DocumentCode :
2760962
Title :
MAC layer misbehavior in ad hoc networks
Author :
Guang, Lei ; Assi, Chadi
Author_Institution :
Concordia Inst. for Inf. Syst. Eng., Concordia Univ., Montreal, Que.
fYear :
2005
fDate :
1-4 May 2005
Firstpage :
1103
Lastpage :
1106
Abstract :
Significant research efforts have been made towards increasing the survivability of MANET either by developing secure routing algorithms or by improving the robustness of MAC layer protocol in the presence of selfish or compromised nodes. In addition, some recent studies have focused on quantifying the resiliency of MANET against MAC layer misbehaviors; however little work has been done on quantifying the impact of these misbehaviors on the performance of ad hoc routing protocols. In this paper we focus on the impacts of backoff manipulation attacks implemented by malicious nodes (MNs) on ad hoc routing; we show that a MN can disrupt all the flows in its vicinity and force the source nodes to restore communication by either discovering new routes or by making use of routing information cached at the node. We also show that a MN attracts more traffic to be routed through itself when it acts maliciously; this may potentially lead to draining the power of the MN if the network load is heavy. We use simulations to provide some numerical comparisons
Keywords :
access protocols; ad hoc networks; mobile radio; routing protocols; MAC layer protocol; MANET; ad hoc networks; ad hoc routing protocols; backoff manipulation attacks; Ad hoc networks; Information systems; Intelligent networks; Media Access Protocol; Mobile ad hoc networks; Robustness; Routing protocols; Systems engineering and theory; Telecommunication traffic; Traffic control;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electrical and Computer Engineering, 2005. Canadian Conference on
Conference_Location :
Saskatoon, Sask.
ISSN :
0840-7789
Print_ISBN :
0-7803-8885-2
Type :
conf
DOI :
10.1109/CCECE.2005.1557169
Filename :
1557169
Link To Document :
بازگشت