skip to main content
10.1145/1164717.1164733acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
Article

Modeling and analysis of predictable random backoff in selfish environments

Published: 07 October 2006 Publication History

Abstract

We present Predictable Random Backoff (PRB) algorithm that is capable of mitigating the impacts of selfish hosts on well-behaved hosts in wireless local area networks (WLAN) and mobile ad hoc networks (MANETs). Here, hosts fail to follow the operation of PRB are easily detected. We present an accurate analytical model to compute the system throughput using a three-dimensional Markov chain and evaluate the performance of PRB under both normal case and selfish case. PRB and BEB (Binary Exponential Backoff) perform similarly in the former case. However, PRB can effectively mitigate the impacts of MAC selfish misbehavior and guarantee a fair share of the wireless channel for well behaved hosts.

References

[1]
G. Bianchi. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications, 18(3):535--547, March 2000.
[2]
L. Guang and C. Assi. Mitigating smart selfish MAC misbehavior in ad hoc networks. In Proc. IEEE WiMob, June 2006.
[3]
P. Kyasanur and N. Vaidya. Selfish MAC layer misbehavior in wireless networks. IEEE Transactions on Mobile Computing., September 2005.
[4]
M. Raya, J. P. Hubaux, and I. Aad. DOMINO: A system to detect greedy behavior in ieee 802.11 hotspots. In Proc. of ACM MobiSys, June 2004.
[5]
V. Gupta, S. Krishnamurthy, and M. Faloutsous. Denial of service attacks at the MAC layer in wireless ad hoc networks. In Proc. of MILCOM, 2002.

Cited By

View all
  • (2020)Prediction optimization of diffusion paths in social networks using integration of ant colony and densest subgraph algorithmsJournal of High Speed Networks10.3233/JHS-20063526:2(141-153)Online publication date: 12-Jun-2020
  • (2017)Boycott based enhanced correction scheme for mac layer misbehavior in wireless networksProcedia Computer Science10.1016/j.procs.2017.08.364113(248-252)Online publication date: 2017
  • (2017) Misbehavior analysis of IEEE 802.11 MAC layer in mobile ad hoc network using stochastic reward nets International Journal of Communication Systems10.1002/dac.338530:16Online publication date: 10-Aug-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MSWiM '06: Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems
October 2006
406 pages
ISBN:1595934774
DOI:10.1145/1164717
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 October 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ad hoc networks
  2. medium access control
  3. selfish misbehavior

Qualifiers

  • Article

Conference

MSWiM06
Sponsor:

Acceptance Rates

MSWiM '06 Paper Acceptance Rate 39 of 160 submissions, 24%;
Overall Acceptance Rate 398 of 1,577 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Prediction optimization of diffusion paths in social networks using integration of ant colony and densest subgraph algorithmsJournal of High Speed Networks10.3233/JHS-20063526:2(141-153)Online publication date: 12-Jun-2020
  • (2017)Boycott based enhanced correction scheme for mac layer misbehavior in wireless networksProcedia Computer Science10.1016/j.procs.2017.08.364113(248-252)Online publication date: 2017
  • (2017) Misbehavior analysis of IEEE 802.11 MAC layer in mobile ad hoc network using stochastic reward nets International Journal of Communication Systems10.1002/dac.338530:16Online publication date: 10-Aug-2017
  • (2016)Backslide Based Correction for MAC Layer Misbehavior in Wireless NetworksEurope and MENA Cooperation Advances in Information and Communication Technologies10.1007/978-3-319-46568-5_37(365-371)Online publication date: 23-Sep-2016
  • (2013)Game-theoretic analysis of selfish secondary users in cognitive radio networks2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN)10.1109/ICUFN.2013.6614880(547-552)Online publication date: Jul-2013
  • (2011)A Fair Transmission Opportunity by Detecting and Punishing the Malicious Wireless Stations in IEEE 802.11e EDCA NetworkIEEE Systems Journal10.1109/JSYST.2011.21655985:4(486-494)Online publication date: Dec-2011
  • (2011)Distributed Reaction Mechanisms to Prevent Selfish Misbehavior in Wireless Ad Hoc Networks2011 IEEE Global Telecommunications Conference - GLOBECOM 201110.1109/GLOCOM.2011.6134435(1-6)Online publication date: Dec-2011
  • (2010)MAC layer misbehavior effectiveness and collective aggressive reaction approachProceedings of the 33rd IEEE conference on Sarnoff10.5555/1843486.1843525(200-204)Online publication date: 12-Apr-2010
  • (2010)Detection and punishment of malicious wireless stations in IEEE 802.11e EDCA networkProceedings of the 33rd IEEE conference on Sarnoff10.5555/1843486.1843499(64-68)Online publication date: 12-Apr-2010
  • (2010)Greedy Receivers in IEEE 802.11 HotspotsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2010.27:4(410-423)Online publication date: 1-Oct-2010
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media