PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Application of a hash function to discourage MAC-layer misbehaviour in wireless LANs

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Contention-based MAC protocols for wireless ad hoc LANs rely on random deferment of packet transmissions to avoid collisions. By selfishly modifying the probabilities of deferments greedy stations can grab more bandwidth than regular stations that apply standard-prescribed probabilities. To discourage such misbehaviour we propose a protocol called RT-hash whereby the winner of a contention is determined using a public hash function of the channel feedback. RT-hash is effective in a full hearability topology, assuming that improper timing of control frames is detectable and that greedy stations do not resort to malicious actions. Simulation experiments show that RT-hash protects regular stations' bandwidth share against various sophisticated greedy strategies of deferment selection; as such it may contribute to MAC-layer network security.
Słowa kluczowe
Rocznik
Tom
Strony
38--46
Opis fizyczny
Bibliogr. 13 poz., tab., rys.
Twórcy
autor
  • Gdańsk University of Technology, G. Narutowicza st 11/12, 80-952 Gdańsk
autor
  • Swiss Federal Institute of Technology, CH-1015 Lausanne, Switzerland
Bibliografia
  • [1] A. J. Goldsmith and S. B. Wicker, „Design challenges for energyconstrained ad hoc wireless networks", IEEE Wirel. Commun., vol. 9, no. 4, pp. 8-27, 2002.
  • [2] P. Michiardi, „CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks", Res. Rep., Institut Eurecom., 2001.
  • [3] J. Al-Jaroodi, „Security issues in wireless mobile ad hoc networks at the network layer", Tech. Rep. TR02-10-07, University of Nebrasca-Lincoln, 2002.
  • [4] L. Buttyan and J. P. Hubaux, „Nuglets: a virtual currency to stimulate cooperation in self-organised mobile ad hoc networks", Tech. Rep. DSC/2001/001, Swiss Federal Institute of Technology, 2001.
  • [5] I. Chlamtac and A. Ganz, „Evaluation of the random token protocol for high-speed and radio networks", IEEE J. Select. Areas Commun., vol. SAC-5, no. 6, pp. 969-976, 1987.
  • [6] „Radio Equipment and Systems (RES); HIgh PErformance Radio Local Area Network (HIPERLAN); Services and facilities", ETSI ETR 069 ed. 1 (1993-02).
  • [7] P. Karn, „MACA: a new channel access method for packet radio", in Proc. 9th Comput. Netw. Conf. ARRL/CRRL Amateur Radio, 1990, pp. 134-140.
  • [8] „IEEE Standard for Information Technology-LAN/MAN-Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications", ISO/IEC 8802-11, 1999.
  • [9] J. Konorski, „Packet scheduling in wireless LANs: a framework for a noncooperative paradigm", in Personal Wireless Communications, J. Woźniak and J. Konorski, Eds. Boston [etc.]: Kluwer, 2000, pp. 29-42.
  • [10] J. Konorski, „Multiple access in ad hoc wireless LANs with noncooperative stations" in Networking Technologies, Services and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications, E. Gregori, M. Conti, A. T. Campbell, G. Omidyar, and M. Zukerman, Eds., LNCS. Berlin [etc.]: Springer-Verlag, 2002, vol. 2345, pp. 1141-1146.
  • [11] P. Obreiter, B. Koenig-Ries, and M. Klein, „Stimulating cooperative behaviour of autonomous devices|an analysis of requirements and existing approaches", Tech. Rep. 2003-1, University of Karlsruhe, 2003.
  • [12] P. Kyasanur and N. H. Vaidya, „Detection and handling of MAClayer misbehavior in wireless networks", Tech Rep., University of Illinois at Urbana-Champaign, 2003.
  • [13] D. Fudenberg and J. Tirole, Game Theory. London, Cambridge (Mass): MIT Press, 1991.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BPS2-0027-0048
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.