Open Access Open Access  Restricted Access Subscription or Fee Access

Performance Analysis of 802.11 MAC Protocol of Wireless Networks under Misbehaving Condition

Neha Singh Sisodiya, Dr. Sarita Singh Bhadauria


In this paper the performance of MAC Layer is seen when the number of nodes which are misbehaving increases in the wireless networks. Mobile ad hoc networks depends on the network nodes cooperation in forwarding packets due to the lack of centralized authority. A network node may incline not to cooperate with other nodes in order to save its resources due to selfishness. By analysing all parameters in misbehaving conditions the most appropriate fixed value of them can be determined in order to obtain minimize the misbehaving nodes bad performance and to improve the performance of overall network. Here qualnet 5.2 is used for analysis and simulation of the network.


Distributed Coordination Function, Legitimate Nodes, 802.11 MAC Protocol, Selfish Misbehavior

Full Text:



Vamshrikrishna Raseddy Giri Neeraj Jaggi “MAC Layer Misbehavior Effectiveness and Collective Aggressive Reaction Approach.

Sam Jabbehdari, Anahita Sanandaji and Nasser Modiri “Evaluating and Mitigating the Effects of Selfish MAC Layer Misbehavior in MANETs.’’ JOURNAL OF COMPUTING, VOLUME 4, ISSUE 2,FEBRUARY 2012, ISSN 2151-9617

Pradeep Kyasanur, Nitin H.Vaidya” Detection and Handling of MAC Layer Misbehavior in Wireless Networks” Proceedings of the 2003 International Conference on Depandable Systems and Networks(DSN’03) o-7695-1959-8/03 $ 17.00 © 2003

M.Raya, J.P.Hubaux and I.Aad ,”DOMINO: Detecting MAC Layer Greedy behaviour in IEEE 802.11 hotspots,” IEEE Transactions on Mobile Computing,59120,1691-1705,2006

S.Radosavac, J.S.Baras and I.Koutspoulos,” A framework for MAC protocol misbehaviour detection in wireless networks,” in Proceedings of the 4th ACM workshop on Wireless Security(WiSe 05), 2005,pp. 33-42

L.Guang and C.Assi,Vulnerabilities of Ad Hoc Network routing protocols to MA misbehaviour. In IEEE/ACM WiMob,August 2005.

S.Radosavac, G.V.Moustakides, J.S. Baras, and I.Koutsopoulos,”An analytic framework for modelling and detecting access layer misbehaviour in wireless networks,” submitted to ACM Transactions on Informational Systems.

Y.Zhou,D.Wu and S.Nettles,Analyzing and Preventing MAC-Layer denial of service attacks for stock 802.11 systems.In workshop on BWSA, BROADNETS,October2004.

P.Kyasanur and N.Vaidya,”Selfish MAC Layer Misbehavior in Wireless Networks ,” IEEE Transactions on Mobile Computing,vol. 4950,2005,pp. 502-516.

M.Cagalj, S.Ganeriwal,I.Aad and J.P.Hubaux,”On selfish Behavior in CSMA/CA networks,”Proc.IEEE INFOCOM, vol 4,2005,pp. 2513-2524.

D.Johnson and D.Maltz,Dynamic source routing in ad hoc wireless networks.Mobile Computing, 353:153-181,1996.502,2002.

C.E.Perkins and E.M.Royer. Adhoc On-Demand DistanceVector Routing. Proceedings of the 2nd IEEE Workshop onMobile Computing Systems and Applications, pages 90–100,1999.

V. Park and M. Corson. A highly adaptive distributed routing algorithm for mobile wireless networks .Proc. IEEE INFOCOM,3:1405–1413, 1997.

T.Camp, J.Boleng, and V.Davies. A survey of mobility models for ad hoc network research. Wireless Communications and Mobile Computing, 2(5):483–502,2002.

F. Kargl, S. Schlott, A. Klenk, A. Geiss, and M. Weber, “Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks,”

Proceedings of 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), September 2004.

D. Djenouri and N. Badache, “Cross LayerApproach to Detect Data Packet Droppers inMobile Ad-Hoc Networks,” in IWSOS 2006, vol. 4124. Springer, 2006, pp. 163–176.

G. Di Caro and M. Dorigo, “Antnet: a Mobile Agents Approach to Adaptive Routing,” Universite Libre de Bruxelles, IRIDIA, Tech.Rep. 12, 1997.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.