A cluster-based countermeasure against media access control layer attacks in IEEE 802.11 ad hoc networks

Fei Shi, Joo Seok Song

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

The characteristics of ad hoc networks, such as the absence of infrastructure, a dynamic topology, a shared wireless medium and a resource-constrained environment pose various security challenges. Most previous studies focused on the detection of misbehavior after it had occurred. However, in this paper we propose a new way of thinking to evade the occurrence of misbehavior. In our scheme, we firstly present a clustering algorithm that employs a powerful analytic hierarchy process methodology to elect a clusterhead for each cluster. The clusterhead in each cluster is then allowed to assign the backoff values to its members, i.e., originators, rather than permitting the originators to choose the backoff values by themselves. Through this media access control layer misbehavior detection mechanism, the misuse of the backoff in the media access control layer in the 802.11 distributed coordination function can be detected.

Original languageEnglish
Pages (from-to)1565-1585
Number of pages21
JournalKSII Transactions on Internet and Information Systems
Volume6
Issue number6
DOIs
Publication statusPublished - 2012 Jun 26

Fingerprint

Medium access control
Ad hoc networks
Analytic hierarchy process
Clustering algorithms
Topology

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Networks and Communications

Cite this

@article{8a36fa267cee4c2f91888cf562bf6900,
title = "A cluster-based countermeasure against media access control layer attacks in IEEE 802.11 ad hoc networks",
abstract = "The characteristics of ad hoc networks, such as the absence of infrastructure, a dynamic topology, a shared wireless medium and a resource-constrained environment pose various security challenges. Most previous studies focused on the detection of misbehavior after it had occurred. However, in this paper we propose a new way of thinking to evade the occurrence of misbehavior. In our scheme, we firstly present a clustering algorithm that employs a powerful analytic hierarchy process methodology to elect a clusterhead for each cluster. The clusterhead in each cluster is then allowed to assign the backoff values to its members, i.e., originators, rather than permitting the originators to choose the backoff values by themselves. Through this media access control layer misbehavior detection mechanism, the misuse of the backoff in the media access control layer in the 802.11 distributed coordination function can be detected.",
author = "Fei Shi and Song, {Joo Seok}",
year = "2012",
month = "6",
day = "26",
doi = "10.3837/tiis.2012.06.005",
language = "English",
volume = "6",
pages = "1565--1585",
journal = "KSII Transactions on Internet and Information Systems",
issn = "1976-7277",
publisher = "Korea Society of Internet Information",
number = "6",

}

TY - JOUR

T1 - A cluster-based countermeasure against media access control layer attacks in IEEE 802.11 ad hoc networks

AU - Shi, Fei

AU - Song, Joo Seok

PY - 2012/6/26

Y1 - 2012/6/26

N2 - The characteristics of ad hoc networks, such as the absence of infrastructure, a dynamic topology, a shared wireless medium and a resource-constrained environment pose various security challenges. Most previous studies focused on the detection of misbehavior after it had occurred. However, in this paper we propose a new way of thinking to evade the occurrence of misbehavior. In our scheme, we firstly present a clustering algorithm that employs a powerful analytic hierarchy process methodology to elect a clusterhead for each cluster. The clusterhead in each cluster is then allowed to assign the backoff values to its members, i.e., originators, rather than permitting the originators to choose the backoff values by themselves. Through this media access control layer misbehavior detection mechanism, the misuse of the backoff in the media access control layer in the 802.11 distributed coordination function can be detected.

AB - The characteristics of ad hoc networks, such as the absence of infrastructure, a dynamic topology, a shared wireless medium and a resource-constrained environment pose various security challenges. Most previous studies focused on the detection of misbehavior after it had occurred. However, in this paper we propose a new way of thinking to evade the occurrence of misbehavior. In our scheme, we firstly present a clustering algorithm that employs a powerful analytic hierarchy process methodology to elect a clusterhead for each cluster. The clusterhead in each cluster is then allowed to assign the backoff values to its members, i.e., originators, rather than permitting the originators to choose the backoff values by themselves. Through this media access control layer misbehavior detection mechanism, the misuse of the backoff in the media access control layer in the 802.11 distributed coordination function can be detected.

UR - http://www.scopus.com/inward/record.url?scp=84863807421&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84863807421&partnerID=8YFLogxK

U2 - 10.3837/tiis.2012.06.005

DO - 10.3837/tiis.2012.06.005

M3 - Article

VL - 6

SP - 1565

EP - 1585

JO - KSII Transactions on Internet and Information Systems

JF - KSII Transactions on Internet and Information Systems

SN - 1976-7277

IS - 6

ER -