Performance Analysis of 802.11 MAC Protocol of Wireless Networks under Misbehaving Condition
Vamshrikrishna Raseddy Giri Neeraj Jaggi “MAC Layer Misbehavior Effectiveness and Collective Aggressive Reaction Approach.
Sam Jabbehdari, Anahita Sanandaji and Nasser Modiri “Evaluating and Mitigating the Effects of Selfish MAC Layer Misbehavior in MANETs.’’ JOURNAL OF COMPUTING, VOLUME 4, ISSUE 2,FEBRUARY 2012, ISSN 2151-9617
Pradeep Kyasanur, Nitin H.Vaidya” Detection and Handling of MAC Layer Misbehavior in Wireless Networks” Proceedings of the 2003 International Conference on Depandable Systems and Networks(DSN’03) o-7695-1959-8/03 $ 17.00 © 2003
M.Raya, J.P.Hubaux and I.Aad ,”DOMINO: Detecting MAC Layer Greedy behaviour in IEEE 802.11 hotspots,” IEEE Transactions on Mobile Computing,59120,1691-1705,2006
S.Radosavac, J.S.Baras and I.Koutspoulos,” A framework for MAC protocol misbehaviour detection in wireless networks,” in Proceedings of the 4th ACM workshop on Wireless Security(WiSe 05), 2005,pp. 33-42
L.Guang and C.Assi,Vulnerabilities of Ad Hoc Network routing protocols to MA misbehaviour. In IEEE/ACM WiMob,August 2005.
S.Radosavac, G.V.Moustakides, J.S. Baras, and I.Koutsopoulos,”An analytic framework for modelling and detecting access layer misbehaviour in wireless networks,” submitted to ACM Transactions on Informational Systems.
Y.Zhou,D.Wu and S.Nettles,Analyzing and Preventing MAC-Layer denial of service attacks for stock 802.11 systems.In workshop on BWSA, BROADNETS,October2004.
P.Kyasanur and N.Vaidya,”Selfish MAC Layer Misbehavior in Wireless Networks ,” IEEE Transactions on Mobile Computing,vol. 4950,2005,pp. 502-516.
M.Cagalj, S.Ganeriwal,I.Aad and J.P.Hubaux,”On selfish Behavior in CSMA/CA networks,”Proc.IEEE INFOCOM, vol 4,2005,pp. 2513-2524.
D.Johnson and D.Maltz,Dynamic source routing in ad hoc wireless networks.Mobile Computing, 353:153-181,1996.502,2002.
C.E.Perkins and E.M.Royer. Adhoc On-Demand DistanceVector Routing. Proceedings of the 2nd IEEE Workshop onMobile Computing Systems and Applications, pages 90–100,1999.
V. Park and M. Corson. A highly adaptive distributed routing algorithm for mobile wireless networks .Proc. IEEE INFOCOM,3:1405–1413, 1997.
T.Camp, J.Boleng, and V.Davies. A survey of mobility models for ad hoc network research. Wireless Communications and Mobile Computing, 2(5):483–502,2002.
F. Kargl, S. Schlott, A. Klenk, A. Geiss, and M. Weber, “Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks,”
Proceedings of 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), September 2004.
D. Djenouri and N. Badache, “Cross LayerApproach to Detect Data Packet Droppers inMobile Ad-Hoc Networks,” in IWSOS 2006, vol. 4124. Springer, 2006, pp. 163–176.
G. Di Caro and M. Dorigo, “Antnet: a Mobile Agents Approach to Adaptive Routing,” Universite Libre de Bruxelles, IRIDIA, Tech.Rep. 12, 1997.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.