Detecting Misbehavior In Wi-Fi Networks Aware Neighbour Coverage

S. Sathiya Sindu*, J. Reegan**, S. Sathiya Naveena***
* M.E, Department of Electronics and Communication Engineering, Chandy College of Engineering, Thoothukudi, Tamil Nadu, India.
** Assistant Professor, Department of Electronics and Communication Engineering, Chandy College of Engineering, Thoothukudi, Tamil Nadu, India.
*** B.Tech, Department of Information Technology, Jayaraj Annapackiam C.S.I College of Engineering, Thoothukudi , Tamil Nadu, India.
Periodicity:April - June'2014
DOI : https://doi.org/10.26634/jwcn.3.1.2740

Abstract

Wi-Fi has been widely deployed in enterprise and campus networks. With this wide deployment, it becomes increasingly important to understand the behavior of Wi-Fi interference and automatically managed Wi-Fi to ensure their normal operation and security. Selfish Carrier Monitoring (SCM) approach is used to detect a selfish attack of a Wi-Fi network by sniffer monitoring. Wi-Fi performance is analyzed by sniffers that capture transmitted frames. Multiple sniffers are deployed to monitor the selfish carrier sense behavior by initiating the threshold value with. Multiple sniffers in large areas, some areas are covered with more than one sniffer, and neighbour sniffers will observe the information about coverage areas. A node can be selfish by raising the Clear Channel Assessment (CCA) threshold value. Based on the identifications any misbehavior in carrier sense behavior with in the node pairs, and the selfish attack by tuning the threshold value are found. By detecting attacker nodes in the network, and sniffer broadcasting the information to the neighbour, in an isolate the attacker and choose alternate path for broadcasting. Distributed sniffers efficiently detect and isolate attacker in routing path. Selfish attack activates the sniffer monitoring system even when the network is in active state or inactive state depending on the suspicious value. Obtaining more accurate additional coverage area ratio of sensing neighbour coverage knowledge will also minimize router overhead.

Keywords

Selfish attack, Wi-Fi, CCA(Clear Channel Assessment), Distributed sniffers

How to Cite this Article?

Sindu, S.S., Reegan, J., and Naveena, S.S. (2014). Detecting Misbehavior In Wi-Fi Networks Aware Neighbour Coverage. i-manager’s Journal on Wireless Communication Networks, 3(1), 29-34. https://doi.org/10.26634/jwcn.3.1.2740

References

[1]. Abdul Nasir Khan, Kalim Qureshi, and Sumair Khan, (2012). “An Intelligent Approach of Sniffer Detection”, International Arab Journal of Information Technology, Vol. 9, No. 1, January ,pp-9.
[2]. Deepthi, Sivaraja, (2013). “Selfishness Aware Neighbor Coverage Based Probabilistic Rebroadcast Protocol for Manets”, International Journal of Computer Trends and Technology (IJCTT) ,ISSN:2231-2803, Vol.5, No.1,November ,pp-44.
[3]. Dipali Koshti, Supriya Kamoji, (2011). “Comparative Study of Techniques Used for Detection of Selfish Nodes in Mobile Ad Hoc Networks”, International Journal of Soft Computing and Engineering (IJSCE), ISSN:2231-2307, Vol.1,Issue-4, September ,pp-190.
[4]. Gaurav Soni, Kamlesh, Chandrawanshi, (2013) “A Novel Defense Scheme Against Selfish Node Attack in Manet”, International Journal on Computational Sciences & Applications (IJCSA), Vol.3, No.3, June ,pp-51
[5]. Pelechrinis, Yan, Eidenbenz, Krishnamurthy, (2009). “Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks” Proc. IEEE INFOCOM, .pp-11
[6]. Sagar, Rakesh, Sachin Patel, (2012). “A System For Manet To Detect Selfish Nodes Using NS2, “International Journal of Engineering Science and Innovative Tecchnology (IJESIT), ISSN: Vol.1, Issue.2, November ,pp-25.
[7]. Shailende, Nagpal , Charu Singla, (2011). “Impact of Selfish Node Concentration in Manets”, International Journal of Wireless & Mobile Networks (IJWMN), Vol. 3, No. 2, April ,pp-29
[8]. Utpal Paul, Anand Kashyap, Ritesh Maheshwariand, Samir Das, (2013). “Passive Measurement of Interference in Wi-Fi Networks with Application in Misbehavior Detection,” IEEE Transactions on Mobile Computing, Vol. 12, No. 3 March , pp-434.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.