z-logo
Premium
Adaptive anomaly control for alleviating the exclusive channel occupation in wireless networks
Author(s) -
Park Hyunhee,
Shon Taeshik,
Park Seunghyun,
Kim EuiJik
Publication year - 2013
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.2357
Subject(s) - computer science , carrier sense multiple access with collision avoidance , computer network , hidden node problem , distributed coordination function , channel (broadcasting) , control channel , multiple access with collision avoidance for wireless , transmission (telecommunications) , frame (networking) , bandwidth (computing) , throughput , inter frame , wireless network , wireless , ieee 802.11 , base station , telecommunications , key distribution in wireless sensor networks , wi fi array , reference frame
SUMMARY In wireless local area networks, interframe space is determined according to the type of transmission frame in order to perform effective transmission and collision avoidance using carrier sense multiple access/collision avoidance (CSMA/CA) mechanism and to attempt transmission after backoff time. In carrier sense multiple access/collision avoidance mechanism, however, each node individually determines the interframe space according to the transmission frames and randomly selects the backoff time; thus, the nodes can be selfish, which reduces the interframe space or backoff time in order to increase the channel occupation rate. This increase leads to an increase in bandwidth in channels dominated by such selfish nodes and a decrease in bandwidth of other nodes. After all, to prevent exclusive channel occupation and to guarantee fair channel access, it is necessary to establish detection and control schemes for selfish nodes. We propose misbehavior detection and control scheme for use in media access control layers, which involves comparison of the channel occupation rates of all nodes and a selective control scheme using a network allocation vector clearing method. We also validate the misbehavior detection and control scheme through extensive simulation. Copyright © 2012 John Wiley & Sons, Ltd.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here