Skip to main content
Top
Published in: Mobile Networks and Applications 5/2015

01-10-2015

A Green Approach for Selfish Misbehavior Detection in 802.11-Based Wireless Networks

Authors: Thaier Hayajneh, Ghada Almashaqbeh, Sana Ullah

Published in: Mobile Networks and Applications | Issue 5/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

IEEE 802.11 is one of the most well-established and widely used standard for wireless LAN. Its Medium Access control (MAC) layer assumes that the devices adhere to the standard’s rules and timers to assure fair access and sharing of the medium. However, wireless cards driver flexibility and configurability make it possible for selfish misbehaving nodes to take advantages over the other well-behaving nodes. The existence of selfish nodes degrades the QoS for the other devices in the network and may increase their energy consumption. In this paper we propose a green solution for selfish misbehavior detection in IEEE 802.11-based wireless networks. The proposed scheme works in two phases: Global phase which detects whether the network contains selfish nodes or not, and Local phase which identifies which node or nodes within the network are selfish. Usually, the network must be frequently examined for selfish nodes during its operation since any node may act selfishly. Our solution is green in the sense that it saves the network resources as it avoids wasting the nodes energy by examining all the individual nodes of being selfish when it is not necessary. The proposed detection algorithm is evaluated using extensive OPNET simulations. The results show that the Global network metric clearly indicates the existence of a selfish node while the Local nodes metric successfully identified the selfish node(s). We also provide mathematical analysis for the selfish misbehaving and derived formulas for the successful channel access probability.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
3.
go back to reference Cagalj M, Ganeriwal S, Aad I, Hubaux JP (2004) On cheating in csma/ca ad hoc networks. Tech. rep., Proc. IEEE INFOCOM 2005 Cagalj M, Ganeriwal S, Aad I, Hubaux JP (2004) On cheating in csma/ca ad hoc networks. Tech. rep., Proc. IEEE INFOCOM 2005
4.
go back to reference Cardenas A, Radosavac S, Baras J (2009) Evaluation of detection algorithms for mac layer misbehavior: Theory and experiments. IEEE/ACM Trans Networking 17(2):605–617CrossRef Cardenas A, Radosavac S, Baras J (2009) Evaluation of detection algorithms for mac layer misbehavior: Theory and experiments. IEEE/ACM Trans Networking 17(2):605–617CrossRef
6.
go back to reference Deng DJ, Chen HC, Chao HC, Huang YM (2011) A collision alleviation scheme for ieee 802.11 p vanets. Wirel Pers Commun 56(3):371–383CrossRef Deng DJ, Chen HC, Chao HC, Huang YM (2011) A collision alleviation scheme for ieee 802.11 p vanets. Wirel Pers Commun 56(3):371–383CrossRef
7.
go back to reference Deng DJ, Ke CH, Chao HC, Huang YM (2010) On delay constrained cac scheme and scheduling policy for cbr traffic in ieee 802.11 e wireless lans. Wirel Commun Mob Comput 10(11):1509–1520CrossRef Deng DJ, Ke CH, Chao HC, Huang YM (2010) On delay constrained cac scheme and scheduling policy for cbr traffic in ieee 802.11 e wireless lans. Wirel Commun Mob Comput 10(11):1509–1520CrossRef
8.
go back to reference Hayajneh T, Almashaqbeh G, Ullah S, Vasilakos A (2014) A survey of wireless technologies coexistence in wban: analysis and open research issues. Wirel Netw 20(8):2165–2199. doi:10.1007/s11276-014-0736-8 Hayajneh T, Almashaqbeh G, Ullah S, Vasilakos A (2014) A survey of wireless technologies coexistence in wban: analysis and open research issues. Wirel Netw 20(8):2165–2199. doi:10.​1007/​s11276-014-0736-8
9.
go back to reference Hayajneh T, Krishnamurthy P, Tipper D, Kim T (2009) Detecting malicious packet dropping in the presence of collisions and channel errors in wireless ad hoc networks. In: IEEE international conference on communications, 2009. ICC ’09, pp. 1–6. doi:10.1109/ICC.2009.5198910 Hayajneh T, Krishnamurthy P, Tipper D, Kim T (2009) Detecting malicious packet dropping in the presence of collisions and channel errors in wireless ad hoc networks. In: IEEE international conference on communications, 2009. ICC ’09, pp. 1–6. doi:10.​1109/​ICC.​2009.​5198910
11.
go back to reference Konorski J (2001) Protection of fairness for multimedia traffic streams in a non-cooperative wireless lan setting. In: van Sinderen M, Nieuwenhuis L (eds) Protocols for Multimedia Systems. Lecture Notes in Computer Science, vol 2213. Springer, Berlin Heidelberg, pp 116–129. doi:10.1007/3-540-45481-0_10 Konorski J (2001) Protection of fairness for multimedia traffic streams in a non-cooperative wireless lan setting. In: van Sinderen M, Nieuwenhuis L (eds) Protocols for Multimedia Systems. Lecture Notes in Computer Science, vol 2213. Springer, Berlin Heidelberg, pp 116–129. doi:10.​1007/​3-540-45481-0_​10
12.
go back to reference Konorski J (2002) Multiple access in ad-hoc wireless lans with noncooperative stations. In: Gregori E, Conti M, Campbell A, Omidyar G, Zukerman M (eds) NETWORKING 2002: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications, Lecture Notes in Computer Science vol. 2345, pp. 1141–11466. doi:10.1007/3-540-47906-6_98 Konorski J (2002) Multiple access in ad-hoc wireless lans with noncooperative stations. In: Gregori E, Conti M, Campbell A, Omidyar G, Zukerman M (eds) NETWORKING 2002: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications, Lecture Notes in Computer Science vol. 2345, pp. 1141–11466. doi:10.​1007/​3-540-47906-6_​98
13.
go back to reference Kyasanur P, Vaidya N (2003) Detection and handling of mac layer misbehavior in wireless networks. In: Proceedings of the 2003 international conference on dependable systems and networks, 2003. pp 173–182. doi:10.1109/DSN.2003.1209928 Kyasanur P, Vaidya N (2003) Detection and handling of mac layer misbehavior in wireless networks. In: Proceedings of the 2003 international conference on dependable systems and networks, 2003. pp 173–182. doi:10.​1109/​DSN.​2003.​1209928
15.
go back to reference Li M, Salinas S, Li P, Sun J, Huang X (2014) Mac-layer selfish misbehavior in ieee 802.11 ad hoc networks: Detection and defense. IEEE Trans Mob Comput PP(99):1–1. doi:10.1109/TMC.2014.2348560 Li M, Salinas S, Li P, Sun J, Huang X (2014) Mac-layer selfish misbehavior in ieee 802.11 ad hoc networks: Detection and defense. IEEE Trans Mob Comput PP(99):1–1. doi:10.​1109/​TMC.​2014.​2348560
16.
go back to reference Lopez Toledo A, Wang X (2007) A robust kolmogorov-smirnov detector for misbehavior in ieee 802.11 dcf. In: IEEE international conference on communications, 2007, ICC ’07, pp 1564–1569. doi:10.1109/ICC.2007.262 Lopez Toledo A, Wang X (2007) A robust kolmogorov-smirnov detector for misbehavior in ieee 802.11 dcf. In: IEEE international conference on communications, 2007, ICC ’07, pp 1564–1569. doi:10.​1109/​ICC.​2007.​262
17.
go back to reference Paul U, Kashyap A, Maheshwari R, Das S (2013) Passive measurement of interference in wifi networks with application in misbehavior detection. IEEE Trans Mob Comput 12(3):434–446. doi:10.1109/TMC.2011.259 CrossRef Paul U, Kashyap A, Maheshwari R, Das S (2013) Passive measurement of interference in wifi networks with application in misbehavior detection. IEEE Trans Mob Comput 12(3):434–446. doi:10.​1109/​TMC.​2011.​259 CrossRef
18.
go back to reference Pelechrinis K, Yan G, Eidenbenz S, Krishnamurthy S (2009) Detecting selfish exploitation of carrier sensing in 802.11 networks. In: INFOCOM 2009, IEEE, pp 657–665 Pelechrinis K, Yan G, Eidenbenz S, Krishnamurthy S (2009) Detecting selfish exploitation of carrier sensing in 802.11 networks. In: INFOCOM 2009, IEEE, pp 657–665
19.
20.
go back to reference Radosavac S, Baras JS, Koutsopoulos I (2005) A framework for mac protocol misbehavior detection in wireless networks. In: Proceedings of the 4th ACM workshop on wireless security, WiSe ’05. ACM, New York, NY, USA, pp 33–42. doi:10.1145/1080793.1080801 Radosavac S, Baras JS, Koutsopoulos I (2005) A framework for mac protocol misbehavior detection in wireless networks. In: Proceedings of the 4th ACM workshop on wireless security, WiSe ’05. ACM, New York, NY, USA, pp 33–42. doi:10.​1145/​1080793.​1080801
21.
go back to reference Radosavac S, Moustakides G, Baras JS, Koutsopoulos I (2008) An analytic framework for modeling and detecting access layer misbehavior in wireless networks. ACM Trans Inf Syst Secur 11(4):19:1–19:28. doi:10.1145/1380564.1380567 CrossRef Radosavac S, Moustakides G, Baras JS, Koutsopoulos I (2008) An analytic framework for modeling and detecting access layer misbehavior in wireless networks. ACM Trans Inf Syst Secur 11(4):19:1–19:28. doi:10.​1145/​1380564.​1380567 CrossRef
23.
go back to reference Raya M, Hubaux JP, Aad I (2004) Domino: A system to detect greedy behavior in ieee 802.11 hotspots. In: Proceedings of the 2nd international conference on mobile systems, applications, and services, MobiSys ’04. ACM, New York, NY, pp. 84–97. doi:10.1145/990064.990077 Raya M, Hubaux JP, Aad I (2004) Domino: A system to detect greedy behavior in ieee 802.11 hotspots. In: Proceedings of the 2nd international conference on mobile systems, applications, and services, MobiSys ’04. ACM, New York, NY, pp. 84–97. doi:10.​1145/​990064.​990077
24.
go back to reference Rong Y, Lee SK, Choi HA (2006) Detecting stations cheating on backoff rules in 802.11 networks using sequential analysis. In: Proceedings of the 25th IEEE international conference on computer communications, INFOCOM 2006. pp 1–13. doi:10.1109/INFOCOM.2006.305 Rong Y, Lee SK, Choi HA (2006) Detecting stations cheating on backoff rules in 802.11 networks using sequential analysis. In: Proceedings of the 25th IEEE international conference on computer communications, INFOCOM 2006. pp 1–13. doi:10.​1109/​INFOCOM.​2006.​305
27.
go back to reference Tang J, Cheng Y, Zhuang W (2011) An analytical approach to real-time misbehavior detection in ieee 802.11 based wireless networks. In: Proceedings of the IEEE INFOCOM, 2011. pp 1638–1646. doi:10.1109/INFCOM.2011.5934957 Tang J, Cheng Y, Zhuang W (2011) An analytical approach to real-time misbehavior detection in ieee 802.11 based wireless networks. In: Proceedings of the IEEE INFOCOM, 2011. pp 1638–1646. doi:10.​1109/​INFCOM.​2011.​5934957
28.
31.
go back to reference Yu C M, Chen C Y, Chao H C (2015) Proof of ownership in deduplicated cloud storage with mobile device efficiency. Network, IEEE 29(2):51–55CrossRef Yu C M, Chen C Y, Chao H C (2015) Proof of ownership in deduplicated cloud storage with mobile device efficiency. Network, IEEE 29(2):51–55CrossRef
Metadata
Title
A Green Approach for Selfish Misbehavior Detection in 802.11-Based Wireless Networks
Authors
Thaier Hayajneh
Ghada Almashaqbeh
Sana Ullah
Publication date
01-10-2015
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 5/2015
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-015-0605-4

Other articles of this Issue 5/2015

Mobile Networks and Applications 5/2015 Go to the issue