{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:30:02Z","timestamp":1754155802266,"version":"3.41.2"},"reference-count":35,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T00:00:00Z","timestamp":1688342400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJPCC"],"published-print":{"date-parts":[[2024,3,20]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p><jats:italic>Ad hoc<\/jats:italic> mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military. However, because they operate mostly in open spaces, they are exposed to a variety of dangers. The purpose of this study is to introduce a novel method for detecting the MAC layer misbehavior.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The proposed novel approach is based on exponential smoothing for throughput prediction to address this MAC layer misbehavior. The real and expected throughput are processed using an exponential smoothing algorithm to identify this attack, and if these metrics exhibit a trending pattern, an alarm is then sent.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The effect of the IEEE 802.11 MAC layer misbehavior on throughput was examined using the NS-2 network simulator, as well as the approval of our novel strategy. The authors have found that a smoothing factor value that is near to 0 provides a very accurate throughput forecast that takes into consideration the recent history of the updated values of the real value. As for the smoothing factor values that are near to 1, they are used to identify MAC layer misbehavior.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>According to the authors\u2019 modest knowledge, this new scheme has not been proposed in the state of the art for the detection of greedy behavior in mobile <jats:italic>ad hoc<\/jats:italic> networks.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ijpcc-08-2022-0303","type":"journal-article","created":{"date-parts":[[2023,6,30]],"date-time":"2023-06-30T02:21:02Z","timestamp":1688091662000},"page":"240-261","source":"Crossref","is-referenced-by-count":1,"title":["A new predictive approach for the MAC layer misbehavior in IEEE 802.11 networks"],"prefix":"10.1108","volume":"20","author":[{"given":"Mohammed-Alamine","family":"El Houssaini","sequence":"first","affiliation":[]},{"given":"Abdellah","family":"Nabou","sequence":"additional","affiliation":[]},{"given":"Abdelali","family":"Hadir","sequence":"additional","affiliation":[]},{"given":"Souad","family":"El Houssaini","sequence":"additional","affiliation":[]},{"given":"Jamal","family":"El Kafi","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2023,7,3]]},"reference":[{"issue":"1","key":"key2024112215424623600_ref001","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.aci.2015.11.001","article-title":"Real-time detection of MAC layer misbehavior in mobile ad hoc networks","volume":"13","year":"2017","journal-title":"Applied Computing and Informatics"},{"journal-title":"In Proceedings of IMA Conference on Game Theory and Its Applications","article-title":"A resilient MAC protocol for wireless networks","year":"2014","key":"key2024112215424623600_ref002"},{"first-page":"1","article-title":"Resilient misbehaviour detection MAC protocol (MD-MAC) for distributed wireless networks","year":"2016","key":"key2024112215424623600_ref003"},{"issue":"3","key":"key2024112215424623600_ref004","first-page":"1","article-title":"Culminate coverage for sensor network through Bodacious-Instance mechanism. i-manager\u2019s","volume":"8","year":"2019","journal-title":"Journal on Wireless Communication Networks"},{"issue":"3","key":"key2024112215424623600_ref005","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s42044-020-00075-x","article-title":"NRSM: node redeployment shrewd mechanism for wireless sensor network","volume":"4","year":"2021","journal-title":"Iran Journal of Computer Science"},{"key":"key2024112215424623600_ref006","first-page":"1","article-title":"Bodacious-Instance coverage mechanism for wireless sensor network","volume":"2020","year":"2020","journal-title":"Wireless Communications and Mobile Computing"},{"key":"key2024112215424623600_ref007","first-page":"1","article-title":"A survey of mobility models in wireless adhoc networks","volume-title":"Wireless Ad Hoc and Sensor Networks","year":"2004"},{"year":"2011","key":"key2024112215424623600_ref008","article-title":"LBL, USC\/ISI, and X. PARC, the ns manual (formerly ns notes and documentation)"},{"first-page":"15","volume-title":"Exponential Smoothing for Predicting Demand","year":"1956","key":"key2024112215424623600_ref009"},{"issue":"5","key":"key2024112215424623600_ref010","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1287\/opre.9.5.673","article-title":"The fundamental theorem of exponential smoothing","volume":"9","year":"1961","journal-title":"Operations Research"},{"volume-title":"Smoothing Forecasting and Prediction of Discrete Time Series","year":"1963","key":"key2024112215424623600_ref011"},{"key":"key2024112215424623600_ref012","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/1029102.1029107","article-title":"Detection and prevention of MAC layer misbehavior in Ad hoc networks","volume-title":"Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks","year":"2004"},{"issue":"2","key":"key2024112215424623600_ref013","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1109\/TNET.2008.926510","article-title":"Evaluation of detection algorithms for MAC layer misbehavior: theory and experiments","volume":"17","year":"2009","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"7","key":"key2024112215424623600_ref014","doi-asserted-by":"crossref","first-page":"41","DOI":"10.5120\/ijca2016910261","article-title":"Identifying and averting the MAC layer misbehavior in AD-HOC networks","volume":"143","year":"2016","journal-title":"International Journal of Computer Applications"},{"volume-title":"Communication Paradigms for Mobile Ad Hoc Networks","year":"2014","key":"key2024112215424623600_ref015"},{"key":"key2024112215424623600_ref016","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.procs.2016.04.099","article-title":"Multivariate control chart for the detection of MAC layer misbehavior in mobile ad hoc networks","volume":"83","year":"2016","journal-title":"Procedia Computer Science"},{"key":"key2024112215424623600_ref017","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.procs.2016.09.012","article-title":"A novel reaction scheme against the MAC layer misbehavior in mobile Ad hoc networks","volume":"98","year":"2016","journal-title":"Procedia Computer Science"},{"key":"key2024112215424623600_ref018","first-page":"38","article-title":"A game theoretic approach against the greedy behavior in MAC IEEE 802.11","volume-title":"Lecture Notes in Computer Science","year":"2017"},{"issue":"2","key":"key2024112215424623600_ref019","first-page":"18","article-title":"MAC layer\u2019s misbehavior handling in wireless network","volume":"1","year":"2010","journal-title":"J. Comput. Intell. Tech"},{"first-page":"4923","article-title":"Detecting greedy behaviors by linear regression in wireless ad hoc networks","year":"2009","key":"key2024112215424623600_ref020"},{"issue":"1","key":"key2024112215424623600_ref021","first-page":"175","article-title":"Detection of greedy nodes in wireless LAN through comparing of probability distributions of transmission intervals","volume":"8","year":"2013","journal-title":"Int. J. Multimed. Ubiquitous Eng"},{"volume-title":"IEEE Standard for Information Technology\u2013Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks\u2013Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications","year":"2012","author":"IEEE","key":"key2024112215424623600_ref022"},{"key":"key2024112215424623600_ref023","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1002\/sec.677","article-title":"Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game \u2013 theoretic approach","volume":"6","year":"2013","journal-title":"Secur. Commun. NETWORKS"},{"key":"key2024112215424623600_ref024","first-page":"38","article-title":"Application of a hash function to discourage MAC-layer misbehaviour in wireless LANs","volume":"2","year":"2004","journal-title":"J. Telecommun. END Inf. Technol"},{"first-page":"173","article-title":"Detection and handling of MAC layer misbehavior in wireless networks","year":"2003","key":"key2024112215424623600_ref025"},{"issue":"5","key":"key2024112215424623600_ref026","doi-asserted-by":"crossref","first-page":"502","DOI":"10.1109\/TMC.2005.71","article-title":"Selfish MAC layer misbehavior in wireless networks","volume":"4","year":"2005","journal-title":"IEEE Transactions on Mobile Computing"},{"first-page":"9","article-title":"Handling MAC layer misbehavior in wireless networks","year":"2002","key":"key2024112215424623600_ref027"},{"issue":"5","key":"key2024112215424623600_ref028","first-page":"1","article-title":"Diagnosing MAC misbehavior in mobile Ad hoc networks using statistical methods","volume":"12","year":"2012","journal-title":"Int. J. Comput. Sci. Netw. Secur"},{"key":"key2024112215424623600_ref029","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/1080793.1080801","article-title":"A framework for MAC protocol misbehavior detection in wireless networks","volume-title":"Proceedings of the 4th ACM workshop on Wireless security","year":"2005"},{"issue":"12","key":"key2024112215424623600_ref030","doi-asserted-by":"crossref","first-page":"1691","DOI":"10.1109\/TMC.2006.183","article-title":"DOMINO: detecting MAC layer greedy behavior in IEEE 802.11 hotspots","volume":"5","year":"2006","journal-title":"IEEE Transactions on Mobile Computing"},{"volume-title":"Detecting Mac Layer Misbehavior and Rate Adaptation in Ieee 802.11 Networks: Modeling and Sprt Algorithms","year":"2008","key":"key2024112215424623600_ref031"},{"first-page":"1","article-title":"Detecting stations cheating on backoff rules in 802.11 networks using sequential analysis","year":"2006","key":"key2024112215424623600_ref032"},{"first-page":"1624","article-title":"An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks","year":"2011","key":"key2024112215424623600_ref033"},{"issue":"21","key":"key2024112215424623600_ref034","first-page":"1","article-title":"Real-Time MAC-Layer selfish misbehavior detection and prevention technique for wireless networks","volume":"8","year":"2015","journal-title":"Indian J. Sci. Technol"},{"issue":"5","key":"key2024112215424623600_ref035","first-page":"1","article-title":"Detection of misbehaviour at mac layer in wireless networks","volume":"3","year":"2012","journal-title":"Int. J. Sci. Eng. Res"}],"container-title":["International Journal of Pervasive Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-08-2022-0303\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-08-2022-0303\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:05:45Z","timestamp":1753394745000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ijpcc\/article\/20\/2\/240-261\/1217841"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,3]]},"references-count":35,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,7,3]]},"published-print":{"date-parts":[[2024,3,20]]}},"alternative-id":["10.1108\/IJPCC-08-2022-0303"],"URL":"https:\/\/doi.org\/10.1108\/ijpcc-08-2022-0303","relation":{},"ISSN":["1742-7371","1742-7371"],"issn-type":[{"type":"print","value":"1742-7371"},{"type":"electronic","value":"1742-7371"}],"subject":[],"published":{"date-parts":[[2023,7,3]]}}}