Browse > Article
http://dx.doi.org/10.5391/JKIIS.2012.22.1.12

A Study on Detecting Selfish Nodes in Wireless LAN using Tsallis-Entropy Analysis  

Ryu, Byoung-Hyun (경남대학교 첨단공학과)
Seok, Seung-Joon (경남대학교 컴퓨터공학과)
Publication Information
Journal of the Korean Institute of Intelligent Systems / v.22, no.1, 2012 , pp. 12-21 More about this Journal
Abstract
IEEE 802.11 MAC protocol standard, DCF(CSMA/CA), is originally designed to ensure the fair channel access between mobile nodes sharing the local wireless channel. It has been, however, revealed that some misbehavior nodes transmit more data than other nodes through artificial means in hot spot area spreaded rapidly. The misbehavior nodes may modify the internal process of their MAC protocol or interrupt the MAC procedure of normal nodes to achieve more data transmission. This problem has been referred to as a selfish node problem and almost literatures has proposed methods of analyzing the MAC procedures of all mobile nodes to detect the selfish nodes. However, these kinds of protocol analysis methods is not effective at detecting all kinds of selfish nodes enough. This paper address this problem of detecting selfish node using Tsallis-Entropy which is a kind of statistical method. Tsallis-Entropy is a criteria which can show how much is the density or deviation of a probability distribution. The proposed algorithm which operates at a AP node of wireless LAN extracts the probability distribution of data interval time for each node, then compares the one with a threshold value to detect the selfish nodes. To evaluate the performance of proposed algorithm, simulation experiments are performed in various wireless LAN environments (congestion level, how selfish node behaviors, threshold level) using ns2. The simulation results show that the proposed algorithm achieves higher successful detection rate.
Keywords
Wireless Lan; Selfish Node; Detecting Algorithm; Tsallis-Entropy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Pablo Serrano, Albert Banchs, Valerio Targon, and Jose Felix Kukjelka, "Detecting Selfish Configurations in 802.11 WLANs," IEEE Communications Letters, vol. 14, issue. 2, pp. 142-144, 2010.   DOI
2 한유훈, 강동훈, 석승준, "통계적 분석을 통한 무선랜의 탐욕(Greedy) 노드 탐지," 통신망 운용 관리학술 대회, 2011.
3 M. Cagalj, S. Ganeriwal, I Aad, and J.P Hubaux, "On Selfish Behavior in CSMA/CA Networks," in Proc. of the IEEE INFOCOM, vol. 4, pp. 2513-2524, 2005.
4 C.E. Shannon, "Prediction and entropy of printed English," The Bell System Technical Journal , vol. 30, pp. 50-64, 1951.   DOI
5 Giseop No, Ilkyeun Ra, "An Efficient and Reliabl e DDoS Attack Detection Using a Fast Entropy Computation Method," Communications and Information Technology, pp. 1223-1228, Sept. 2009.
6 Qian Quan, Che Hong-Yi, Zhang Rui, "Entropy Based Method for Network Anomaly Detection," IEEE Pacific Rim International Symposium on Dependable Computing, pp. 189-191, 2009.
7 Artur Ziviani, Antonio Tadeu A. Gomes, Marcelo L. Monsores, Paulo S. S. Rodrigues, "Network Anomaly detection using Nonextensive Entropy," IEEE Communication Letters, vol. 11, no. 12, pp. 1034-1036, 2007.   DOI
8 Konstantinos Pelechrinis, Guanhua Yan., etc. "Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks," IEEE Infocom 2009 proceedings, pp. 657-665, 2009.
9 IEEE 802.11 Working Group, "IEEE 802.11-2007: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications," June 2007.
10 M. Raya, J. P. Hubaux, and I. Aad, "DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspot," IEEE Transaction on Mobile Computing, vol. 5, issue. 12, pp. 1681-1705, Dec. 2006.