A Game Theoretic Approach Against the Greedy Behavior in MAC IEEE 802.11
In recent years, mobile ad hoc networks are invading more and more our daily lives. Indeed, several persons are linked daily to ad hoc networks, which aim to exchange data via smartphones, computers, or tablets. A mobile ad hoc network is a group of mobile stations equipped with wireless transmitter...
Saved in:
| Published in | Ubiquitous Networking Vol. 10542; pp. 38 - 47 |
|---|---|
| Main Authors | , , , |
| Format | Book Chapter |
| Language | English |
| Published |
Switzerland
Springer International Publishing AG
2017
Springer International Publishing |
| Series | Lecture Notes in Computer Science |
| Subjects | |
| Online Access | Get full text |
| ISBN | 3319681788 9783319681788 |
| ISSN | 0302-9743 1611-3349 |
| DOI | 10.1007/978-3-319-68179-5_4 |
Cover
| Abstract | In recent years, mobile ad hoc networks are invading more and more our daily lives. Indeed, several persons are linked daily to ad hoc networks, which aim to exchange data via smartphones, computers, or tablets. A mobile ad hoc network is a group of mobile stations equipped with wireless transmitters/receivers without fixed infrastructure use or centralized administration. In this sense, the network can be seen as a random graph due to the motion of nodes. The change of the network topology based on the time when nodes move or adjust their transmission and reception parameters. The design of these networks is characterized by its vulnerability to denial of service (DOS) attacks such as the greedy behavior (MAC layer misbehavior). In this paper, we formalized the reaction against this malicious behavior of the MAC layer by game theory. We have developed a model in the extensive form of our reaction scheme and a resolution of the game by Kühn’s algorithm. A validation of results though the NS2 network simulator is then given to the end. |
|---|---|
| AbstractList | In recent years, mobile ad hoc networks are invading more and more our daily lives. Indeed, several persons are linked daily to ad hoc networks, which aim to exchange data via smartphones, computers, or tablets. A mobile ad hoc network is a group of mobile stations equipped with wireless transmitters/receivers without fixed infrastructure use or centralized administration. In this sense, the network can be seen as a random graph due to the motion of nodes. The change of the network topology based on the time when nodes move or adjust their transmission and reception parameters. The design of these networks is characterized by its vulnerability to denial of service (DOS) attacks such as the greedy behavior (MAC layer misbehavior). In this paper, we formalized the reaction against this malicious behavior of the MAC layer by game theory. We have developed a model in the extensive form of our reaction scheme and a resolution of the game by Kühn’s algorithm. A validation of results though the NS2 network simulator is then given to the end. |
| Author | El Houssaini, Mohammed-Alamine Hore, Ali El Ben-Othman, Jalel Aaroud, Abdessadek |
| Author_xml | – sequence: 1 givenname: Mohammed-Alamine surname: El Houssaini fullname: El Houssaini, Mohammed-Alamine email: elhoussaini.m@ucd.ac.ma organization: Department of Computer Science, Faculty of Sciences, Chouaib Doukkali University, El Jadida, Morocco – sequence: 2 givenname: Abdessadek surname: Aaroud fullname: Aaroud, Abdessadek email: aaroud.a@ucd.ac.ma organization: Department of Computer Science, Faculty of Sciences, Chouaib Doukkali University, El Jadida, Morocco – sequence: 3 givenname: Ali El surname: Hore fullname: Hore, Ali El email: elhore.a@ucd.ac.ma organization: Department of Computer Science, Faculty of Sciences, Chouaib Doukkali University, El Jadida, Morocco – sequence: 4 givenname: Jalel surname: Ben-Othman fullname: Ben-Othman, Jalel email: jalel.ben-othman@univ-paris13.fr organization: Department of Computer Science, Galilee Institute, Paris 13 University, Paris, France |
| BookMark | eNqNkMtOwzAQRc1TtNAvYOMfMMz4FXsZqlKQQGxgbTnJlIRHEpKAxN9jCuxZzehenZHmzNl-27XE2CnCGQJk5z5zQgmFXliHmRcm6B22SKlK2TYyu2yGFlEopf0em_8Vzu2zGSiQwmdaHbI5AkrlbWb8EVuM4xMAyExrkHbGrnK-jq_E72vqBpqakud9P3SxrHn-GJt2nPhUE18PRNUnv6A6fjTdwJuW3-ZLfr1arbgDeYZ4wg428WWkxe88Zg-Xq_vllbi5W18v8xvRS6cmUcXSa0fWOWNiibFChA1gWgtSlSsceenJb4qiitFunNaqitqZ6LWspCV1zPDn7tgPTftIQyi67nkMCOHbW0iGggpJRdhKCslbYuQPkz57e6dxCvQNldROQ3wp69hPNIzBSgdeJ8QEC_-FjPGQOfMLfQHsu3wj |
| ContentType | Book Chapter |
| Copyright | Springer International Publishing AG 2017 |
| Copyright_xml | – notice: Springer International Publishing AG 2017 |
| DBID | FFUUA |
| DEWEY | 4 |
| DOI | 10.1007/978-3-319-68179-5_4 |
| DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISBN | 9783319681795 3319681796 |
| EISSN | 1611-3349 |
| Editor | Sabir, Essaid Ghogho, Mounir García Armada, Ana Debbah, Mérouane |
| Editor_xml | – sequence: 1 fullname: Sabir, Essaïd – sequence: 2 fullname: Ghogho, Mounir – sequence: 3 fullname: García Armada, Ana – sequence: 4 fullname: Debbah, Mérouane |
| EndPage | 47 |
| ExternalDocumentID | EBC6280949_55_60 EBC5590785_55_60 |
| GroupedDBID | 0D6 0DA 38. AABBV AALVI ABBVZ ABHTH ABQUB ACDJR ADCXD AEDXK AEJLV AEKFX AETDV AEZAY AGIGN AGYGE AIODD ALBAV ALMA_UNASSIGNED_HOLDINGS AZZ BATQV BBABE CVWCR CZZ FFUUA I4C IEZ SBO SWYDZ TPJZQ TSXQS Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z87 Z88 -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS AEFIE EJD F5P FEDTE HVGLF LAS LDH P2P RNI RSU SVGTG VI1 ~02 |
| ID | FETCH-LOGICAL-p283t-dac948e68855ac1ad110f01ac1be3d8b8e929e9fbbdaa6f8443da485a942d26e3 |
| ISBN | 3319681788 9783319681788 |
| ISSN | 0302-9743 |
| IngestDate | Wed Sep 17 03:11:07 EDT 2025 Thu May 29 16:36:16 EDT 2025 Thu May 29 00:19:17 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| LCCallNum | TK5105.5-5105.9QA76. |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-p283t-dac948e68855ac1ad110f01ac1be3d8b8e929e9fbbdaa6f8443da485a942d26e3 |
| OCLC | 1012396759 |
| PQID | EBC5590785_55_60 |
| PageCount | 10 |
| ParticipantIDs | springer_books_10_1007_978_3_319_68179_5_4 proquest_ebookcentralchapters_6280949_55_60 proquest_ebookcentralchapters_5590785_55_60 |
| PublicationCentury | 2000 |
| PublicationDate | 2017 |
| PublicationDateYYYYMMDD | 2017-01-01 |
| PublicationDate_xml | – year: 2017 text: 2017 |
| PublicationDecade | 2010 |
| PublicationPlace | Switzerland |
| PublicationPlace_xml | – name: Switzerland – name: Cham |
| PublicationSeriesSubtitle | Computer Communication Networks and Telecommunications |
| PublicationSeriesTitle | Lecture Notes in Computer Science |
| PublicationSeriesTitleAlternate | Lect.Notes Computer |
| PublicationSubtitle | Third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised Selected Papers |
| PublicationTitle | Ubiquitous Networking |
| PublicationYear | 2017 |
| Publisher | Springer International Publishing AG Springer International Publishing |
| Publisher_xml | – name: Springer International Publishing AG – name: Springer International Publishing |
| RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Naor, Moni Mitchell, John C. Terzopoulos, Demetri Steffen, Bernhard Pandu Rangan, C. Kanade, Takeo Kittler, Josef Weikum, Gerhard Hutchison, David Tygar, Doug |
| RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, Lancaster, United Kingdom – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, United Kingdom – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: CNB H 104.2, ETH Zurich, Zürich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Madras, Indian Institute of Technology, Chennai, India – sequence: 9 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: Fakultät Informatik, TU Dortmund, Dortmund, Germany – sequence: 10 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles, USA – sequence: 11 givenname: Doug surname: Tygar fullname: Tygar, Doug organization: University of California, Berkeley, USA – sequence: 12 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max Planck Institute for Informatics, Saarbrücken, Germany |
| SSID | ssj0002744026 ssj0002792 |
| Score | 1.8365878 |
| Snippet | In recent years, mobile ad hoc networks are invading more and more our daily lives. Indeed, several persons are linked daily to ad hoc networks, which aim to... |
| SourceID | springer proquest |
| SourceType | Publisher |
| StartPage | 38 |
| SubjectTerms | Game theory MAC IEEE 802.11 Misbehavior reaction Mobile ad hoc network NS2 simulation |
| Title | A Game Theoretic Approach Against the Greedy Behavior in MAC IEEE 802.11 |
| URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=5590785&ppg=60 http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6280949&ppg=60 http://link.springer.com/10.1007/978-3-319-68179-5_4 |
| Volume | 10542 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PT9swFLZGd2FcYIDGr8mHnValSmIndY4BFSo0dipTb5Z_ZephHYz2AH8978Vx2kaVJrhEieVGrr_k5fPz-94j5BvLuamd7lVsecS10ZFOdBzZyiqbDqGVoVD47mc-vue302y6Kg9Wq0sWemBetupK3oMqtAGuqJJ9A7LtTaEBzgFfOALCcOyQ3003q69YpGePS3gfl2ip6lju8BUK8cf9G_XHefU9ShWRcXr9VPlbzYAW1qQTA2_sc8iTiMHp_bsS7AYsAvsiTgeNkWocA8mw4xgIjsGOa3HNu1XebCwmGb6NIhn6MnutdQROl261tevhFSiFwt8WUSb56tMSttN9yYBOYuvR5RUsZ4CiZDLLJHR5eIywGhjumjelUXbIDoyrRz6Wo9sfv1rfWZ3VMM1RqtOO2SdTWl23GaZ8EuHOEDfWE50t8JpZTPbJHqpNKMpAYNQH5IObfyaf1rJEHpJxSRFI2gJJA5C0AZICkNQDSQOQdDanACRFIKkH8ojcX48mV-OoKYARPQDrW0RWmYILlwuRZcokygJXq-IETrVjVmjhgNy6otLaKpVXgnNmFReZKnhq09yxY9Kb_527L4QmwukhA-ttjIHJ08Jwi3GGDLiJMc6ckH6YEFlv0zexwcb__Se5AdV_e-epiAtehN7fwwxL7PwkQ65sQEYyCcjIGhkJyJy-aSBnZHf16J-T3uLf0l0AS1zor81D8wqUrmGo |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Ubiquitous+Networking&rft.atitle=A+Game+Theoretic+Approach+Against+the+Greedy+Behavior+in+MAC+IEEE+802.11&rft.date=2017-01-01&rft.pub=Springer+International+Publishing+AG&rft.isbn=9783319681788&rft.volume=10542&rft_id=info:doi/10.1007%2F978-3-319-68179-5_4&rft.externalDBID=60&rft.externalDocID=EBC5590785_55_60 |
| thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F5590785-l.jpg http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6280949-l.jpg |