Author:
El Houssaini Mohammed-Alamine,Nabou Abdellah,Hadir Abdelali,El Houssaini Souad,El Kafi Jamal
Abstract
Purpose
Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military. However, because they operate mostly in open spaces, they are exposed to a variety of dangers. The purpose of this study is to introduce a novel method for detecting the MAC layer misbehavior.
Design/methodology/approach
The proposed novel approach is based on exponential smoothing for throughput prediction to address this MAC layer misbehavior. The real and expected throughput are processed using an exponential smoothing algorithm to identify this attack, and if these metrics exhibit a trending pattern, an alarm is then sent.
Findings
The effect of the IEEE 802.11 MAC layer misbehavior on throughput was examined using the NS-2 network simulator, as well as the approval of our novel strategy. The authors have found that a smoothing factor value that is near to 0 provides a very accurate throughput forecast that takes into consideration the recent history of the updated values of the real value. As for the smoothing factor values that are near to 1, they are used to identify MAC layer misbehavior.
Originality/value
According to the authors’ modest knowledge, this new scheme has not been proposed in the state of the art for the detection of greedy behavior in mobile ad hoc networks.
Subject
General Computer Science,Theoretical Computer Science
Reference35 articles.
1. Real-time detection of MAC layer misbehavior in mobile ad hoc networks;Applied Computing and Informatics,2017
2. A resilient MAC protocol for wireless networks;In Proceedings of IMA Conference on Game Theory and Its Applications,2014
3. Resilient misbehaviour detection MAC protocol (MD-MAC) for distributed wireless networks,2016
4. Culminate coverage for sensor network through Bodacious-Instance mechanism. i-manager’s;Journal on Wireless Communication Networks,2019
5. NRSM: node redeployment shrewd mechanism for wireless sensor network;Iran Journal of Computer Science,2021
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cooperative optimization techniques in distributed MAC protocols – a survey;International Journal of Pervasive Computing and Communications;2023-10-11