Journal of Telecommunications and Information Technology (Jun 2004)

Application of a hash function to discourage MAC-layer misbehaviour in wireless LANs

  • Jerzy Konorski,
  • Maciej Kurant

DOI
https://doi.org/10.26636/jtit.2004.2.242
Journal volume & issue
no. 2

Abstract

Read online

Contention-based MAC protocols for wireless ad hoc LANs rely on random deferment of packet transmissions to avoid collisions. By selfishly modifying the probabilities of deferments greedy stations can grab more bandwidth than regular stations that apply standard-prescribed probabilities. To discourage such misbehaviour we propose a protocol called RT-hash whereby the winner of a contention is determined using a public hash function of the channel feedback. RT-hash is effective in a full hearability topology, assuming that improper timing of control frames is detectable and that greedy stations do not resort to malicious actions. Simulation experiments show that RT-hash protects regular stations` bandwidth share against various sophisticated greedy strategies of deferment selection; as such it may contribute to MAC-layer network security.

Keywords