z-logo
open-access-imgOpen Access
Identifying and Averting the MAC Layer Misbehavior in AD-HOC Networks
Author(s) -
Mary Cherian,
Nikita Singh
Publication year - 2016
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2016910261
Subject(s) - computer science , layer (electronics) , computer network , wireless ad hoc network , computer security , mobile ad hoc network , telecommunications , wireless , chemistry , organic chemistry , network packet
The all-encompassing nature of the adhoc network and its design architecture in the multi-hop communication system, where trust value of the participant nodes cannot be necessarily taken for granted, is prone to selfish misbehavior by participant nodes. Therefore, the compliance of the MAC layer protocol has become pertinent to the proper functioning of the network. The optimal performance of the network and the judicious and fare usage of network resources can only be achieved by reliable and timely detection of illegitimate protocol operation. In this paper, it is envisaged that the determination factor quantifies the probability of the misbehavior whereas the trust value quantifies the probability of the well-behaved nodes. Thus, these values provide fair insight into the behavioral pattern of any ad-hoc network. The robust detection framework is, therefore implemented to timely notification of the selfish node. Here, the inherent defense mechanism is also incorporated which enhances efficiency, efficacy of the network and provides fare utilization of resources among the nodes. Proposed scheme is validated through simulation results using NS2.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom