Open Access Open Access  Restricted Access Subscription or Fee Access

MAC Layer Based Insubordination Mechanism for Differentiating and Penalizing/Rewarding Opportunist Nodes in 802.11 WLAN Network

Piyush Kumar Shukla, Sanjay Silakari, Sarita Singh Bhadauria

Abstract


We can’t say anything about behavior of a node in a wireless network scenario. We always aspect a good and gentle behavior from a node irrespective of channel utilization or throughput degradation by a particular node. We can easily declare a node as a non- legitimate/suspicious node but we can’t say what we should do with a node responsible for increasing throughput and reducing unused slots if it is not a legitimate/suspicious node. Throughputs may decrease because of suspicious nodes working as a malicious node, but it can also increase because of not following back-of rules will called as an opportunist node. We have emphasis on identification scheme for node characterization. In our model we have identified some parameters at the MAC Sub layer. We can realize and declare a node as an attacker in the network and can be discard it from the network if it crossed the predefine threshold value calculated on the basis of identified parameters. Before a standard threshold value calculated it can be punished by increasing back-off period by a predefined calculated value. Declared opportunist nodes can be promoted by decreased back-off values. We have proposed an algorithm for declaring, blocking and discarding a node if it is a malicious node and also we will give reward to opportunist nodes. The Defense algorithm increasing the received bandwidth and reducing the packet loss of legitimate users.

Keywords


BEB, MAC, Malicious, Attack, Suspicious, Opportunist, Penalty, Rewards

Full Text:

PDF

References


Pradeep Kyasanur and Nitin H. Vaidya, “Detection and Handling of MAC Layer misbehavior in Wireless Networks”, Technical report, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, August 2002.

R. Gunasegaram, Uamapathy Yamani, S. Sujitha at, “ A Distributed Mechanism for handling of Adaptive/Intelligent Selfish Misbehavior at MAC layer in Mobile Ad hoc Networks”, Journal of Computer Science and Technology, pp 472-481, May 2009.

K. Bian and J. Min Park “MAC layer Misbehaviors in Multi-Hop Cognitive radio network”, supported by National science Foundation under grant CNS-0524052.

Piyush Kumar Shukla, S. Silakari, Dr. Sarita Singh Bhaudoria ,”Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks” , International Journal of Computer Science and Information Security, Journal-ref: IJCSIS May 2009 Issue, Vol. 1, No.

Guang, C. Assi, “MAC layer misbehavior in ad hoc networks” Canadian conference, 2005, pp 1103-1106.

S. Radosavac, John S. Barras, George V. Moustakides, “Impact of Optimal MAC layer attacks on the Network layer” , 4thACM workshop on security of ad hoc and sensor networks Alexandria, Virginia, USA, 2006, pp 135-146.

S. Matri, T.J. Giuli, K. Lai, and Baker, “Mitigating Routing Misbehavior in Mobile Ad hoc Network” In Mobile Computing and Networking, page 255-265, 200.

IEEE Standard for Wireless LAN- Medium Access Control and Physical layer Specifications, p 802.11, 1999.

N.Nisan. “Algorithms for selfish agents”, In proceedings of the Symposium on Theoretical Aspects of Computer Science, LNCS 1563, pages 1-17, Berlin, March 1999, Springer m the biography.

R. Gunasegaram, Uamapathy Yamani, S. Sujitha at, “ A Distributed Mechanism for handling of Adaptive/Intelligent Selfish Misbehavior at MAC layer in Mobile Ad hoc Networks”, Journal of Computer Science and Technology, pp 472-481, May 2009.

K. Bian and J. Min Park “MAC layer Misbehaviors in Multi-Hop Cognitive radio network”, supported by National science Foundation under grant CNS-0524052.

Noor, M. Ardakani M. “Charaterisazing the traffic distribution in linear wireless sensor network” Communication Letters, IEEE, 2008

Srikanth Kandula, Dina Shantanu Sinha, Arthur Berger, “Dynamic Load Balancing without Packet Reordering”, MIT, Microsoft, ACM SIGCOMM Computer Communication Review, Volume 37, Number 2, April 2007.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.