DOI QR코드

DOI QR Code

A Cluster-based Countermeasure against Media Access Control Layer Attacks in IEEE 802.11 Ad Hoc Networks

  • Shi, Fei (Department of Computer Science, Yonsei University) ;
  • Song, Joo-Seok (Department of Computer Science, Yonsei University)
  • Received : 2011.02.20
  • Accepted : 2012.06.13
  • Published : 2012.06.30

Abstract

The characteristics of ad hoc networks, such as the absence of infrastructure, a dynamic topology, a shared wireless medium and a resource-constrained environment pose various security challenges. Most previous studies focused on the detection of misbehavior after it had occurred. However, in this paper we propose a new way of thinking to evade the occurrence of misbehavior. In our scheme, we firstly present a clustering algorithm that employs a powerful analytic hierarchy process methodology to elect a clusterhead for each cluster. The clusterhead in each cluster is then allowed to assign the backoff values to its members, i.e., originators, rather than permitting the originators to choose the backoff values by themselves. Through this media access control layer misbehavior detection mechanism, the misuse of the backoff in the media access control layer in the 802.11 distributed coordination function can be detected.

Keywords

References

  1. Kannhavong B., Nakayama H., Nemoto Y., Kato N., and Jamalipour A., "A survey of routing attacks in mobile ad hoc networks," Wireless Communications, vol.14, no.5, pp. 85-91, 2007. https://doi.org/10.1109/MWC.2007.4396947
  2. D. Wang, M. Hu, and H. Zhi, "A survey of secure routing in ad hoc networks," in Proc. of 9th International Conference on Web-Age Information Management, pp.482-486, Jul.2008.
  3. K. Hong, S. Lee, K. Kim, and Y. Kim, "Channel condition based contention window adaptation in IEEE 802.11 WLANs," IEEE Transactions on Communications, vol.60, no.2, pp.469-478, 2012. https://doi.org/10.1109/TCOMM.2012.012012.100472
  4. M. Cagalj, S. Ganeriwal, I. Aad, and J. P. Hubaux, "On cheating in CSMA/CA ad hoc networks," EPFL Technical report, No. IC/2004/27, 2004. http://www.mendeley.com/research/on-cheating-in-csmaca-ad-hoc-networks/.
  5. Kyasanur P. and Vaidya N, "Detection and handling of MAC layer misbehavior in wireless networks," in Proc. of International Conference on Dependable Systems and Networks, pp.173-82, Jun.2003.
  6. J. Liu, P. Geng, Y. Qiu, and G. Feng, "A secure routing mechanism in AODV for Ad Hoc networks," in Proc. of International Symposium on Intelligent Signal Processing and Communication Systems, pp.435-438, Nov.2007.
  7. Andras Farago, "Scalable analysis and design of ad hoc networks via random graph theory," in Proc. of 6th international workshop on Discrete algorithms and methods for mobile computing and communications, pp.43-50, Sep.2002.
  8. Tsumoto S., and Hirano S., "Visualization of rule's similarity using multidimensional scaling," in Proc. of 3rd IEEE International Conference on Data Mining, pp.339-346, Nov.2003.
  9. Thomas L. Saaty, "Decision making with the analytic hierarchy process," International Journal of Services Sciences, vol.1, no.1, pp.83-98, 2008. https://doi.org/10.1504/IJSSCI.2008.017590
  10. Fei Shi, Jaejong Baek, Jooseok Song, and Weijie Liu, "A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks," Journal of Telecommunication Systems, 2011.
  11. Dilip Kumar, Trilok C. Aseri and R.B. Patel, "Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor networks," International Journal of Information Technology, Communications and Convergence, vol.1, no.2, pp.130-145, 2011. https://doi.org/10.1504/IJITCC.2011.039281

Cited by

  1. A Reliant Certificate Revocation of Malicious Nodes in MANETs vol.90, pp.2, 2012, https://doi.org/10.1007/s11277-015-3016-8