Selfish MAC layer misbehavior in wireless networks
Top Cited Papers
- 8 August 2005
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Mobile Computing
- Vol. 4 (5) , 502-516
- https://doi.org/10.1109/tmc.2005.71
Abstract
Wireless medium access control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel. In this environment, selfish hosts that fail to adhere to the MAC protocol may obtain an unfair throughput share. For example, IEEE 802.11 requires hosts competing for access to the channel to wait for a "backoff" interval, randomly selected from a specified range/before initiating a transmission. Selfish hosts may wait for smaller backoff intervals than well-behaved hosts, thereby obtaining an unfair advantage. We present modifications to the IEEE 802.11 protocol to simplify detection of such selfish hosts and analyze the optimality of the chosen strategy. We also present a penalty scheme for punishing selfish misbehavior. We develop two misbehavior models to capture the behavior of misbehaving hosts. Simulation results under these misbehavior models indicate that our detection and penalty schemes are successful in handling MAC layer misbehavior.Keywords
This publication has 15 references indexed in Scilit:
- Robust congestion signalingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Detection and handling of MAC layer misbehavior in wireless networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Stability of multipacket slotted Aloha with selfish users and perfect informationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Enforcing service availability in mobile ad-hoc WANsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Game theory and the design of self-configuring, adaptive wireless networksIEEE Communications Magazine, 2001
- Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN SettingPublished by Springer Nature ,2001
- Algorithmic Mechanism DesignGames and Economic Behavior, 2001
- SEEDEXPublished by Association for Computing Machinery (ACM) ,2001
- The quest for security in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2001
- TCP congestion control with a misbehaving receiverACM SIGCOMM Computer Communication Review, 1999