Please use this identifier to cite or link to this item: http://localhost:8081/xmlui/handle/123456789/12426
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMuskan, Vivek-
dc.date.accessioned2014-12-01T05:53:55Z-
dc.date.available2014-12-01T05:53:55Z-
dc.date.issued2011-
dc.identifierM.Techen_US
dc.identifier.urihttp://hdl.handle.net/123456789/12426-
dc.guideSarje, A. K.-
dc.description.abstractThe IEEE 802.11 CSMA/CA protocol is most commonly used MAC protocol for wireless network. This protocol is used to access the media. But IEEE 802.11 works properly only if all the stations obey the MAC protocol. In public area wireless networks, it is possible that the participating hosts may deviate from the specified MAC protocol. Selfish hosts that do not obey to the MAC protocol may obtain an unfair media share. For example, IEEE 802.11 requires hosts competing for access to the channel to wait for a backoff interval, randomly selected from a specified range, before initiating a transmission. Selfish hosts may wait for smaller backoff intervals than well-behaved hosts. By this way some node can substantially increase his share of bandwidth by slightly changing the parameters of MAC protocol, in order to increase their throughput. This cause throughput degradation of all well behaved node. In this dissertation, we proposed the detection scheme for selfish misbehavior at MAC layer in wireless networks based on comparative study of Throughput, RTS retransmission rate and packet retransmission rate of nodes under well behaved and selfish attack.en_US
dc.language.isoenen_US
dc.subjectELECTRONICS AND COMPUTER ENGINEERINGen_US
dc.subjectMISBEHAVIORen_US
dc.subjectMAC LAYERen_US
dc.subjectWIRELESS NETWORKen_US
dc.titleDETECTION OF SELFISH MISBEHAVIOR AT MAC LAYER IN WIRELESS NETWORKen_US
dc.typeM.Tech Dessertationen_US
dc.accession.numberG20998en_US
Appears in Collections:MASTERS' THESES (E & C)

Files in This Item:
File Description SizeFormat 
ECDG20998.pdf1.76 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.