Real-Time Detection of MAC Layer Misbehavior in Mo
Real-Time Detection of MAC Layer Misbehavior in Mo
REVIEW ARTICLE
a
Department of Computer Science Faculty of Sciences, Chouaib Doukkali University, El Jadida, Morocco
b
Department of Computer Science Galilee Institute, Paris 13 University, Paris, France
KEYWORDS Abstract The MAC layer misbehavior of the IEEE 802.11 standard can have a negative impact on
Mobile ad hoc Network; the wireless network’s performance, similar to the effects of denial of service attacks. The goal of
MAC IEEE 802.11; this misbehavior was handling the protocol to increase the greedy nodes transmission rate at the
Misbehavior detection; expense of the other honest nodes. In fact, nodes in IEEE 802.11 standard should wait for a random
NS2 simulation; backoff interval time to access to the channel before initiating any transmission. Greedy nodes use a
Statistical process control malicious technique to reduce the channel waiting time and occupy the channel. This paper intro-
duces a new scheme to detect such malicious behavior, which is based on statistical process control
(SPC) borrowed from the industrial field in a quality management context. To the best of our
knowledge, this approach has not been proposed in state of the art, reports concerning the detection
of greedy behaviors in mobile ad hoc networks. The approach has the power to identify greedy
nodes in real time by using a graphical tool called ûcontrol chartý that measures the throughput
and the inter-packet interval time for each node, and raises an alert if this measure is over a defined
threshold. The validation of all obtained results is performed in the network simulator NS2.
Ó 2015 The Authors. Production and hosting by Elsevier B.V. on behalf of King Saud University. This is
an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
* Corresponding author.
E-mail addresses: [email protected] (A. Aaroud), [email protected] (M.-A. El Houssaini), [email protected] (A. El Hore),
[email protected] (J. Ben-Othman).
Peer review under responsibility of King Saud University.
http://dx.doi.org/10.1016/j.aci.2015.11.001
2210-8327 Ó 2015 The Authors. Production and hosting by Elsevier B.V. on behalf of King Saud University.
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Please cite this article in press as: A. Aaroud et al., Real-time detection of MAC layer misbehavior in mobile ad hoc networks, Applied Computing and Informatics
(2016), http://dx.doi.org/10.1016/j.aci.2015.11.001
2 A. Aaroud et al.
Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
2. IEEE 802.11 layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
3. Related work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
4. Proposed detection system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
4.1. Modeling 802.11 networks with greedy nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
4.2. Basic idea. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
4.3. Statistical process control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
4.4. The Shewhart control chart for individual measurements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
4.5. Development of the control chart. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
4.6. Detection strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
5. Performance evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
5.1. Computation of control limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
5.2. Monitoring in normal case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
5.3. Monitoring in the MAC layer misbehavior case. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
5.3.1. First scenario (detection of the attacked) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
5.3.2. Second scenario (detection of the attacker) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
5.4. Generalization of the detection method. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
6. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 00
One of the most significant advantages of the IEEE 802.11 The IEEE 802.11 protocol covers the physical layer and the
standard is the fair access to the medium. However sharing Medium Access Control (MAC) layer as described in Fig. 1.
the transmission channel makes the networks vulnerable to The MAC layer is the same for all IEEE 802.11 standards.
several attacks such as jamming, black holes, and greedy However, the physical layer is divided into three categories:
behavior (MAC layer misbehavior) [12]. FH (Frequency Hopping Spread Spectrum), DS (Direct
A greedy node intentionally modifies the MAC IEEE Sequence Spread Spectrum) and IR (Infrared).
802.11 protocol to get more network resources than honest The IEEE 802.11 MAC layer defines the access method
nodes [10]. By this channel-access misbehavior a greedy node Carrier Sense Multiple Access/Collision Avoidance (CSMA/
can benefit from several advantages such as: CA) working as follows. Before transmitting, a node first lis-
tens to the shared medium (such as listening for wireless signals
Increasing its throughput. in a wireless network) to determine whether another node is
Reducing its power consumption. transmitting or not. If the channel is free for a DCF Inter-
Frame Space (DIFS) time, then the station transmits a frame
This work aimed to apply a statistical process control (SPC) which is acknowledged after a Short Inter-Frame Space (SIFS)
scheme to detect the IEEE 802.11 MAC layer misbehavior. interval time with an ACK frame.
Our paper is organized as follows. The second section is The transaction time (DATA + SIFS + ACK) is noted as
dedicated to presenting the architecture of the IEEE 802.11 a Network Allocation Vector (NAV) and blocks other stations
with all its layers. An overview of the research works related from accessing channel till total NAV decrement.
to the IEEE 802.11 MAC layer misbehavior is shown in the Additionally the CSMA/CA method has an optional mech-
third section. The fourth section proposes our detection anism of channel reservation Request To Send (RTS)/Clear To
scheme of the IEEE 802.11 MAC layer misbehavior (greedy Send (CTS) [1].
node). In the fifth section, the authors evaluate the perfor- The CSMA/CA access method defines the Binary Exponen-
mance of their approach using the NS2 simulator. Conclusions tial Backoff (Fig. 2) in order to resolve the access medium
and perspectives are presented in the last section. problem when several stations want to transmit data simulta-
neously. This method requires that each station chooses a ran-
dom waiting time between 0 and the size of a contention
window CW (value equals to a number of time slots), and
expects the number of slots before transmission [1].
3. Related work
Please cite this article in press as: A. Aaroud et al., Real-time detection of MAC layer misbehavior in mobile ad hoc networks, Applied Computing and Informatics
(2016), http://dx.doi.org/10.1016/j.aci.2015.11.001
Detection of MAC layer misbehavior 3
The classification of the MAC layer misbehavior, given in process control). We use the Shewhart chart for individual
[4], is categorized as follows: value, applied to the receiving throughput and the average
time between receptions.
a misbehavior: The greedy node chooses the value of BEB Our new detection strategy can be implemented on any
in the interval [0 a(CW 1)], where CW is the contention receiving node to monitor the network in real time. As we will
window, and 0 < a < 1. demonstrate by the simulation, the proposed detection scheme
Deterministic BEB: The greedy node chooses a constant does not require modifications of the IEEE 802.11 standard.
BEB independently of the contention window. To the best of our knowledge our approach based on statis-
b misbehavior: After a failed transmission, instead of put- tical process control has not been proposed before in the liter-
ting a CW to be min{2CW, CWmax}, greedy node sets its ature to detect greedy behavior in mobile ad hoc networks.
contention window as CW = max{CWmin, min{bCW,
CWmax}} where 0 < b < 2. 4. Proposed detection system
Fixed maximum contention window.
Fixed contention window. 4.1. Modeling 802.11 networks with greedy nodes
value of backoff through a public exchange using an engage- Pfm; kjm; 0g ¼ p=Wm k 2 ð0; Wm 1Þ
ment method inspired by the protocol of applying flipping ð1Þ
coins over the telephone. However, it is still unable to detect
collision between sender and receiver. where
An approach of greedy nodes detection in IEEE 802.11 was
Pfi1 ; k1 ji0 ; k0 g ¼ Pfsðt þ 1Þ ¼ i1 ; bðt þ 1Þ ¼ k1 jsðtÞ ¼ i0 ; bðtÞ ¼ k0 g
proposed [5] based upon the linear regression between instants
of transmission to calculate a detection threshold and without ð2Þ
requiring modifications to the standard. This idea results from The probability that a node in the network transmits a packet
the strong linear correlation noticed between nodes in terms of in a randomly chosen slot is denoted as s. Its computation can
transmission instants. be done as follows:
The strategy called Detecting MAC Layer Greedy Behavior
in IEEE 802.11 Hotspots (DOMINO) deployed in the access 2ð1 2pÞ
s¼ ð3Þ
point to detect misbehavior is exposed [6]. This method uses ð1 2pÞðW þ 1Þ þ pWð1 ð2pÞm Þ
a modular architecture which comprises individual tests and
a decision making component DMC. However, greedy nodes For n nodes using the shared medium,
may exploit the knowledge of DOMINO in order to adapt
P ¼ 1 ð1 sÞn1 ð4Þ
its parameters to avoid the detection.
We propose in the following section a new detection strat- The last two equations can be solved to compute the two
egy based on a statistical quality control approach (statistical unknowns variables n and p.
Please cite this article in press as: A. Aaroud et al., Real-time detection of MAC layer misbehavior in mobile ad hoc networks, Applied Computing and Informatics
(2016), http://dx.doi.org/10.1016/j.aci.2015.11.001
4 A. Aaroud et al.
The authors in [19] proposed a modeling of an 802.11 net- Indeed, two processes are never exactly similar. There are
work with MAC layer misbehavior attacks. They consider n many sources of variation in low amplitude that cannot be
nodes in a network, with the presence of l greedy nodes mod- removed, all of them representing the common causes of dis-
ifying the backoff timer. The misbehaving nodes choose a ran- persion [13].
dom backoff interval in the range of ð0; ga W 1Þ, where However, there are major causes of variation that require
ð1 6 a 6 lÞ and W is the current contention window (CW). change. These cases are called special causes. The process
The collision probability at the greedy node is pa . Therefore becomes out of control, and thus we must look for the cause.
they modified the stochastic process proposed in [18] to estab- The SPC method provides an effective and proper tool to
lish a simple modeling for the misbehaving nodes. separate the ordinary from the extraordinary by creating a
As a result they found the following equations with 2l þ 2 powerful graphic called ûcontrol chartý, among these charts
unknowns, s0 ; s1 ; . . . ; sl ; p0 ; p1 ; . . . ; pl . are: The Shewhart control chart for individual measurements
8 [13].
2ð12pÞ0
>
> s0 ¼ ð12p0 ÞðWþ1Þþp
>
>
0 Wð1ð2p0 Þm Þ
>
>
>
> s1 ¼ 2ð12pÞ1
>
> 4.4. The Shewhart control chart for individual measurements
>
m
ð12p1 Þðg1 Wþ1Þþp1 g1 Wð1ð2p1 Þ Þ
>
>
>
> ...
>
>
>
> l The Shewhart control chart for individual measurements
<
1
2ð12pl Þ
s ¼ ð12pl Þðgl Wþ1Þþp l gl Wð1ð2pl Þm Þ should be used when we want to monitor a process on the basis
ð5Þ
>
> Q of a periodically measured quantity [14].
>
> P 0
¼ 1 ð1 s 0 nl1
Þ ð1 s i
Þ
>
> 16i6l In such situations, the control chart for individual units is
>
> Q
>
> P ¼ 1 ð1 s Þ 0 nl
26i6l ð1 s Þ
>
1 i useful. (The cumulative sum and exponentially weighted mov-
>
>
>
> ing average control charts will be a better alternative when the
>
> ...
>
> magnitude of the shift in process means that what is of interest
: l nl Q
P ¼ 1 ð1 s0 Þ 16i6l1 ð1 s Þ
i
is small.) In many applications of the individual control chart
we use the moving range of two successive observations as the
The last equations can be solved to compute the unknown
basis of estimating the process variability [14].
variables and also to define parameters adopted for the perfor-
The moving range is defined as [14]
mance evaluation of the network. However, finding a closed
form for each variable is not our goal, since our approach is MRi ¼ jxi xi1 j ð6Þ
based on simulation analysis. where the moving range number i is MRi , and xi is the range
number i.
4.2. Basic idea To establish a moving range control chart, the procedure is
illustrated in the following section.
The basic idea of our strategy for detecting IEEE 802.11 MAC
layer misbehavior emerges from the difference and the shift 4.5. Development of the control chart
observed on the two previously defined metrics, namely
throughput [7], which is defined as a measure of how many To calculate the control limits for individual values, we should
successful packets were received correctly in a given amount use the below formulas [14]:
of time and the inter-packets time defined as the mean time
between receptions (mean time between successive received MR
packets) [3]. UCL ¼ x þ 3 ð7Þ
d2
We showed that this misbehavior led to an increase of the Center line ¼ x ð8Þ
average reception throughput and a decrease of times between
receptions for the greedy nodes. On the other side it generates MR
LCL ¼ x 3 ð9Þ
a reverse effect for honest nodes [3]. d2
Our detection method is based on the supervision of the
For the moving range, we find the equations [14] as follows:
two metrics defined in our previous work [3] and its dispersion
by a control chart with two limits. These graphs are called con-
UCL ¼ D4 MR ð10Þ
trol charts, following a statistical process control approach.
Center line ¼ MR ð11Þ
where UCL and LCL are the upper and lower control limits
The SPC ensures optimum quality based on statistical tools. It
aims to the following: respectively, and MR is the average of the moving ranges of
two observations, x being the observation value.
– Give a tool to monitoring process. The constants, d2 ; D3 and D4 are tabulated for various
– Formalize the notion of capability. sample sizes [14]. Its mathematical origins are shown in [20].
– Distinguish between ordinary and extraordinary situations. The control chart for the individual measurements includes
two graphs, the first is for individual value monitoring used for
One of the basic principles of this control is deviation detec- detecting the slip of the system and the second is for moving
tion. All variations on a system do not require modification. range used for monitoring the quality [14].
Please cite this article in press as: A. Aaroud et al., Real-time detection of MAC layer misbehavior in mobile ad hoc networks, Applied Computing and Informatics
(2016), http://dx.doi.org/10.1016/j.aci.2015.11.001
Detection of MAC layer misbehavior 5
5. Performance evaluation
Identification of critical
process parameters To achieve our detection method of the IEEE 802.11 MAC
layer misbehavior [9], the simulator NS-2 can be used with
some useful tools for processing traces files as explained by
Collect ofstatistical measures in normal case
(without misbehavior) [8,11]. In our case we have chosen the simulator with the soft-
ware platform and parameters depicted in Table 2.
Figure 3 Block diagram of the detection scheme. Figure 4 A mobile ad hoc network.
Please cite this article in press as: A. Aaroud et al., Real-time detection of MAC layer misbehavior in mobile ad hoc networks, Applied Computing and Informatics
(2016), http://dx.doi.org/10.1016/j.aci.2015.11.001
6 A. Aaroud et al.
Throughput, UCL, Center line, LCL Inter-packets time, UCL, Center line, LCL
0.50 0.025
0.48 0.024
Inter-packets time in s
0.46 0.023
Throughput in Mb/s
0.44 0.022
0.42 0.021
0.40 0.020
0.38 0.019
0.36 0.018
0.34 0.017
0.32 0.016
0.30 0.015
0 100 200 300 400 500 600 0 100 200 300 400 500 600
Time in s Time in s
(Throughput monitoring in normal case) (Inter-packets time monitoring in normal case)
Throughput moving range, UCL, Center line Inter-packets time moving range, UCL, Center line
0.10 0.005
0.09
0.08 0.004
0.07
0.06 0.003
0.05
0.04 0.002
0.03
0.02 0.001
0.01
0.00 0.000
0 100 200 300 400 500 600 0 100 200 300 400 500 600
Time in s Time in s
(Throughput moving range monitoring in normal case) (Inter-packets time moving range monitoring in normal case)
0.031
0.45
Throughput in Mb/s
0.029
0.40 0.027
0.025
0.35
0.023
0.30 0.021
0.019
0.25
0.017
0.20 0.015
0 100 200 300 400 500 600 0 100 200 300 400 500 600
Time in s Time in s
(Throughput monitoring in attack case) (Inter-packets time monitoring in attack case)
Throughput moving range, UCL, Center line Inter-packets time moving range, UCL, Center line
Throughput moving range in Mb/s
0.14 0.012
0.12
0.010
0.10
0.008
0.08
0.006
0.06
0.004
0.04
0.02 0.002
0.00 0.000
0 100 200 300 400 500 600 0 100 200 300 400 500 600
Time in s Time in s
(Throughput moving range monitoring in attack case) (Inter-packets time moving range monitoring in attack case)
Please cite this article in press as: A. Aaroud et al., Real-time detection of MAC layer misbehavior in mobile ad hoc networks, Applied Computing and Informatics
(2016), http://dx.doi.org/10.1016/j.aci.2015.11.001
Detection of MAC layer misbehavior 7
Throughput, UCL, Center line, LCL Inter-packets time, UCL, Center line, LCL
0.9 0.025
0.023
0.8
0.021
Inter-packets time in s
Throughput in Mb/s
0.019
0.7
0.017
0.6 0.015
0.013
0.5 0.011
0.009
0.4
0.007
0.3 0.005
0 100 200 300 400 500 600 0 100 200 300 400 500 600
Time in s Time in s
(Throughput monitoring in attack case) (Inter-packets time monitoring in attack case)
Throughput moving range, UCL, Center line Inter-packets time moving range, UCL, Center line
0.10
0.004
0.08
0.003
0.06
0.002
0.04
0.001
0.02
0.00 0.000
0 100 200 300 400 500 600 0 100 200 300 400 500 600
Time in s Time in s
(Throughput moving range monitoring in attack case) (Inter-packets time moving range monitoring in attack case)
Please cite this article in press as: A. Aaroud et al., Real-time detection of MAC layer misbehavior in mobile ad hoc networks, Applied Computing and Informatics
(2016), http://dx.doi.org/10.1016/j.aci.2015.11.001
8 A. Aaroud et al.
Throughput, Throughput moving range Inter-packets time, Inter-packets time moving range
0.7 0.45
Tolerance interval in s
0.35
0.5
0.30
0.4 0.25
0.3 0.20
0.15
0.2
0.10
0.1
0.05
0.0 0.00
0 5 10 15 20 25 30 0 5 10 15 20 25 30
Number of nodes Number of nodes
(The throughput tolerance intervals depending on the number of nodes) (The inter-packets time tolerance intervals depending on the number of nodes)
5.2. Monitoring in normal case Small and random variations in curves are detected. We
should compute the chart parameters for every number of
In this case the two metrics (throughput and inter-packets nodes to obtain a better supervision of the network.
time) are supervised in the control chart below composed by The detection thresholds and the tolerance interval depend
the control limits that we computed in the last section for a on the number of nodes; therefore, each receiver updates these
node in the network. parameters for each number of transmitters. In our work we
As we can see in the control chart for throughput and the tested the detection scheme in an ideal environment which
inter-packets time, curves oscillate on either side of the mean depends on the number of nodes with constant bit rate traffic.
and the majority of the points are inside the limits. Obviously The statistical process control is a useful and strong tool for
we can decide that this node communicates in an environment supervising and detecting strong derivations in any type of
without greedy attack. environment (realistic or theoretical). Thus, the purpose is
If few points come out of the control limits, we can explain the separation of the extraordinary from the ordinary
this fact by the movement outside of the transmission range situations.
(see Table 3).
6. Conclusion
5.3. Monitoring in the MAC layer misbehavior case
The misbehavior at the MAC layer by changing the backoff
5.3.1. First scenario (detection of the attacked) mechanism can lead to performance degradation of the net-
In this monitoring case we note that when the throughput work. In this paper we tried to propose a novel detection
curve crossed the lower control limit and the inter-packets time scheme for this misbehavior based on the supervision of two
curve crossed the upper control limit, there is a strong devia- metrics (reception throughput and inter-packets time) through
tion. Consequently we can decide that this node is under a statistical process control charts. Our detection scheme pre-
MAC layer misbehavior attack. sents several advantages. It does not require any changes in
We can also lay emphasis on the absence of any great the IEEE 802.11 protocol and it can be implemented at any
change for the moving range curves related to the deviations receiving node. Its most significant advantage is the detection
for the mean but not for the amplitude, due to the greedy of such attack in real time by visual graphs.
behavior. In the perspective, we will try to extend the proposed
scheme by introducing other performance measurements in
5.3.2. Second scenario (detection of the attacker) order to develop other detection systems that are easier than
the previous ones. We also plan an implementation of the
In this monitoring case we reveal that the throughput curve
so-called detection strategy in a realistic environment.
crossed the upper control limit and the inter-packets time
curve crossed the lower control limit. There is a strong devia-
tion, so we can decide that this node is a greedy one (this is the References
MAC layer misbehavior attack).
[1] IEEE Standards Association, IEEE 802.11 Standard for
We can also focus on a change in the moving range curve of
Wireless LAN Medium Access Control (MAC) and Physical
the inter-packets time resulting from an improvement of the Layer (PHY) Specifications, IEEE Standards Association
transmission time for the attacker due to the greedy behavior. (March), 2012, pp. 818–840.
[2] Information Sciences Institute, The Network Simulator – ns-2,
5.4. Generalization of the detection method Information Sciences Institute, 1995 <http://www.isi.edu/
nsnam/ns/> (accessed July 10, 2015).
We plot the tolerance interval (the difference between the [3] M. El Houssaini, A. Aaroud, A. Elhore, J. Ben-Othman,
Analysis and simulation of MAC layer misbehavior in mobile
upper and lower control limits) as a function of the number
ad-hoc networks, in: Proceedings of the 5th International
of nodes. Our results are represented in the graphics below Workshop on Codes, Cryptography and Communication
(Fig. 8). Systems, 2014, pp. 50–54.
Please cite this article in press as: A. Aaroud et al., Real-time detection of MAC layer misbehavior in mobile ad hoc networks, Applied Computing and Informatics
(2016), http://dx.doi.org/10.1016/j.aci.2015.11.001
Detection of MAC layer misbehavior 9
[4] V.R. Giri, N. Jaggi, MAC layer misbehavior effectiveness Development (SCOReD 2006), Shah Alam, Selangor, Malaysia,
and collective aggressive reaction approach, in: Proceeding 27–28 June, 2006.
33rd IEEE Sarnoff Symposium, Princeton, NJ, April 2010, [12] V. Gupta, S. Krishnamurthy, M. Faloutsos, Denial of service
pp. 1–5. attacks at the MAC layer in wireless ad hoc networks, in:
[5] A. Hamieh, J. Ben-Othman, A. Gueroui, F. Naı̈t-Abdesselam, Presented at IEEE MILCOM, Anaheim, California, 2002.
Detecting greedy behaviors by linear correlation in wireless Ad [13] M. Pillet, Appliquer la maitrise statistique des procédés MSP/
Hoc networks, in: Presented at the IEEE International SPC, forth ed., Edition d’Organisation, Paris, France, 2005.
Conference on Communications (IEEE ICC), Dresden, [14] C. Douglas Montgomery, Introduction to Statistical Quality
Germany, 2009. Control, sixth ed., John Wiley & Sons Inc, United States of
[6] M. Raya, J.P. Hubaux, I. Aad, DOMINO: detecting MAC layer America, 2008.
greedy behavior in IEEE 802.11 hotspots, IEEE Trans. Mob. [15] F. Bai, A. Helmy, A Survey of mobility modeling and analysis in
Comput. 5 (12) (2006) 1691–1705. wireless ad-hoc networks, in: Wireless Ad-Hoc and Sensor
[7] S. Szott, M. Natkaniec, R. Canonico, A.R. Pach, Misbehaviour Networks, 2004.
analysis of 802.11 mobile ad-hoc networks – contention window [16] O.N. Tiwary, Detection of misbehaviour at MAC layer in
cheating, in: Med-Hoc-Net 2007, 12 June 2007, Ionian wireless networks, Int. J. Scient. Eng. Res. 3 (5) (2012) 909–912.
Academy, Corfu, Greece. [17] A.A. Cardenas, S. Radosavac, J.S. Baras, Detection and
[8] C. Bouras, S. Charalambides, M. Drakoulelis, G. Kioumourtzis, prevention of MAC layer misbehavior in ad hoc networks, in:
K. Stamos, A tool for automating network simulation and Proceedings of the 2nd ACM Workshop on Security of Ad Hoc
processing tracing data files, Simul. Model. Pract. Theory 30 and Sensor Networks, 2004, pp. 17–22.
(2013) 90–110, January. [18] G. Bianchi, Performance analysis of the IEEE 802.11 distributed
[9] P. Kyasanur, N.H. Vaidya, Selfish MAC layer misbehavior in coordination function, IEEE J. Select. Areas Commun. 18 (3)
wireless networks, IEEE Trans. Mob. Comput. 4 (5) (2005). (2000) 535–547.
[10] S. Szott, M. Natkaniec, A. Banchs, Impact of misbehaviour on [19] Y. Rong, S.-K. Lee, H.-A. Choi, Detecting stations cheating on
QoS in wireless mesh networks, in: Proceeding NETWORKING backoff rules in 80211 networks using sequential analysis, in:
‘09 Proceedings of the 8th International IFIP-TC 6 Networking Proceedings of IEEE INFOCOM, 2005.
Conference, P639-650, 2009. [20] L.H.C. Tippett, On the extreme individuals and the range of
[11] A.U. Salleh, Z. Ishak, N.M. Din, M.Z. Jamaludin, Trace samples taken from a normal population, Biometrika 17 (1925)
analyzer for NS-2, in: 4th Student Conference on Research and 364–387.
Please cite this article in press as: A. Aaroud et al., Real-time detection of MAC layer misbehavior in mobile ad hoc networks, Applied Computing and Informatics
(2016), http://dx.doi.org/10.1016/j.aci.2015.11.001