publication date: 2013
  • (2012)A Game Theoretical Approach to DesignWireless Sensor Networks and Energy Efficiency10.4018/978-1-4666-0101-7.ch022(464-488)Online publication date: 2012
  • (2012)A Protocol for Intrusion Detection Based on Learning Automata in Forwarding Packets for Distributed Wireless Sensor NetworksProceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery10.1109/CyberC.2012.69(373-380)Online publication date: 10-Oct-2012
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
PE-WASUN '05: Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
October 2005
292 pages
ISBN:1595931821
DOI:10.1145/1089803
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 October 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ad hoc networks
  2. routing

Qualifiers

  • Article

Conference

MSWiM05
Sponsor:

Acceptance Rates

Overall Acceptance Rate 70 of 240 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2013)A Game Theoretical Approach to DesignIT Policy and Ethics10.4018/978-1-4666-2919-6.ch066(1475-1497)Online publication date: 2013
  • (2012)A Game Theoretical Approach to DesignWireless Sensor Networks and Energy Efficiency10.4018/978-1-4666-0101-7.ch022(464-488)Online publication date: 2012
  • (2012)A Protocol for Intrusion Detection Based on Learning Automata in Forwarding Packets for Distributed Wireless Sensor NetworksProceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery10.1109/CyberC.2012.69(373-380)Online publication date: 10-Oct-2012
  • (2011)Distributed cross layer approach for detecting multilayer attacks in wireless multi-hop networks2011 IEEE Symposium on Computers & Informatics10.1109/ISCI.2011.5959000(692-698)Online publication date: Mar-2011
  • (2010)Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc NetworksSecurity of Self-Organizing Networks10.1201/EBK1439819197-12(195-225)Online publication date: 29-Sep-2010
  • (2010)Selfish MAC Misbehaviour Detection in Wireless Mesh NetworkProceedings of the 2010 International Conference on Advances in Computer Engineering10.1109/ACE.2010.91(130-133)Online publication date: 20-Jun-2010
  • (2010)The future of security in Wireless Multimedia Sensor NetworksTelecommunications Systems10.1007/s11235-009-9235-045:1(77-91)Online publication date: 1-Sep-2010
  • (2008)Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh NetworkProceedings of the 5th international conference on Autonomic and Trusted Computing10.1007/978-3-540-69295-9_23(279-288)Online publication date: 23-Jun-2008
  • (2007)DREAMComputer Communications10.1016/j.comcom.2007.02.01430:8(1841-1853)Online publication date: 1-Jun-2007
  • (2006)Mitigating Smart Selfish MAC Layer Misbehavior in Ad Hoc NetworksProceedings of the 2006 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications10.1109/WIMOB.2006.1696387(116-123)Online publication date: 19-Jun-2006
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media