MAC Layer Misbehavior Detection Using Time Series Analysis

Maggie X. Cheng, Yi Ling, Wei Biao Wu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations


This paper presents a solution to the real-time detection of MAC layer misbehaviors in IEEE 802.11 networks. Among the wide range of misbehaviors, we focus on the sender side selfish behavior that creates a channel- capturing effect by using favorable parameters, and the receiver side selfish behavior that does not respond with CTS and ACK upon receiving RTS and data packets, which clears the channel for itself and causes its sender to waste resources. These misbehaviors are subtle to detect, and yet can undermine the performance of the well-behaved nodes significantly. This paper shows a powerful real-time detection method that can catch these misbehaviors as soon as they have started. The detection method requires collecting delay, throughput, and packet interval data to generate time series and applying a sequential change point detection algorithm on the data streams as soon as new data points come in. All attacks are simulated in ns-3 and the simulation results verified the effectiveness of the detection method.

Original languageEnglish (US)
Title of host publication2018 IEEE International Conference on Communications, ICC 2018 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9781538631805
StatePublished - Jul 27 2018
Event2018 IEEE International Conference on Communications, ICC 2018 - Kansas City, United States
Duration: May 20 2018May 24 2018

Publication series

NameIEEE International Conference on Communications
ISSN (Print)1550-3607


Other2018 IEEE International Conference on Communications, ICC 2018
Country/TerritoryUnited States
CityKansas City

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering


Dive into the research topics of 'MAC Layer Misbehavior Detection Using Time Series Analysis'. Together they form a unique fingerprint.

Cite this