Misbehavior analysis of IEEE 802.11 MAC layer in mobile ad hoc network using stochastic reward nets

Yadollahzadeh Tabari, Meisam; Pouyan, Ali A.
November 2017
International Journal of Communication Systems;Nov2017, Vol. 30 Issue 16, p1
Academic Journal
In this paper, we present a Petri net model for performance evaluation of IEEE 802.11 distributed coordination function as a popular media access control layer protocol in mobile ad hoc network. The goal of this evaluation is to examine this protocol under the existing of misbehavior nodes that selfishly try to grasp common channel in a neighbor area. The presented model consists of 2 separate models based on stochastic reward net (SRN), as a variation of stochastic Petri net. The first model, which is called one node operation model, is supposed for presenting all distributed coordination function operations in a single node such as collision avoidance, request to send/clear to send (RTS/CTS) handshake, and backoff mechanism. The next SRN model, all node operation model, is used for modeling nodes competition for occupying channel in a neighbor area. The models could be adjusted to a dynamic network with any number of nodes, dimension scale, and nodes' speed. For evaluation purpose, 4 distinct attack types implemented by modifying associated transitions in SRN models. The proposed SRN model has been quantified by deriving 2 performances metrics as Throughput and Delay. Both metrics are also compared to the value obtained from NS-2 in terms of different number of nodes and 3 packet generation rates. Three additional metrics measuring the channel usage are also quantified in terms of different attack strategies using only presented SRN model.


Related Articles

  • A delay-bounded routing protocol for vehicular ad hoc networks with traffic lights. Chen, Yuh-Shyan; Hsu, Chih-Shun; Jiang, Yi-Ting // Wireless Communications & Mobile Computing;Aug2015, Vol. 15 Issue 11, p1577 

    In vehicular ad hoc networks, vehicles may use a routing protocol to inform emergent events, for example, car accidents or traffic jams. Hence, many of the researchers are focused on minimizing the end-to-end delay of the routing protocol. However, some applications, for example, email or ftp,...

  • Self-optimization of handover parameters for dynamic small-cell networks. Song, Min-ho; Moon, Soo-Hoon; Han, Seung-Jae // Wireless Communications & Mobile Computing;Aug2015, Vol. 15 Issue 11, p1497 

    Seamless handover is an essential feature of cellular networks. For small-cell networks, effective handover becomes particularly challenging. If some cells may be activated and deactivated dynamically, effective handover handling will become even more difficult. A key factor of good handover...

  • Replication enabled distributed cache invalidation method: replication enabled distributed cache management system for wireless mobile networks. Fawaz, Kassem; Artail, Abdalla; Al-Khansa, Rasha; Artail, Hassan; Safa, Haidar // Wireless Communications & Mobile Computing;Sep2015, Vol. 15 Issue 13, p1711 

    This work proposes a replication scheme that is implemented on top of a previously proposed system for MANETs that cache submitted queries in special nodes, called query directories, and uses them to locate the data (responses) that are stored in the nodes that first request them, called caching...

  • A venues-aware message routing scheme for delay-tolerant networks. Niu, Jianwei; Liu, Mingzhu; Liu, Yazhi; Shu, Lei; Wu, Dapeng // Wireless Communications & Mobile Computing;Sep2015, Vol. 15 Issue 13, p1695 

    With their proliferation and increasing capabilities, mobile devices with local wireless interfaces can be organized into delay-tolerant networks (DTNs) that exploit communication opportunities arising out of the movement of their users. As the mobile devices are usually carried by people, these...

  • Towards a Better Approach for Link Breaks Detection and Route Repairs Strategy in AODV Protocol. Azzuhri, Saaidal Razalli; Mhd Noor, Muhammad Badri; Jamaludin, Jafferi; Ahmedy, Ismail; Md Noor, Rafidah // Wireless Communications & Mobile Computing;4/10/2018, p1 

    This paper describes a parameterized approach to the Ad Hoc On-Demand Distance Vector (AODV) routing protocol using a network-simulator 2 (ns2). By utilizing two AODV’s protocol functions, which are HELLO messages and local route repair, we explore the more flexible approach on these two...

  • Discovery and provision of content in vehicular networks. Malandrino, Francesco; Casetti, Claudio; Chiasserini, Carla-Fabiana // Wireless Communications & Mobile Computing;Mar2013, Vol. 13 Issue 3, p244 

    We address the problem of content discovery and provision in vehicular networks with infrastructure, when a publish/subscribe paradigm is applied. In the scenario we consider, vehicular users can be providers and consumers of generic information content, which is available through the vehicular...

  • Multichannel medium access control for ad hoc wireless networks Multichannel medium access control for ad hoc wireless networks. Almotairi, Khaled H.; Shen, Xuemin (Sherman) // Wireless Communications & Mobile Computing;Aug2013, Vol. 13 Issue 11, p1047 

    In this paper, we study the multichannel exposed terminal problem in multihop wireless networks. We propose a multichannel medium access control (MAC) protocol, called multichannel MAC protocol with hopping reservation (MMAC-HR), to resolve the multichannel exposed terminal problem. MMAC-HR uses...

  • A survey on interactive games over mobile networks. Gerla, M.; Maggiorini, D.; Palazzi, C.E.; Bujari, A. // Wireless Communications & Mobile Computing;Mar2013, Vol. 13 Issue 3, p212 

    The mobile revolution has brought us the possibility to enjoy our favorite applications anywhere and anytime. In this context, interactive games over mobile networks embody a fascinating case study both for their commercial success and for their technical challenges, thus, sparking interest and...

  • Movement activity estimation and forwarding effects for opportunistic networking based on urban mobility traces. Hummel, Karin Anna; Hess, Andrea // Wireless Communications & Mobile Computing;Mar2013, Vol. 13 Issue 3, p343 

    Opportunistic, mobility-assisted, or encounter networking is a method based on ad hoc networking and introduced to disseminate data in a store-and-forward manner by means of spontaneously connecting mobile devices. Although, in many networked systems, mobility is treated as a challenge requiring...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics