A Game Theoretic Approach Against the Greedy Behavior in MAC IEEE 802.11

In recent years, mobile ad hoc networks are invading more and more our daily lives. Indeed, several persons are linked daily to ad hoc networks, which aim to exchange data via smartphones, computers, or tablets. A mobile ad hoc network is a group of mobile stations equipped with wireless transmitter...

Full description

Saved in:
Bibliographic Details
Published inUbiquitous Networking Vol. 10542; pp. 38 - 47
Main Authors El Houssaini, Mohammed-Alamine, Aaroud, Abdessadek, Hore, Ali El, Ben-Othman, Jalel
Format Book Chapter
LanguageEnglish
Published Switzerland Springer International Publishing AG 2017
Springer International Publishing
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN3319681788
9783319681788
ISSN0302-9743
1611-3349
DOI10.1007/978-3-319-68179-5_4

Cover

Abstract In recent years, mobile ad hoc networks are invading more and more our daily lives. Indeed, several persons are linked daily to ad hoc networks, which aim to exchange data via smartphones, computers, or tablets. A mobile ad hoc network is a group of mobile stations equipped with wireless transmitters/receivers without fixed infrastructure use or centralized administration. In this sense, the network can be seen as a random graph due to the motion of nodes. The change of the network topology based on the time when nodes move or adjust their transmission and reception parameters. The design of these networks is characterized by its vulnerability to denial of service (DOS) attacks such as the greedy behavior (MAC layer misbehavior). In this paper, we formalized the reaction against this malicious behavior of the MAC layer by game theory. We have developed a model in the extensive form of our reaction scheme and a resolution of the game by Kühn’s algorithm. A validation of results though the NS2 network simulator is then given to the end.
AbstractList In recent years, mobile ad hoc networks are invading more and more our daily lives. Indeed, several persons are linked daily to ad hoc networks, which aim to exchange data via smartphones, computers, or tablets. A mobile ad hoc network is a group of mobile stations equipped with wireless transmitters/receivers without fixed infrastructure use or centralized administration. In this sense, the network can be seen as a random graph due to the motion of nodes. The change of the network topology based on the time when nodes move or adjust their transmission and reception parameters. The design of these networks is characterized by its vulnerability to denial of service (DOS) attacks such as the greedy behavior (MAC layer misbehavior). In this paper, we formalized the reaction against this malicious behavior of the MAC layer by game theory. We have developed a model in the extensive form of our reaction scheme and a resolution of the game by Kühn’s algorithm. A validation of results though the NS2 network simulator is then given to the end.
Author El Houssaini, Mohammed-Alamine
Hore, Ali El
Ben-Othman, Jalel
Aaroud, Abdessadek
Author_xml – sequence: 1
  givenname: Mohammed-Alamine
  surname: El Houssaini
  fullname: El Houssaini, Mohammed-Alamine
  email: elhoussaini.m@ucd.ac.ma
  organization: Department of Computer Science, Faculty of Sciences, Chouaib Doukkali University, El Jadida, Morocco
– sequence: 2
  givenname: Abdessadek
  surname: Aaroud
  fullname: Aaroud, Abdessadek
  email: aaroud.a@ucd.ac.ma
  organization: Department of Computer Science, Faculty of Sciences, Chouaib Doukkali University, El Jadida, Morocco
– sequence: 3
  givenname: Ali El
  surname: Hore
  fullname: Hore, Ali El
  email: elhore.a@ucd.ac.ma
  organization: Department of Computer Science, Faculty of Sciences, Chouaib Doukkali University, El Jadida, Morocco
– sequence: 4
  givenname: Jalel
  surname: Ben-Othman
  fullname: Ben-Othman, Jalel
  email: jalel.ben-othman@univ-paris13.fr
  organization: Department of Computer Science, Galilee Institute, Paris 13 University, Paris, France
BookMark eNqNkMtOwzAQRc1TtNAvYOMfMMz4FXsZqlKQQGxgbTnJlIRHEpKAxN9jCuxZzehenZHmzNl-27XE2CnCGQJk5z5zQgmFXliHmRcm6B22SKlK2TYyu2yGFlEopf0em_8Vzu2zGSiQwmdaHbI5AkrlbWb8EVuM4xMAyExrkHbGrnK-jq_E72vqBpqakud9P3SxrHn-GJt2nPhUE18PRNUnv6A6fjTdwJuW3-ZLfr1arbgDeYZ4wg428WWkxe88Zg-Xq_vllbi5W18v8xvRS6cmUcXSa0fWOWNiibFChA1gWgtSlSsceenJb4qiitFunNaqitqZ6LWspCV1zPDn7tgPTftIQyi67nkMCOHbW0iGggpJRdhKCslbYuQPkz57e6dxCvQNldROQ3wp69hPNIzBSgdeJ8QEC_-FjPGQOfMLfQHsu3wj
ContentType Book Chapter
Copyright Springer International Publishing AG 2017
Copyright_xml – notice: Springer International Publishing AG 2017
DBID FFUUA
DEWEY 4
DOI 10.1007/978-3-319-68179-5_4
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 9783319681795
3319681796
EISSN 1611-3349
Editor Sabir, Essaid
Ghogho, Mounir
García Armada, Ana
Debbah, Mérouane
Editor_xml – sequence: 1
  fullname: Sabir, Essaïd
– sequence: 2
  fullname: Ghogho, Mounir
– sequence: 3
  fullname: García Armada, Ana
– sequence: 4
  fullname: Debbah, Mérouane
EndPage 47
ExternalDocumentID EBC6280949_55_60
EBC5590785_55_60
GroupedDBID 0D6
0DA
38.
AABBV
AALVI
ABBVZ
ABHTH
ABQUB
ACDJR
ADCXD
AEDXK
AEJLV
AEKFX
AETDV
AEZAY
AGIGN
AGYGE
AIODD
ALBAV
ALMA_UNASSIGNED_HOLDINGS
AZZ
BATQV
BBABE
CVWCR
CZZ
FFUUA
I4C
IEZ
SBO
SWYDZ
TPJZQ
TSXQS
Z5O
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z87
Z88
-DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
AEFIE
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-p283t-dac948e68855ac1ad110f01ac1be3d8b8e929e9fbbdaa6f8443da485a942d26e3
ISBN 3319681788
9783319681788
ISSN 0302-9743
IngestDate Wed Sep 17 03:11:07 EDT 2025
Thu May 29 16:36:16 EDT 2025
Thu May 29 00:19:17 EDT 2025
IsPeerReviewed true
IsScholarly true
LCCallNum TK5105.5-5105.9QA76.
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p283t-dac948e68855ac1ad110f01ac1be3d8b8e929e9fbbdaa6f8443da485a942d26e3
OCLC 1012396759
PQID EBC5590785_55_60
PageCount 10
ParticipantIDs springer_books_10_1007_978_3_319_68179_5_4
proquest_ebookcentralchapters_6280949_55_60
proquest_ebookcentralchapters_5590785_55_60
PublicationCentury 2000
PublicationDate 2017
PublicationDateYYYYMMDD 2017-01-01
PublicationDate_xml – year: 2017
  text: 2017
PublicationDecade 2010
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Cham
PublicationSeriesSubtitle Computer Communication Networks and Telecommunications
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate Lect.Notes Computer
PublicationSubtitle Third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised Selected Papers
PublicationTitle Ubiquitous Networking
PublicationYear 2017
Publisher Springer International Publishing AG
Springer International Publishing
Publisher_xml – name: Springer International Publishing AG
– name: Springer International Publishing
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Steffen, Bernhard
Pandu Rangan, C.
Kanade, Takeo
Kittler, Josef
Weikum, Gerhard
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, Lancaster, United Kingdom
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, United Kingdom
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: CNB H 104.2, ETH Zurich, Zürich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Madras, Indian Institute of Technology, Chennai, India
– sequence: 9
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: Fakultät Informatik, TU Dortmund, Dortmund, Germany
– sequence: 10
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 11
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
  organization: University of California, Berkeley, USA
– sequence: 12
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max Planck Institute for Informatics, Saarbrücken, Germany
SSID ssj0002744026
ssj0002792
Score 1.8365878
Snippet In recent years, mobile ad hoc networks are invading more and more our daily lives. Indeed, several persons are linked daily to ad hoc networks, which aim to...
SourceID springer
proquest
SourceType Publisher
StartPage 38
SubjectTerms Game theory
MAC IEEE 802.11
Misbehavior reaction
Mobile ad hoc network
NS2 simulation
Title A Game Theoretic Approach Against the Greedy Behavior in MAC IEEE 802.11
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=5590785&ppg=60
http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6280949&ppg=60
http://link.springer.com/10.1007/978-3-319-68179-5_4
Volume 10542
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PT9swFLZGd2FcYIDGr8mHnValSmIndY4BFSo0dipTb5Z_ZephHYz2AH8978Vx2kaVJrhEieVGrr_k5fPz-94j5BvLuamd7lVsecS10ZFOdBzZyiqbDqGVoVD47mc-vue302y6Kg9Wq0sWemBetupK3oMqtAGuqJJ9A7LtTaEBzgFfOALCcOyQ3003q69YpGePS3gfl2ip6lju8BUK8cf9G_XHefU9ShWRcXr9VPlbzYAW1qQTA2_sc8iTiMHp_bsS7AYsAvsiTgeNkWocA8mw4xgIjsGOa3HNu1XebCwmGb6NIhn6MnutdQROl261tevhFSiFwt8WUSb56tMSttN9yYBOYuvR5RUsZ4CiZDLLJHR5eIywGhjumjelUXbIDoyrRz6Wo9sfv1rfWZ3VMM1RqtOO2SdTWl23GaZ8EuHOEDfWE50t8JpZTPbJHqpNKMpAYNQH5IObfyaf1rJEHpJxSRFI2gJJA5C0AZICkNQDSQOQdDanACRFIKkH8ojcX48mV-OoKYARPQDrW0RWmYILlwuRZcokygJXq-IETrVjVmjhgNy6otLaKpVXgnNmFReZKnhq09yxY9Kb_527L4QmwukhA-ttjIHJ08Jwi3GGDLiJMc6ckH6YEFlv0zexwcb__Se5AdV_e-epiAtehN7fwwxL7PwkQ65sQEYyCcjIGhkJyJy-aSBnZHf16J-T3uLf0l0AS1zor81D8wqUrmGo
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Ubiquitous+Networking&rft.atitle=A+Game+Theoretic+Approach+Against+the+Greedy+Behavior+in+MAC+IEEE+802.11&rft.date=2017-01-01&rft.pub=Springer+International+Publishing+AG&rft.isbn=9783319681788&rft.volume=10542&rft_id=info:doi/10.1007%2F978-3-319-68179-5_4&rft.externalDBID=60&rft.externalDocID=EBC5590785_55_60
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F5590785-l.jpg
http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6280949-l.jpg