University of Hertfordshire

By the same authors

A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Standard

A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance. / Alocious, Chaminda; Xiao, Hannan; Christianson, B.

Procs 6th York Doctoral Symposium on Computer Science & Electronics: (YDS 2013). ed. / Sam Simpson. University of York, 2013. p. 57-62.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Alocious, C, Xiao, H & Christianson, B 2013, A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance. in S Simpson (ed.), Procs 6th York Doctoral Symposium on Computer Science & Electronics: (YDS 2013). University of York, pp. 57-62, 6th York Doctoral Symposium on Computer Science & Electronics, York, United Kingdom, 28/10/13. <http://www.cs.york.ac.uk/yds/yds2013Proceedings/YDS_2013_Proceddings.pdf>

APA

Alocious, C., Xiao, H., & Christianson, B. (2013). A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance. In S. Simpson (Ed.), Procs 6th York Doctoral Symposium on Computer Science & Electronics: (YDS 2013) (pp. 57-62). University of York. http://www.cs.york.ac.uk/yds/yds2013Proceedings/YDS_2013_Proceddings.pdf

Vancouver

Alocious C, Xiao H, Christianson B. A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance. In Simpson S, editor, Procs 6th York Doctoral Symposium on Computer Science & Electronics: (YDS 2013). University of York. 2013. p. 57-62

Author

Alocious, Chaminda ; Xiao, Hannan ; Christianson, B. / A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance. Procs 6th York Doctoral Symposium on Computer Science & Electronics: (YDS 2013). editor / Sam Simpson. University of York, 2013. pp. 57-62

Bibtex

@inproceedings{4cdfd8df67f74ee984ddb81e3efbebc4,
title = "A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance",
abstract = "The most common wireless Medium Access Control (MAC) protocol is IEEE 802.11. Currently IEEE 802.11 standard protocol is not resilient for many identified MAC layer attacks, because the protocol is designed without intention for providing security and with the assumption that all the nodes in the wireless network adhere to the protocol. However, nodes may purposefully show misbehaviours at the MAC layer in order to obtain extra bandwidth con-serve resources and degrade or disrupt the network performance. This research proposes a secure MAC protocol for MAC layer which has integrated with a novel misbehaviour detection and avoidance mechanism for Mobile Ad Hoc Networks (MANETs). The proposed secure MAC protocol the sender and receiver work collaboratively together to handshakes prior to deciding the back-off values. Common neighbours of the sender and receiver contributes effectively to misbehaviours detection and avoidance process at MAC layer. In addition the proposed solution introduces a new trust distribution model in the network by assuming none of the wireless nodes need to trust each other. The secure MAC protocol also assumes that misbehaving nodes have significant levels of intelligence to avoid the detection",
author = "Chaminda Alocious and Hannan Xiao and B. Christianson",
year = "2013",
language = "English",
pages = "57--62",
editor = "Sam Simpson",
booktitle = "Procs 6th York Doctoral Symposium on Computer Science & Electronics",
publisher = "University of York",
note = "6th York Doctoral Symposium on Computer Science &amp; Electronics ; Conference date: 28-10-2013",

}

RIS

TY - GEN

T1 - A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance

AU - Alocious, Chaminda

AU - Xiao, Hannan

AU - Christianson, B.

PY - 2013

Y1 - 2013

N2 - The most common wireless Medium Access Control (MAC) protocol is IEEE 802.11. Currently IEEE 802.11 standard protocol is not resilient for many identified MAC layer attacks, because the protocol is designed without intention for providing security and with the assumption that all the nodes in the wireless network adhere to the protocol. However, nodes may purposefully show misbehaviours at the MAC layer in order to obtain extra bandwidth con-serve resources and degrade or disrupt the network performance. This research proposes a secure MAC protocol for MAC layer which has integrated with a novel misbehaviour detection and avoidance mechanism for Mobile Ad Hoc Networks (MANETs). The proposed secure MAC protocol the sender and receiver work collaboratively together to handshakes prior to deciding the back-off values. Common neighbours of the sender and receiver contributes effectively to misbehaviours detection and avoidance process at MAC layer. In addition the proposed solution introduces a new trust distribution model in the network by assuming none of the wireless nodes need to trust each other. The secure MAC protocol also assumes that misbehaving nodes have significant levels of intelligence to avoid the detection

AB - The most common wireless Medium Access Control (MAC) protocol is IEEE 802.11. Currently IEEE 802.11 standard protocol is not resilient for many identified MAC layer attacks, because the protocol is designed without intention for providing security and with the assumption that all the nodes in the wireless network adhere to the protocol. However, nodes may purposefully show misbehaviours at the MAC layer in order to obtain extra bandwidth con-serve resources and degrade or disrupt the network performance. This research proposes a secure MAC protocol for MAC layer which has integrated with a novel misbehaviour detection and avoidance mechanism for Mobile Ad Hoc Networks (MANETs). The proposed secure MAC protocol the sender and receiver work collaboratively together to handshakes prior to deciding the back-off values. Common neighbours of the sender and receiver contributes effectively to misbehaviours detection and avoidance process at MAC layer. In addition the proposed solution introduces a new trust distribution model in the network by assuming none of the wireless nodes need to trust each other. The secure MAC protocol also assumes that misbehaving nodes have significant levels of intelligence to avoid the detection

M3 - Conference contribution

SP - 57

EP - 62

BT - Procs 6th York Doctoral Symposium on Computer Science & Electronics

A2 - Simpson, Sam

PB - University of York

T2 - 6th York Doctoral Symposium on Computer Science &amp; Electronics

Y2 - 28 October 2013

ER -