We use cookies to improve your experience with our site.

Indexed in:

SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.

Submission System
(Author / Reviewer / Editor)
Raja Gunasekaran, Vaidheyanathan Rhymend Uthariaraj, Uamapathy Yamini, Rajagopalan Sudharsan, Selvaraj Sujitha Priyadarshini. A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks[J]. Journal of Computer Science and Technology, 2009, 24(3): 472-481.
Citation: Raja Gunasekaran, Vaidheyanathan Rhymend Uthariaraj, Uamapathy Yamini, Rajagopalan Sudharsan, Selvaraj Sujitha Priyadarshini. A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks[J]. Journal of Computer Science and Technology, 2009, 24(3): 472-481.

A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks

More Information
  • Author Bio:

    Raja Gunasekaran received the B.E. degree in computer science andengineering from the University of Madras, Chennai, India, and the M.E.degree in computer science and engineering from the BharathiyarUniversity, Coimbatore, India. Since 2003 he has been with AnnaUniversity, Chennai, India, where he is currently a lecturer in theDepartment of Information Technology. He is currently working towardthe Ph.D. degree in computer science and engineering in Anna University.His research interests include mobile ad hoc networks,mobile communications and WiMAX. He is associated with Journal ofNetwork and Computer Applications, Elsevier Publications as a reviewer.He is a member of IEEE and ISTE.

    Vaidheyanathan Rhymend Uthariaraj received the M.E. degree in computer science andengineering from Anna University, Chennai, India and the Ph.D. degree incomputer science and engineering from the Anna University Chennai,India. Since 1986 he has been with Anna University, Chennai, India wherehe is currently a professor in the Department of Computer Science andEngineering. He is also the Director Ramanujan Computer Centre andSecretary, Tamilnadu Engineering Admissions. He was the coordinator ofthe campus wide networking for MIT campus in Anna University Chennai,India. His research interests include operation research, computernetworks, pervasive computing and mobile communications. He is a memberof IEEE, CSI and ISTE.

    Uamapathy Yamini received the B.E. degree from Anna University, Chennai, India incomputer science and engineering. She is working as a software engineerwith Cisco Systems, India. She has worked on projects related toquality of service, priority scheduling, energy conservation in mobilead hoc networks. She is a member of ISTE and CSI.

    Rajagopalan Sudharsan received the B.E. degree from Anna University, Chennai, Indiain computer science and engineering. He is working as a softwareengineer with Cisco Systems, India. He has worked on projects relatedto service differentiation and MAC admission control in mobile ad hocnetworks. He is member of IEEE and ISTE.

    Selvaraj Sujitha Priyadarshini received the B.E. degree in computerscience and engineering from Anna University,Chennai, India. She is working as asoftware engineer with Tata Consultancy Services, India. She has workedon projects related to quality of service and service differentiationin WiMAX. She is a member of ISTE and CSI.

  • Received Date: May 24, 2008
  • Revised Date: January 06, 2009
  • Published Date: May 04, 2009
  • Medium access control (MAC) protocols such as IEEE 802.11 are used in wireless networks for sharing of the wireless medium. The random nature of the protocol operation together with the inherent difficulty of monitoring in the open poses significant challenges. All nodes are expected to comply with the protocol rules. But, some nodes in order to gain greater benefits misbehave by not complying with the rules. One such selfish misbehavior is waiting for smaller back-off intervals when compared to the other nodes in the same subnet. Such selfish misbehavior is being tackled in this paper. A diagnosis scheme and a penalty scheme are being proposed for overcoming such selfish-misbehavior at MAC layer of mobile ad hoc networks which could be extended to other types of networks also.
  • [1]
    Moscibroda T, Wattenhofer R. The complexity of connec-tivity in wireless networks. In Proc. IEEE INFOCOM,Barcelona, Spain, April 23-29, 2006, pp.1-3.
    [2]
    Alberto Lopez Toledo, Xiaodong Wang. Robust detectionof selˉsh misbehavior in wireless networks. IEEE Journalon Selected Areas in Communications, August 2007, 25(6):1124-1134.
    [3]
    Lopez Toledo A, Vercauteren T, Wang X. Adaptive optimiza-tion of IEEE 802.11 DCF based on Bayesian estimation ofthe number of competing terminals. IEEE Transaction onMobile Computing, Nov. 2006, 5(9): 1283-1296.
    [4]
    Li M, Prabhakaran B. MAC Layer Admission Control andPriority Re-Allocation for Handling QoS Guarantees in Non-Cooperative Wireless LANs Mobile Networks and Applica-tions. Springer Science & Business Media, Inc., 2005, pp.947-959.
    [5]
    Jin Y, Kesidis G. Distributed contention window control forselˉsh users in IEEE 802.11 wireless LANs. IEEE Journalon Selected Areas in Communications, August 2007, 25(6):1113-1123.
    [6]
    Lopez Toledo A, Wang X. A robust Kolmogorov-Smirnov de-tector for misbehavior in IEEE 802.11 DCF. In Proc. IEEEInternational Conference on Communications (ICC'07),Glasgow, UK, June 24-28, 2007, pp.1564-1569.
    [7]
    Chen L, Leneutre J. Selˉshness, not always a nightmare:Modeling selˉsh MAC behaviors in wireless mobile ad hocnetworks. In Proc. the 27th International Conference on Dis-tributed Computing Systems (ICDCS'07), Toronto, Canada,June 25-29, 2007, p.16.
    [8]
    Jang-Won Lee, Ao Tang, Jianwei Huang, Mung Chiang,A Robert Calderbank. Reverse-engineering MAC: A non-cooperative game model. IEEE Journal on Selected Areasin Communications, August 2007, 25(6): 1135-1147.
    [9]
    Venkata Nishanth Lolla, Lap Kong Law, Srikanth V Krish-namurthy. Detecting MAC layer back-o? timer violationsin mobile ad hoc networks. In Proc. the 26th IEEE In-ternational Conference on Distributed Computing Systems(ICDCS 2006), Lisbon, Portugal, July 4-7, 2006, pp.63-73.
    [10]
    Kyasanur P, Vaidya N. Selˉsh MAC layer misbehavior inwireless networks. IEEE Transactions on Mobile Computing,September 2005.
    [11]
    Mackenzie B, Wicker S B. Game theory and the design ofself-conˉguring, adaptive wireless networks. IEEE Commu-nications Magazine, 2000, 39(11): 126-131.
    [12]
    Raya M, Hubaux J P, Aad I. DOMINO: A system to de-tect greedy behavior in IEEE 802.11 hotspots. In Proc. MOBISYS'04, Boston, USA, June 6-9, 2004, pp.84-97.
    [13]
    Cardenas A A, Radosavac S, Baras J S. Detection and preven-tion of MAC layer misbehavior for ad hoc networks. TechnicalReport, Univ. Maryland, 2004.
    [14]
    Fall K, Varadhan K. Ns notes and documentation. UC Berke-ley, LBL, USC/ISI, Xerox PARC, 2003.
    [15]
    Jin Y, Kesidis G. Charge sensitive and incentive compatibleend to end window-based control for selˉsh users. IEEE JSACSpecial Issue on Network Economics and Pricing, May 2006,24(5): 952-961.
    [16]
    Konorski J. Multiple access in ad-hoc wireless LANs with non-cooperative stations. In Proc. NETWORKING, Coimbra,Portugal, LNCS 2345, Springer, May 15-19, 2002, pp.1141-1146.
    [17]
    MacKenzie B, Wicker S B. Stability of multipacket slottedaloha with selˉsh users and perfect information. In Proc.Infocom 2003, San Francisco, CA, IEEE, March 30-April 3,2003, pp.1583-1597.
  • Related Articles

    [1]Bo Chen, Liang Liu, Hua-Dong Ma. CDM: Content Diffusion Model for Information-Centric Networks[J]. Journal of Computer Science and Technology, 2021, 36(6): 1431-1451. DOI: 10.1007/s11390-021-0205-7
    [2]Shou-Wan Gao, Peng-Peng Chen, Xu Yang, Qiang Niu. Multi-Sensor Estimation for Unreliable Wireless Networks with Contention-Based Protocols[J]. Journal of Computer Science and Technology, 2018, 33(5): 1072-1085. DOI: 10.1007/s11390-018-1862-z
    [3]Yue-Feng Du, De-Rong Shen, Tie-Zheng Nie, Yue Kou, Ge Yu. Content-Related Repairing of Inconsistencies in Distributed Data[J]. Journal of Computer Science and Technology, 2016, 31(4): 741-758. DOI: 10.1007/s11390-016-1660-4
    [4]Jin-Tao Meng, Jian-Rui Yuan, Sheng-Zhong Feng, Lian-Sheng Tan. Power Adjusting Algorithm: A New Cross-Layer Power Saving Mechanism for Mobile Ad-Hoc Networks[J]. Journal of Computer Science and Technology, 2013, 28(1): 42-53. DOI: 10.1007/s11390-013-1311-y
    [5]Jun Wang, Yong-Tao Cao, Jun-Yuan Xie, Shi-Fu Chen. Energy Efficient Backoff Hierarchical Clustering Algorithms for Multi-Hop Wireless Sensor Networks[J]. Journal of Computer Science and Technology, 2011, 26(2): 283-291. DOI: 10.1007/s11390-011-1131-x
    [6]Wei-Sheng Si, Cheng-Zhi Li. RMAC: A Reliable MAC Protocol Supporting Multicastfor Wireless Ad Hoc Networks[J]. Journal of Computer Science and Technology, 2005, 20(5): 702-712.
    [7]Yun Li, Ke-Ping Long, Wei-Liang Zhao, Feng-Rui Yang. RWBOA(Pd,w): Novel Backoff Algorithm for IEEE 802.11 DCF[J]. Journal of Computer Science and Technology, 2005, 20(2).
    [8]WU HaiTao, LIN Yu, CHENG ShiDuan, PENG Yong, LONG KePing. IEEE 802.11 Distributed Coordination Function: Enhancement and Analysis[J]. Journal of Computer Science and Technology, 2003, 18(5).
    [9]WU HaiTao, LIN Yu, CHENG ShiDuan. A Distributed Fair Scheduling Scheme in Wireless LAN[J]. Journal of Computer Science and Technology, 2003, 18(5).
    [10]WU HaiTao, CHENG ShiDuan. DCF+: An Enhancement for Reliable Transport Protocol over WLAN[J]. Journal of Computer Science and Technology, 2003, 18(2).

Catalog

    Article views (29) PDF downloads (2438) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return