Article ID Journal Published Year Pages File Type
485339 Procedia Computer Science 2016 8 Pages PDF
Abstract
In this paper, we suggest a novel detection scheme of such attack using a multivariate control chart currently exist in industrial management with a large success. Our proposed strategy comes to replace the univariate Shewhart control chart which already exists in the literature research for the detection of greedy nodes, because it reduces the number of control chart. As we will prove by NS-2 simulations, the proposed mechanism doesn't require any modification to the 802.11 standard, it works in real time and very easy in implementation though it appears somewhat complicated because of the computation of the mean and the covariance matrix in the absence of the MAC layer misbehavior attack.
Related Topics
Physical Sciences and Engineering Computer Science Computer Science (General)
Authors
, , , ,