Show simple item record

dc.contributor.authorAlocious, Chaminda
dc.contributor.authorXiao, Hannan
dc.contributor.authorChristianson, Bruce
dc.contributor.authorSpring, William Joseph
dc.date.accessioned2025-01-20T15:15:01Z
dc.date.available2025-01-20T15:15:01Z
dc.date.issued2025-01-09
dc.identifier.citationAlocious , C , Xiao , H , Christianson , B & Spring , W J 2025 , ' Embedding Trust in the Media Access Control Protocol for Wireless Networks ' , Sensors , vol. 25 , no. 2 , 354 , pp. 1-30 . < http://10.3390/s25020354 >
dc.identifier.issn1424-8220
dc.identifier.urihttp://hdl.handle.net/2299/28721
dc.description© 2025 The Author(s). Licensee MDPI, Basel, Switzerland. This is an open access article distributed under the Creative Commons Attribution License (CC BY), https://creativecommons.org/licenses/by/4.0/
dc.description.abstractIEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. The carrier sense multiple access with collision avoidance (CSMA/CA) mechanisms in 802.11 have been designed under the assumption that all nodes in the network are cooperative and trustworthy. However, the potential for non-cooperative nodes exists, nodes that may purposefully misbehave in order to, for example, obtain extra bandwidth, conserve their resources, or disrupt network performance. This issue is further compounded when receivers such as Wi-Fi hotspots, normally trusted by other module nodes, also misbehave. Such issues, their detection, and mitigation have, we believe, not been sufficiently addressed in the literature. This research proposes a novel trust-incorporated MAC protocol (TMAC) which detects and mitigates complex node misbehavior for distributed network environments. TMAC introduces three main features into the original IEEE 802.11 protocol. First, each node assesses a trust level for their neighbors, establishing a verifiable backoff value generation mechanism with an incorporated trust model involving senders, receivers, and common neighbors. Second, TMAC uses a collaborative penalty scheme to penalize nodes that deviate from the IEEE 802.11 protocol. This feature removes the assumption of a trusted receiver. Third, a TMAC diagnosis mechanism is carried out for each distributed node periodically, to reassess neighbor status and to reclassify each based on their trust value. Simulation results in ns2 showed that TMAC is effective in diagnosing and starving selfish or misbehaving nodes in distributed wireless networks, improving the performance of trustworthy well-behaving nodes. The significant feature of TMAC is its ability to detect sender, receiver, and colluding node misbehavior at the MAC layer with a high level of accuracy, without the need to trust any of the communicating parties.en
dc.format.extent30
dc.format.extent2326862
dc.language.isoeng
dc.relation.ispartofSensors
dc.subjectIEEE 802.11
dc.subjectCSMA/CA
dc.subjectwireless networks
dc.subjectnetwork security
dc.subjectMAC
dc.subjecttrust
dc.titleEmbedding Trust in the Media Access Control Protocol for Wireless Networksen
dc.contributor.institutionSchool of Physics, Engineering & Computer Science
dc.contributor.institutionCentre for AI and Robotics Research
dc.contributor.institutionCybersecurity and Computing Systems
dc.contributor.institutionCentre for Future Societies Research
dc.contributor.institutionDepartment of Computer Science
dc.description.statusPeer reviewed
dc.identifier.urlhttp://10.3390/s25020354
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record