Open Access Open Access  Restricted Access Subscription or Fee Access

Detection and Defense Scheme against Selfish Nodes in MAC-Layer

V. Shanmathi, C. Poongodi

Abstract


IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing ad hoc networks. In ad hoc networks, selfish nodes deviating from the standard MAC (Medium Access Control) protocol degrades normal nodes performance and are difficult to detect. Specifically, the non-deterministic nature of the IEEE 802.11 MAC protocol imposes great challenges to distinguish selfish nodes from well-behaved nodes. The traditional selfish misbehavior detection approaches either rely on a large amount of historical data to perform detection, or employ throughput or delay models that are only valid in WLANs for detection. Since they are based on large amount of data, the detection may take very long time. The proposed real time detection scheme for multi hop ad hoc networks requires only few samples and can adapt to channel dynamics more quickly. The selfish nodes are detected based on certain parameters such as slot time, SIFS, DIFS. If a node is determined as selfish node, the penalty scheme is applied to punish the selfish node by decreasing its throughput and specifically, all its one hop neighbours stop forwarding the packets for it until they receive another decision notice indicating that this node is not selfish any more. Based on the detection there are 3 defense scheme namely, i) naive selfish node ii) random selfish node iii) γ-persistent selfish nodes. The defense schemes are designed to prevent the selfish nodes from degrading normal nodes performance.


Keywords


Selfish Misbehavior, IEEE 802.11 MAC, Detection, Defense

Full Text:

PDF

References


W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The feasibility of launching and detecting jamming attacks in wireless networks,” in Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., Urbana-Champaign, IL, USA, May 2005, pp. 46–57.

A. L. Toledo, and X. Wang, “Robust detection of MAC layer denial-of-service attacks in CSMA/CA wireless networks,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 347–358, Sep. 2008.

M. Manzo, T. Roosta, and S. Sastry, “Time synchronization attacks in sensor networks,” in Proc. ACM 3rd Workshop Security Ad Hoc Sensor Netw., Alexandria, VA, USA, Nov. 2005, pp. 107–116.

D. R. Raymond, R. C. Marchany, and M. I. Brownfield, “Effects of denial-of-sleep attacks on wireless sensor network MAC proto-cols,” IEEE Trans. Veh. Technol., vol. 58, no. 1, pp. 367–380, Jan. 2009.

S. Radosavac, J. S. Babaras, and L. Koutsopoulos, “A framework for MAC protocol misbehavior detection in wireless networks,” in

Proc. 4th ACM Workshop Wireless Security, Cologne, Germany, Sep. 2005, pp. 33–42.

P. Kyasanur and N. Vaidya, “Selfish MAC layer misbehavior in wireless network,” IEEE Trans. Mobile Comput., vol. 4, no. 5, 502–516, Sep. 2005.

Z. Lu, W. Wang, and C. Wang, “On order gain of backoff misbehav-ing nodes in CSMA/CA-based wireless networks,” in Proc. IEEE Conf. Comput. Commun., San Diego, CA, USA, Mar. 2010, pp. 1–9.

Y. Law and M. Palaniswami, “Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols,” ACM Trans. Sens. Netw., vol. 5, no. 1, pp. 347–358, Feb. 2009.

K. El-Khatib, “Impact of feature reduction on the efficiency of wireless intrusion detection systems,” IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 8, pp. 1143–1149, Aug. 2010.

V. Gupta, S. Krishnamurthy, and M. Faloutsos, “Denial of service attacks at the MAC layer in wireless ad hoc networks,” in Proc. IEEE Mil. Commun. Conf., Anaheim, CA, USA, Oct. 2002, 1118–1123.

T. Zhou, R. R. Choudhury, and P. Ning, “P2dap-sybil attacks detection in vehicular ad hoc networks,” IEEE J. Sel. Areas Com-mun., vol. 29, no. 3, pp. 582–594, Mar. 2011.

H. Yu, P. B. Gibbons, and M. Kaminsky, “Sybillimit: A near-opti-mal social network defense against sybil attacks,” IEEE/ACM Trans. Netw., vol. 18, no. 3, pp. 885–898, Jun. 2010.

M. Raya, J. Hubaux, and I. Aad, “Domino: A system to detect greedy behavior in ieee 802.11 hotspots,” in Proc. ACM 2nd Int. Conf. Mobile Syst., Appl. Serv., Boston, MA, USA, Jun. 2004, 84–97.

A. A. Cardenas, S. Radosavac, and J. S. Baras, “Performance com-parison of detection schemes for MAC layer misbehavior,” in

Proc. IEEE Conf. Comput. Commun., Anchorage, Alaska, May 2007, 1496–1504.

J. Tang, Y. Cheng, and W. Zhuang, “An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks,” in Proc. IEEE Conf. Comput. Commun., Shanghai, China, Apr. 2011, pp. 1638–1646.

N. Jaggi, V. R. Giri, and V. Namboodiri, “Distributed reaction mechanisms to prevent selfish misbehavior in wireless ad hoc networks,” in Proc. IEEE Global Telecommun. Conf., Houston, TX, USA, Dec. 2011, pp. 1–6.

A. A. Cardenas, S. Radosavac, and J. S. Baras, “Detection and pre-vention of MAC layer misbehavior in ad hoc networks,” in Proc. ACM 2nd Workshop Security Ad Hoc Sensor Netw., Washington, DC, USA, Oct. 2004, pp. 17–22.

J. Konorski, “Protection of fairness for multimedia traffic streams in a non-cooperative wireless LAN setting,” in Proc. 6th Int. Conf. Protocols Multimedia Syst., 2001, pp. 116–129.

A. C. V. Gummalla and J. O. Limb, “Wireless collision detect (WCD) Multiple access with receiver initiated feedback and car-rier detect signal,” in Proc. IEEE Int. Conf. Commun., New Orleans, LA, USA, Jun. 2000, pp. 397–401.

H. Zhai and Y. Fang, “Physical carrier sensing and spatial reuse in multirate and multihop wireless ad hoc networks,” in Proc. IEEE Conf. Comput. Commun., Barcelona, Spain, Apr. 2006, pp. 1–12.

I. W.-H. Ho, and S. C. Liew, “Impact of power control on perfor-mance of IEEE 802.11 wireless networks,” IEEE Trans. Mobile Com-put., vol. 6, no. 11, pp. 1245–1258, Nov. 2007.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.