A SECURITY-ENABLED WIRELESS TOKEN CLUSTER MAC PROTOCOL WITH INTELLIGENT TOKEN POLICY

Size: px
Start display at page:

Download "A SECURITY-ENABLED WIRELESS TOKEN CLUSTER MAC PROTOCOL WITH INTELLIGENT TOKEN POLICY"

Transcription

1 A SECURITY-ENABLED WIRELESS TOKEN CLUSTER MAC PROTOCOL WITH INTELLIGENT TOKEN POLICY Tao Jin * Chunxiao Chigan ** College of Computer and Information Science and Department of Electrical and Computer Engineering Northeastern University, MA Michigan Technological University, MI taojin@ccs.neu.edu cchigan@mtu.edu ABSTRACT Most existing wireless MAC protocols are based on the assumption that all hosts cooperate with each other and are compliant to predefined rules, which is not always true in wireless network. Therefore, wireless MACs are often vulnerable to MAC misbehaviors from which selfish hosts could gain unfair channel access at the expense of others performance by deviating from protocols. Recently, researches on MAC misbehaviors have drawn considerable attention. The detection of misbehaviors is quite challenging due to the intrinsic random feature of the contension-based wireless MAC design. Besides, the contention-based random access protocols cannot support bounded delay or guaranteed channel throughput, two important aspects of QoS. In this paper, we propose STC- MAC, a Seurity-enalbed Wireless Token Cluster MAC Protocol. Thus, the reserved channel access and bounded delay could be achieved with the help of the dynamic infrastructure. With an intelligent multi-token awarding policy, the proposed approach takes advantage of space reuse in wireless network to further improve the channel utilization. In addition, an effective detection and penalty scheme is designed to coutermeasure against possible selfish MAC misbehaviors. I. INTRODUCTION Most existing wireless MAC, such as CSMA/CA, function well only when all the hosts cooperate with each other and abide by the predefined rules. Whereas, such assumption is not always true, especially in the infrastructureless wireless ad hoc networks wherein no trust can be preassumed due to the lack of the central controller and diverse interests among hosts. Thus sometimes it is beneficial for individual host to deviate from the protocol in order to gain higher chance of channel access. Besides, with the increase of programmability of wireless network card, it is getting much easier to manipulate the network parameters to invoke misbehaviors in MAC. MAC misbehaviors could be categorized into two categories: the malicious behavior and the selfish behavior. Malicious hosts are aimed at disrupting normal network operation regardless their own benefit. For example, with a typical denial-of-service (DoS) attack, malicious hosts keep sending junk messages to jam the communication channel. On the contrary, selfish hosts desist from degrading the network performance obtained by others, if such attempts cannot improve its own performance. For example, selfish hosts intentionally select smaller backoff value to increase its chance of channel access. Due to different motivations of selfish hosts and malicious hosts, the countermeasures are different. In this paper, we thrust to design a distributed MAC protocol that countermeasure against the selfish MAC misbehaviors while ensure high channel utilization and QoS in terms of throughput and bounded delay for wireless ad hoc networks. 1.1 Related Works Many solutions have been proposed to prevent or detect selfish MAC misbehaviors in popular MAC protocols. The essence of the selfish misbehavior in MAC layer is to manipulate protocol parameters to gain unfair share of channel access. Possible selfish behaviors mainly include: a. select smaller random backoff value by using smaller contention window or avoiding doubling window size after failure transmission. b. Selectively scramble frames sent by other hosts in order to increase their contention window to increase their own chance of channel access. c. Reserve channel for a long duration to transmit a large amount of data. The selfish behavior in case a is considered to be the most difficult one to detect, since the randomness in the backoff value selection makes it very difficult to distinguish the selfish misbehavior, from a well-behaved host s selection of smaller value by chance. Maxim, et al. [1] designed a system to sequentially test the extent to which the MAC parameters have been manipulated in hot spots by comparing with some averaged values. As the author pointed out, this method could be deceived by cheating peers in some cases. Both [2] and [3] proposed modifications to to alleviate the randomness in backoff selection, in order to simplify the detection of MAC misbehavior. However, neither of them further improves the network performance in terms of throughput, delay, etc. In [4], the authors studied a simple DoS attack model to indicate the significance of fairness to mitigate * This work effects was conducted of such attacks. while the Some author game was with theoretic solutions department also of Electrical have been & Computer proposed Engineering to design at Michigan protocols which Tech. ** Contact are resilient author: to Dr. selfish Chunxiao hosts, Chigan. due to the intrinsic /07/$ IEEE 1 of 7

2 rationality of game model[5]-[8]. However, most solutions are based on the assumption that every host is within the range of others, which is not realistic. Also, since game theoretic solutions assume all hosts are selfish, the performance in such system is substantially suboptimal for networks consisting of well-behaved hosts. 1.2 Challenges to Design Effective Countermeasures in MAC Some features shared by existing popular wireless MAC make it very challenging to design effective countermeasures against selfish misbehaviors: a. The contention based random access mechanisms make it difficult to distinguish selfish misbehaviors from malfunction of well-behaved hosts. b. The non-identical channel condition perceived by different nodes in the air is one of the significant factors causing misdiagnosis of selfish behaviors. c. Most existing contention-based MAC protocols have no constraints on when the host should release the channel. Once one host succeed in the channel competition, it could reserve the medium for unfairly long time, which is typically called Capture Effect Besides, most existing distributed contention-based MAC protocols (e.g., CSMA/CA), are simple and naïve, and QoS cannot be supported because neither bounded delay nor channel throughput can be ensured in such MAC protocols. Therefore, our goal in this work is to design a new wireless MAC protocol featured as: a. less random channel access b. effective channel utilization c. be resilient to selfish behaviors d. QoS supported in terms of bounded transmission delay and throughput Fig 1. cluster architecture Intuitively, token-based medium access control could be a good candidate to achieve the above features. Although some solutions of token based wireless MAC have been proposed [11] [16], they are subject to low channel utilization and vulnerable to selfish behaviors. In this paper, we propose a multi-cluster wireless network architecture to achieve intelligent token-based channel access. With this novel MAC framework, (1) multiple tokens can be supported to increase channel utilization; (2) and the intelligent token passing policy is introduced to countermeasure possible selfish misbehaviors. The rest of the paper is organized as follows: in section II, we present the basic protocol sketch. Possible selfish behaviors will be analyzed in section III and the detection and handling approach will be presented thereafter. Simulation and numerical results will be given in section IV. The conclusion is given in section V. II. BASELINE STC-MAC PROTOCOL OVERVIEW 2.1 Token-Based Multi-Cluster Network Architecture The lack of centralized control and random access scheme complicates the detection of selfish MAC misbehavirors. Also, most exisiting distributed MAC protocols have lower efficiency compared with the centralized approach. In this paper, we introduce loosely centralized control to wireless ad hoc networks to improve channel efficiency as well as to alleviate the selfish MAC misbehaviors. Figure 1 illustrates the basic architecture of our proposed multi-cluster wireless network. All nodes are grouped into clusters, each of which is managed by a Cluster Head (CH), the elected temporary base station for all the nodes within its transmission range or the subset of them. The Cluster Head is responsible for scheduling the channel access for all its cluster members. We introduce the token based channel access control, wherein only the cluster members seizing valid tokens could initiate transmission. Hence, the channel is better utilized due to the elimination of retransmissions caused by collisions. Besides, the properly defined Token Holding Time (THT), the maximum time that each host could transmit data with, can guarantee the bounded delay between two consecutive transmissions for each individual cluster member. Nevertheless, the cluster architecture is a loose infrastructure because of the dynamic change of topology in ad hoc networks. Therefore, the effective clustering algorithm and cluster recovery scheme is required to handle the mobility feature of ad hoc networks. Some clustering algorithms have been proposed[17]-[19]. Since the focus of this paper is to design a MAC protocol to better utilize channel resource, support QoS and countermeasure selfish behaviors, we assume the cluster architecture discussed in the rest of the paper is formed following the lowest-id cluster head selection rule [17]. 2.2 Channel Access Scheme With the existence of dynamic cluster-based centralized control, it is easy to achieve effective wireless channel access in terms of both fairness and QoS. The detailed 2 of 7

3 channel access operations will be explained in the following subsections Channel Acess within Cluster Every host periodically broadcasts its connectivity list, so the cluster head could maintain a complete connectivity table for the entire cluster, as shown in figure 2. The cluster head will award the token in the order of node id. In our work, we propose two types of token configurations, single-token cluster and multi-token cluster. CH CH CH CH CH CH CH Fig 2. STC-MAC network cluster and node connectivity table Token Awarding A. Single-Token Cluster In this case, at a time, only one token could exist in the cluster. Hence, the cluster head simply awards the token from the lowest-id node in the connectivity table, node 1 in figure 2, to the highest-id node. Each node will release the token back to cluster head after the transmission is completed. Figure 3 is the basic packet format of the token frame. CID TokenOwner k CH {seq_no, time} maxtht Fig 3. basic packet format of token frame in single-token cluster CID ID assigned to this cluster TokenOwner ID of current token owner k CH {seq_no, time} token verification field to indicate this is generated by clutser head maxtht maximum possible THT for token owner s transmission In this case, only one transmission exists in a cluster, and thus collisions could be minimized since the channel has been reserved before transmission. Also, the bounded delay could be guaranteed since the token owner is supposed to release the token within THT. The single-token cluster concept is similar to the wireless token ring protocol (WTRP), proposed by Ergen, et al.[11]. In their work, they have indicated via simulations that the token based wireless medium access control outperforms in terms of higher throughput, fair bandwidth allocation and predictable medium access latency. B. Multi-Token Cluster The open wireless medium introduces a new feature, the partial connectivity. In the wired token ring, all ring members are connected to the same wire, so one host could hear any other nodes in the same ring. Such full connectivity enables that one and only one node that seizes the token could access the channel at a time, otherwise, the collision might occur. Since the transmission ranges and distances of hosts in wireless token ring/cluster may vary a lot, not all the nodes in one ring are necessarily connected to each other. Therefore, the baseline token policy could lead to low channel utilization. For example, in figure 2, node 1 owns the token at current time, and it communicates with 2. Node 4 is out of the range of node 2, thus whoever node 4 communicates with, its transmission will not interfere node 1 s transmission. However, with the singletoken policy, node 4 has to defer its transmission although it has data to send. Thus, it is feasible and beneficial to have multiple tokens co-exist in one cluster. In our work, we propose the multi-token wireless cluster and introduce the concepts of Primary Token Owner (PTO) and Secondary Token Owner (STO). The cluster head polls the cluster members in the order of node id. Whether a prospective token owner needs the token is determined by 1) whether it has data to transmit; 2) whether its intended receiver is ready to receive. If the prospective node has no data to transmit, it directly acknowledges the cluster head with no data message. Otherwise, we use an explicit method to acknowledge the polling frame. The prospective token owner sends requestto-send (RTS) message to its intended receiver, which replies with clear-to-send (CTS) message if it is ready to receive data. Thus, upon hearing the CTS message, the cluster head could tell that the Primary Token should be awarded to the prospective token owner. Otherwise, the cluster head looks up the next node in its connectivity table and polls the next one. After the cluster head confirms the Primary Token Owner (PTO) and Primary Receiver (PR), it could intelligently select multiple secondary token owners to further utilize channel resources by allowing simultaneous transmissions, as well as to exclude possible interference across different token owners. The secondary token owner selection algorithm is shown in Algorithm 1. Algorithm 1: Secondary Token Owner Selection Algorithm 1) all nodes that are connected to the primary receiver are covered nodes 2) the cluster head selects one node from uncovered nodes to be the secondary token owner. 3) all nodes that are connected to any possible receiver of the secondary token owner selected from step 2) are covered nodes 3 of 7

4 4) if there exists any uncovered node, go to step 2), otherwise, secondary token owner selection is done. The cluster head generates a new token with the format as figure 4 and broadcasts the token to the whole cluster. CID PTO PR STO1 STO2 k CH {seq_no, time} THT Fig 4. basic token format in multi-token cluster The THT required by the primary token owner also can be obtained from RTS/CTS message exachanges, and no secondary transmissions could exceed the THT required by the primary transmission. All token owners, both the primary and secondary, initiate their own transmission upon receiving the valid token, if they have data to transmit. They are supposed to finish their transmission within THT. Figure 5 depicts the basic work flow of the multi-token awarding operations. token with updated sequence number after a certain time, i.e. predefined token expiration time. Another case of cluster failure is that the cluster head is down or leaves the cluster. Since each node broadcasts its list of neighbors, the cluster configuration is dynamically updated. In case the cluster head is down, a new cluster will be reconstructed soon according to clutering rules. 2.3 Multi-Cluster Resolution To reduce the inter-cluster interference, separate orthogonal channels are assigned to neighboring clusters. The spatial reuse of channel resources could eliminate the inter-cluster interference. The channel is selected at the cluster formation phase by CH and distributed to all cluster members. With the increase of nodes, the clusters might outnumber the available channels. In this case, as long as no channel is shared between adjacent clusters, the intercluster interference still could be effectively eliminated. III. DETECTION AND HANDLING OF SELFISH MISBEHAVIORS IN STC-MAC Fig 5. work flow of token passing in multi-token cluster According to the multi-token awarding protocol designed above, even if all the token owners have data to transmit, there will be no collision among them because STO is connected neither to the primary receiver, nor any possible secondary receivers. As such, more nodes could have chance to access the channel and better resource utilization is achieved Token Releasing We have assumed that no secondary transmission exceeds the THT selected by the primary token owner, so the primary transmission is always the last to complete. Hence, we use the Acknowledgement packet, which is generated by the primary receiver and sent to the primary token owner, to implicate token releasing as this is the sign of the completion of primary transmission. In this way, the control overhead could be reduced Token Recovery In case the token is lost, e.g. acknowledgement from PR to PTO is corrupted, the cluster head will generate a new As we discussed in earlier sections, the proposed tokenbased cluster architecture can effectively support QoS and improve channel utilization. However, similar to most existing wireless MAC protocols, our baseline STC-MAC protocol functions well only when all the hosts abide by the legitimate protocol operations. In the following section, we will first analyze the possible selfish MAC misbehaviors in wireless token cluster networks. Later on, the security enhanced design is proposed to address the challenges of selfish nodes. 3.1 Possible Selfish Misbehavior Since our work focuses on designing effective countermeasure against selfish MAC misbehaviors, we made an assumption that misbehaved nodes will desist from deviating from legitimate protocol operations if they cannot gain interest from such deviation. As presented in our baseline STC-MAC protocol, the fairness and bounded delay is guaranteed by the fact that all cluster members abide by the agreed THT value, and the correct order of token awarding, which is the spirit of token based protocol design. Based on the above analysis, possible selfish misbehaviors include: Selfish hosts forge token to access the channel, competing with the legal token owner. Selfish Primary Token Owner doesn t release token on time. Here Primary Token Owner could be both ordinary cluster members and the cluster head. Cluster head intentionally dismiss some nodes in the round-robin token awarding procedure in order to achieve shorter delay for itself or its colluders. 4 of 7

5 Primary token owner and primary receiver form a selfish collusion to reserve channel for quite a long duration. We do not take into account the case that secondary token owners and receivers deviate from the protocol by not releasing token on time. In case this happened, the acknowledgement frame for primary transmission will be collided by secondary transmission at the cluster head, because the cluster head could hear every cluster member. In this case, the cluster head has to wait for token expiration time to generate a new token, which probably offsets the extra throughput achieved by selfish secondary hosts. 3.2 Selfish Misbehavior Detection and Handling Approach Token Verification We modify the basic token format into figure 6. The cluster head uses its private key to sign the list of PTO, PR, STOs, and seq_no and time is also attached into this digital signature. The token verification could be classified into two types: Ensure the token is awarded by the cluster head In this case, upon receiving the token frame, the cluster member decrypts the signature and compares the time field with its local time. If the difference is larger than the predefined synchronous time skew, this will be taken as an invalid token. Ensure the sender has been awarded with valid token The token owners will attach the token frame into its data frame. Thus, every time when one node receives data from another one, it first decrypts the signature in token frame. If the cluster member receives signature without seq_no updated, the token is taken as invalid. Otherwise, it can be ensured that the transmission is valid as long as the sender belongs to the list of PTO, PR and STOs in token. CID k CH {PTO,PRCV,STO1,STO2,..., Seq_no, time} THT Fig 6. security-enabled token format Out-of-Order Token Awarding The cluster head periodically broadcasts the complete connectivity table of its cluster, and each cluster member could therefore know the order of token awarding. If some node is dismissed, all cluster members could tell, and the new cluster head will be elected if such misbehavior is occurred for more than threshold times Illegal Token Holding Time As shown in figure 5, before the token is awarded to the prospective primary token owner, RTS/CTS handshake operation is required, which broadcasts the expected THT value selected by prospective token owners based on current number of nodes (NoN) and the amount of data to transmit. The formula of maximum THT computation could be defined in the protocol. As such, the cluster head could verify the validity of the expected THT before awarding the token, and set the THT field with legal value if the expected THT is larger than the maximum possible THT under current network environment. Of course the selfish token owner can cheat the cluster head with a legal THT in the RTS/CTS phase, but reserve channel for longer than legal duration. Well behaved primary receiver In this case, the primary receiver could get the legal THT value from the broadcasted token frame in the token awarding procedure. If the primary token owner keeps transmitting after THT, the primary receiver could choose to discard its frame. Collusion of selfish token owner and receiver In this case, the observation taken by the 3 rd party is required. We allow the cluster head to monitor the actual token holding time. We denote the time when CTS is heard by the cluster head as T_cts; and the time when Ack is heard as T_ack. If T=T_ack-T_cts > α*tht, where 1<α<1+, the cluster head knows that the channel has been reserved for illegally long time, and this primary token owner will be dismissed in next token awarding rotation. CTS indicates that the connection between the primary token owner and the receiver has been successfully established; Ack is the sign of completion of transmission. The different between these two values could be estimated as the actual THT. is introduced because the overhead of token frame transmission is taken into account. IV. SIMULATION In this section, we provide some numerical results to illustrate the performance of the proposed token-based wireless cluster MAC protocol. We first compare the performance of the single-token cluster and the multi-token cluster STC-MAC in terms of system throughput and delay. Then we will present a sample selfish MAC misbehavior, and investigate the efficiency of our proposed misbehavior detection and handling scheme. Fig 7. sample topology used in simulation In our simulation, we randomly generate a cluster with 10 hosts, each of which has the same transmission range. 5 of 7

6 Node 1 is the cluster head. All other nodes are not necessarily connected to each other. Cluster head polls each node one by one to check out whether it has data to transmit, the polled node generates packet with probability P, which changes from 0.1 to 1 with increment of 0.1 each round in our simulation. And the packet size is randomly Figure 10 illustrates that in the cluster without selfish behavior detection, well-behaved hosts experience longer delay than they do in the normal cluster. Figure 11 shows that node 3 gains extra throughput by hurting all other well-behaved nodes. Both figures 10 and 11 show that with the proposed detection and penalty approach, the QoS of Fig 8. averge medium access delay vs. packet generation probability Fig 10. individual medium access delay with or without selfish attack Fig 9. system throughput vs. packet generation probability selected from (here we use time slots to measure the packet size). STOs are randomly selected according to algorithm 1. For each cluster topology, we run the simulation for time slots. Figures 8 and 9 show the performance of single-token cluster and multi-token cluster. Every data point is averaged over 10 random topologies. Both figures 8 and 9 illustrate that by enabling simultaneous transmissions, multi-token cluster outperforms single-token cluster in terms of both system throughput and delay. We also design a simulation to test the efficiency of our proposed countermeasure against the selfish misbehavior. In this simulation, we use a fixed topology as figure 7 wherein node 3 is a selfish host and access the channel for 2*THT every time when it seizes token. The penalty scheme used in the simulation is that cluster head will dismiss node 3 for 2 rounds once its selfish behavior is detected. Fig 11. individual throughput with or without selfish attack the well-behaved nodes could be ensured and they all achieve similar performance as they do in normal cluster. V. CONCLUSION Based on our analysis of the flaws of existing wireless MAC protocols, and the related work on wireless MAC misbehaviors, we adopted a concept of the virtual centralized approach to design an enhanced distributed MAC protocol, STC-MAC, to simplify the security issue as well as to improve the performance of wireless MAC. With our proposed token-based wireless cluster MAC protocol, the feature of the token-based medium access control ensures the channel access throughput since the channel is reserved before transmission by token awarding. Thus, the channel utilization is increased by eliminating retransmissions caused by collisions. Also, the bandwidth is fairely assigned to individual hosts since each host takes a turn to access the channel. On the other hand, the cluster 6 of 7

7 architecture provides a dynamic infrastructure platform, which simplifies the medium access control problem in distributed networks. Based on the analysis of the partial connectivity feature in the wireless medium, we proposed an intelligent token awarding policy, multi-token cluster, to better utilize the channel resource. We also analyzed the possible selfish MAC misbehaviors in wireless token cluster networks, the corresponding security scheme is proposed. Our simulation has evidenced the efficiency of our detection and penalty scheme against selfish attacks in the wirless token cluster networks. REFERENCES [1] Raya M, Hubaux JP, and Aad I, DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots, in Proceedings of ACM MobiSys, Boston - MA, 2004 [2] Kyasanur P, and Vaidya NH, Selfish MAC Layer Misbehavior in Wireless Networks, IEEE Transactions on Mobile Computing, Volume 4, Issue 5, Sept.-Oct. 2005, pp [3] Cárdenas AA, Radosavac S, and Baras JS, Detection and prevention of MAC layer misbehavior in ad hoc networks, in Proceedings of ACM workshop on Security of Ad Hoc and Sensor Networks (SASN), Washington DC, Oct [4] Gupta V, Krishnamurthy S, and Faloutsos M, Denial of Service attacks at the MAC layer in wireless ad hoc networks, In Proceedings of Military Communication Conference (MILCOM), Anaheim, CA, Oct [5] MacKenzie AB, and Wicker SB, Selfish Users in Aloha: A Game-Theoretic Approach, in Proceedings of IEEE Vehicular Technology Conference, Oct [6] Cagalj M, Ganeriwal S, Aad I, and Hubaux JP, On Selfish Behavior in CSMA/CA Ad Hoc Networks, in Proceedings of IEEE Infocom Conference 2005, Vol. 4, March 2005, pp [7] MacKenzie AB, and Wicker SB, Stability of Multipacket Slotted Aloha with Selfish Users and Perfect Information, in Proceedings of Infocom 2003, San Francisco, CA, April [8] MacKenzie AB, and Wicker SB, Game Theory and design of self-configuring, adaptive wireless networks, IEEE Communication Magazine,, Nov. 2001, pp [9] Buttyán L, and Hubaux JP, Stimulating Cooperation in Self- Organizing Mobile Ad Hoc Networks, Technical Report No. DSC/2001/046, Swiss Federal Institute of Technology, Lausanne, August [10] Buchegger S, and Boudec JYL, Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Distributed Ad-hoc NeTworks, in Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH, June [11] Ergen M, Lee D, Sengupta R, and Varaiya P, WTRP - wireless token ring protocol, IEEE Transactions on Vehicular Technology, Volume 53, Issue 6, Nov pp [12] Lee D, Attias R, Puri A, Sengupta R, Tripakis S, and Varaiya P, A wireless token ring protocol for intelligent transportation systems, in Proceedings of IEEE Intelligent Transportation Systems, Aug. 2001, pp [13] Deng Z, Lu Y, Wang C, and Wang W, EWTRP: enhanced wireless token ring protocol for small-scale wireless ad hoc networks, in Proceedings of 2004 International Conference on Communications, Circuits and Systems (ICCCAS 2004), Volume 1, Issue, June 2004, pp [14] Ergen M, Lee D, Sengupta R, and Varaiya P, Wireless token ring protocol-performance comparison with IEEE , in Proceedings of Eighth IEEE International Symposium on Computers and Communication (ISCC 2003), 30 June-3 July 2003, pp [15] Taheri SA, and Scaglione A, Token enabled multiple access (TEMA) for packet transmission in high bit rate wireless local area networks, in Proceedings of IEEE International Conference on Communications (ICC), 2002, pp [16] Miura S, Nakamura H, Kamienoo M, and Araki K, Radio link control method by using radio token in high speed wireless LAN system, in Proceedings of IEEE Global Telecommunications Conference (GLOBECOM 98), Volume 3, Issue, 1998, pp [17] Gerla M, and Tsai JTC, Multicluster mobile multimedia radio networks, ACM-Baltzer Journal of Wireless Networks, 1(3): , [18] Baker DJ, Flynn JA, Ephremides A, The Design and Simulation of a Mobile Radio Network with Distributed Control, IEEE Joumal on Selected Areas in Communications, pp , [19] Safwat A, Hassanein HS, and Mouftah H, Power-Aware Fair Infrastructure Formation for Wireless Mobile Ad Hoc Communications, in Proceedings of IEEE Globecom 2001, Volume 5, pp of 7

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #10 MAC Layer Misbehavior Announcements I'll be in Pittsburgh Feb 28-29 If you or your project team would like to meet, email me to schedule

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #9 MAC Misbehavior; OMNET++ Tutorial II 1 Reminder: Assignments Assignment #2 is due today 11:59pm PST Assignment #3 is posted, due March 5 It's

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 15, 2011 SURVEY: MAC Layer Misbehavior Announcements I'd like to talk with each project team in the next week to get a quick progress update

More information

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots By Maxim Raya, Jean-Pierre Hubaux, Imad Aad Laboratory for computer Communications and Applications(LCA) School of Computer and Communication

More information

Cross-layer attacks in wireless ad hoc networks 1

Cross-layer attacks in wireless ad hoc networks 1 2004 Conference on Information Sciences and Systems, Princeton University, March 17 19, 2004 Cross-layer attacks in wireless ad hoc networks 1 Svetlana Radosavac, Nassir Benammar and John S. Baras Electrical

More information

Heuristic Clustering Algorithms in Ad hoc Networks

Heuristic Clustering Algorithms in Ad hoc Networks Heuristic Clustering Algorithms in Ad hoc Networks Artvin Çoruh University e-mail: nevin.aydin@gmail.com Volume 3 No 3 (2014) ISSN 2158-8708 (online) DOI 10.5195/emaj.2014.39 http://emaj.pitt.edu Abstract

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Caveat. Much of security-related stuff is mostly beyond my expertise. So coverage of this topic is very limited

Caveat. Much of security-related stuff is mostly beyond my expertise. So coverage of this topic is very limited Security Issues 476 Caveat Much of security-related stuff is mostly beyond my expertise So coverage of this topic is very limited 477 Security Issues in Mobile Ad Hoc Networks Not much work in this area

More information

MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH. Department of Electrical Engineering and Computer Science

MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH. Department of Electrical Engineering and Computer Science MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH Vamshikrishna Reddy Giri Neeraj Jaggi Department of Electrical Engineering and Computer Science Outline Introduction MAC

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Performance Analysis under MAC Layer Misbehavior Attack in Mobile Ad-Hoc Networks

Performance Analysis under MAC Layer Misbehavior Attack in Mobile Ad-Hoc Networks Computer Technology and Application 6 (2015) 37-44 doi: 10.17265/1934-7332/2015.01.006 D DAVID PUBLISHING Performance Analysis under MAC Layer Misbehavior Attack in Mobile Ad-Hoc Networks Mohammed-Alamine

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

A Robust Kolmogorov-Smirnov Detector for Misbehavior in IEEE DCF

A Robust Kolmogorov-Smirnov Detector for Misbehavior in IEEE DCF This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 27 proceedings. A Robust Kolmogorov-Smirnov Detector for Misbehavior

More information

Detection and Prevention of MAC Layer Misbehavior for Ad Hoc Networks. by Alvaro A. Cardenas, Svetlana Radosavac, John S. Baras

Detection and Prevention of MAC Layer Misbehavior for Ad Hoc Networks. by Alvaro A. Cardenas, Svetlana Radosavac, John S. Baras TECHNICAL RESEARCH REPORT Detection and Prevention of MAC Layer Misbehavior for Ad Hoc Networks by Alvaro A. Cardenas, Svetlana Radosavac, John S. Baras SEIL TR 2004-4 (ISR TR 2004-30) I R INSTITUTE FOR

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Chapter 2 OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Hanan Luss and Wai Chen Telcordia Technologies, Piscataway, New Jersey 08854 hluss@telcordia.com, wchen@research.telcordia.com Abstract:

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

Detection and Handling of MAC Layer Misbehavior in Wireless Networks

Detection and Handling of MAC Layer Misbehavior in Wireless Networks Detection and Handling of MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur Dept. of Computer Science, and Coordinated Science Laboratory, University of Illinois at Urbana-Champaign email: kyasanur@uiuc.edu

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

PEERLESS JAMMING ATTACKS AND NETWORK FORTIFICATION POLICIES IN WIRELESS SENSOR NETWORKS

PEERLESS JAMMING ATTACKS AND NETWORK FORTIFICATION POLICIES IN WIRELESS SENSOR NETWORKS Volume 2, Issue 7, PP:, SEPTEMBER 2014. PEERLESS JAMMING ATTACKS AND NETWORK FORTIFICATION POLICIES IN WIRELESS SENSOR NETWORKS TALLURI BEENA JOSEPHINE 1*, K.RAVICHAND 2* 1. II.M.Tech, Dept of CSE, AM

More information

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Cooperative Reputation Index Based Selfish Node Detection and Prevention System for Mobile Ad hoc Networks

Cooperative Reputation Index Based Selfish Node Detection and Prevention System for Mobile Ad hoc Networks Research Journal of Applied Sciences, Engineering and Technology 4(3): 201-205, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: September 23, 2011 Accepted: November 02, 2011 Published:

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? By: Jing Deng, Yunghsiang S. Han, and Sanjeev R. Kulkarni. J. Deng, Y. S. Han, and S. R. Kulkarni, "Can Multiple Subchannels

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET Ms.T.R.Panke * M.B.E.S.College of

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

An Energy-Balanced Cooperative MAC Protocol in MANETs

An Energy-Balanced Cooperative MAC Protocol in MANETs 2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) (2011) IACSIT Press, Singapore An Energy-Balanced Cooperative MAC Protocol in MANETs

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network * Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

AIMAC: An Auction-Inspired MAC Protocol

AIMAC: An Auction-Inspired MAC Protocol AIMAC: An Auction-Inspired MAC Protocol Ian Tan 1 I. INTRODUCTION Much attention has been given over the past decade to examining the properties of ad-hoc wireless networks. Current trends, however, show

More information

Effect of Fragmentation in WLAN Systems with Interference Problems

Effect of Fragmentation in WLAN Systems with Interference Problems Effect of Fragmentation in WLAN Systems with Interference Problems Shakil Akhtar College of Information Technology UAE University s.akhtar@uaeu.ac.ae Abstract Results from simulation model of an 802.11

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

MOST COMMUNICATION protocols were designed

MOST COMMUNICATION protocols were designed IEEE/ACM TRANSACTIONS ON NETWORKING 1 Evaluation of Detection Algorithms for MAC Layer Misbehavior: Theory and Experiments Alvaro A Cárdenas, Member, IEEE, Svetlana Radosavac, Member, IEEE, and John S

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of

More information

1999, Scott F. Midkiff

1999, Scott F. Midkiff Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Fair Time Sharing Protocol: a Solution for IEEE b Hot Spots

Fair Time Sharing Protocol: a Solution for IEEE b Hot Spots Fair Time Sharing Protocol: a Solution for IEEE 802.11b Hot Spots Anelise Munaretto 1,2, Mauro Fonseca 1,4, Khaldoun Al Agha 2,3, and Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 75015 Paris,

More information

CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING

CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING 99 CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING 5.1 INTRODUCTION Dynamic network topology and limited system resources characterize mobile ad hoc networking. Many routing protocols

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department

More information

Performance Analysis for Channel Utilization in Wireless LAN

Performance Analysis for Channel Utilization in Wireless LAN Performance Analysis for Channel Utilization in Wireless LAN Shweta Singh Naresh Chandra Arun Kumar Tripathi ABSTRACT Wireless network plays an important role in field of communication. Now a days people

More information

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks S. Shiney Lillia PG Student, Department of Computer Science and Engineering, National Institute of Technology Puducherry, Puducherry,

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Sunmyeng Kim Department of Computer Software Engineering, Kumoh National Institute of Technology 1 Daehak-ro, Gumi,

More information

A Survey on Congestion Control and Maximization of Throughput in Wireless Networks

A Survey on Congestion Control and Maximization of Throughput in Wireless Networks A Survey on Congestion Control and Maximization of Throughput in Wireless Networks K.Ravindra Babu Post graduate student V.R.Siddhartha Engineering College ravindra.bec2008@gmail.com J.Ranga Rao Assistant

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing

More information

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Prof. J.-P. Hubaux February 12, 2004 Duration: 2 hours, all documents allowed Please write your answers on these sheets, at the

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks

SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks Wenjia Li Department of Computer Science New York Institute of Technology New York, New York 123 Email: wli2@nyit.edu

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Enhanced Parity Packet Transmission for Video Multicast using R-DSTC Özgü Alay, Zhili Guo, Yao Wang, Elza Erkip

More information