Open Access Open Access  Restricted Access Subscription Access

Real-Time MAC-Layer Selfish Misbehavior Detection and Prevention Technique for Wireless Networks


Affiliations
1 Department of Computer Science and Engineering, Nehru College of Engineering and Research Center Pampady, Thrissur - 680597, Kerala, India
2 Nehru College of Engineering and Research Center Pampady, Thrissur - 680597, Kerala, India
 

Background/Objectives: Contention issue in the IEEE 802.11 based wireless network is resolved using CSMA/CA protocol that aims to ensure the Fair Share of the channel to each node in the network. A malicious node can manipulate the backoff parameters and gain large share of network access. Methods/Statistical Analysis: Since back off parameters are programmable field it can change the value any time. So real time detection of malicious behavior is required. For Real Time Detection a Markov chain-based analytical model is being used. Since the Despite of all its advantages there have been no mechanism used to monitor the MAC layer misbehavior of all the nodes in the wireless network. Only tagged nodes are being monitored. Findings: Adding to the challenge of identifying and isolating the malicious node from the network is the non-deterministic nature and distributed functionality of IEEE 802.11 based networks. In order to overcome the problem regarding the defensive mechanism and for better efficiency, this Research work has developed an efficient technique called Markov-RED-FT. By using this model all the nodes in the network can be monitored for malicious misbehavior and the flow trust value is calculated to penalize the malicious node. This proposed Markov-RED-FT employs the flow trust value to safe guard the legitimate flows. Malicious flows would be with lower trust values while legitimate flows would be with higher ones. Application/Improvements: This research work implemented the proposed Markov-RED-FT and from the results, it is established that the proposed model is performing well as compared with the existing model in terms of average detection delayand network throughput.

Keywords

Flow Trust, Markov Chain Model, Markov-RED-FT, Red-FT, Real Time Detection, Selfish Misbehavior.
User

Abstract Views: 164

PDF Views: 0




  • Real-Time MAC-Layer Selfish Misbehavior Detection and Prevention Technique for Wireless Networks

Abstract Views: 164  |  PDF Views: 0

Authors

Shery K. Thambi
Department of Computer Science and Engineering, Nehru College of Engineering and Research Center Pampady, Thrissur - 680597, Kerala, India
N. K. Sakthivel
Nehru College of Engineering and Research Center Pampady, Thrissur - 680597, Kerala, India

Abstract


Background/Objectives: Contention issue in the IEEE 802.11 based wireless network is resolved using CSMA/CA protocol that aims to ensure the Fair Share of the channel to each node in the network. A malicious node can manipulate the backoff parameters and gain large share of network access. Methods/Statistical Analysis: Since back off parameters are programmable field it can change the value any time. So real time detection of malicious behavior is required. For Real Time Detection a Markov chain-based analytical model is being used. Since the Despite of all its advantages there have been no mechanism used to monitor the MAC layer misbehavior of all the nodes in the wireless network. Only tagged nodes are being monitored. Findings: Adding to the challenge of identifying and isolating the malicious node from the network is the non-deterministic nature and distributed functionality of IEEE 802.11 based networks. In order to overcome the problem regarding the defensive mechanism and for better efficiency, this Research work has developed an efficient technique called Markov-RED-FT. By using this model all the nodes in the network can be monitored for malicious misbehavior and the flow trust value is calculated to penalize the malicious node. This proposed Markov-RED-FT employs the flow trust value to safe guard the legitimate flows. Malicious flows would be with lower trust values while legitimate flows would be with higher ones. Application/Improvements: This research work implemented the proposed Markov-RED-FT and from the results, it is established that the proposed model is performing well as compared with the existing model in terms of average detection delayand network throughput.

Keywords


Flow Trust, Markov Chain Model, Markov-RED-FT, Red-FT, Real Time Detection, Selfish Misbehavior.



DOI: https://doi.org/10.17485/ijst%2F2015%2Fv8i21%2F141658