Download now Free registration required
The authors have design an attack scenario in which they have declared some nodes as suspicious nodes by their unfair behavior. They may disobey basic rules of Media Access Control protocols while working as a suspicious node by its behavior in 802.11 x WLAN scenarios. Some Throughputs may increase because of suspicious nodes working as a malicious/attacker nodes and the outcome may be increases packet drops due to collision in the channel. It has also seen that some throughput increases due to improved channel utilization due to suspicious nodes working as opportunist nodes. Opportunist nodes introduced also disobey the rules of MAC protocols but it try to improve channel utilization.
- Format: PDF
- Size: 337.5 KB