Thwarting Back-off Rules Violation in Tactical Wireless Ad hoc Networks

Soufiene Djahel, Farid Naït-Abdesselam

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)


The CSMA/CA protocol is the most commonly used medium access mechanism in wireless networks. This protocol schedules properly the access to the medium among all the competing nodes. However, in a hostile environment, such as Mobile Ad Hoc Networks (MANETs), selfish or greedy nodes may prefer to decline the proper use of MAC protocol rules in order to increase their throughput at the expense of their honest neighbors. In this work, we propose a new backoff scheme that allows the neighbors of any node to detect its attempt to deliberately disobey the MAC protocol rules, by either fabricating a small backoff value or refusing to increase its contention window after an unsuccessful transmission. Our scheme uses one way function to generate the backoff values and modifies the TS frame format by piggybacking the DATA packet's CRC value and the transmission attempt. So any cheating attempt will be detected by the receiver node as well as the other neighbors of the cheater, as long as the monitoring conditions are held. Moreover, our scheme is robust against sender-receiver collusion and provides a novel reaction mechanism to punish the detected cheaters. The simulation results, in different topologies, have confirmed the efficiency of this scheme in terms of fairness index and detection rate. & copyright 2010 IEEE.

Original languageEnglish
Title of host publicationIEEE Symposium on Computers and Communications, ISCC 2010
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages6
ISBN (Electronic)9781424477555, 9781424477531
ISBN (Print)9781424477548
Publication statusPublished - 12 Aug 2010
Externally publishedYes
Event15th IEEE Symposium on Computers and Communications - Riccione, Italy
Duration: 22 Jun 201025 Jun 2010
Conference number: 15

Publication series

NameProceedings - IEEE Symposium on Computers and Communications
ISSN (Print)1530-1346


Conference15th IEEE Symposium on Computers and Communications
Abbreviated titleISCC 2010


Dive into the research topics of 'Thwarting Back-off Rules Violation in Tactical Wireless Ad hoc Networks'. Together they form a unique fingerprint.

Cite this