We found 1 data for "m2m"

LIST DATASET

NO. DATASET TITLE
1.
EVOLUTIONARY APPROACH TO ADDRESS THE NEGATIVE IMPACT OF SELFISH MAC BEHAVIOR ON RESOURCE AVAILABILITY IN M2M NETWORKS
DESCRIPTION : The emergence of sophisticated applications has created a demand of diverse Quality of Service (QoS) requirement. Depending on the type of services provided by the application, the main concern of the wireless communication can shift from reliable transmission to high throughput delivery, stringent delay or vice versa. To cater for such QoS requirement, communication protocol such as IEEE 802.11ah and user programmable network interface card are introduced. Responsible for 70 percent (70%) of the performance of a network, modifications are introduced in Media Access Control (MAC) Layer of the protocol to improve the performance. These changes allow MAC parameters to be adjusted as needed for their respective QoS requirement. However, the dynamic tuning ability has changed the facet of resource contention for the conventional MAC protocol. The ability of tuning the MAC parameters at will has violated the fair share policy of conventional MAC parameters, and can be abused to gain individual benefit over the loss of other connected terminals in the associated network. This creates a security threat of resource availability in the network when connected terminals are denied their access to the radio resources, which is a case of Denial-of-Service (DoS). When a terminal tunes its parameter to gain personal benefit, this behavior is regarded as selfish behavior while terminal which tuned the parameter according to the standard are consider as behaving honestly. As the severity of selfish behavior intensify, the degree of effect of DoS for honest terminal will increase. In this work, we will analyze the interaction between terminals of different behavior using Evolutionary Game Theory. Using the framework from evolutionary game, the dynamic decision making and the change of behavior will be studied. A mechanism to discourage selfish behavior will be introduced towards the end of result analysis as a measure to enforce security for MAC layer in the network.
CONTRIBUTOR : FAZIRULHISYAM BIN HASHIM (09/05/2023 13:17 PM)
FACULTY : FAKULTI KEJURUTERAAN
PUBLICATION : 1 ; FILE IN :
HAS VIEWS : 764 ; FOLDER IN PROJECT : 0 ; FILE IN PROJECT : 0 ; DOWNLOAD : 0 ;
KEYWORD : [M2M]