(IJCSIS) International Journal of Computer Science and Information Security,Vol. 11, No.3, March 2013
fairness impact on the sample series, and investigate the propershuffle period that can maintain the randomness in each node’sback-off behavior while resolving the short-period fairness issues. Matthias Wilhelm et al.  take the role of awireless adversary and investigate one of its most powerfultools—radio frequency jamming. Mihui- Kim et al. focuses the threats to fair scheduling  in WMNs resultingfrom node misbehavior and provide a generic veri
cationframework to identify such a misbehavior.S. Chen et al.  proposes a modest, unusual andproficient verifying scheme to deal with untruthfulrecommendation. They model the false recommendationproblem as trials in reputation management court and present asimple, novel and effective scheme. E.G V. et al.  proposedthe implementation of a technique based load balancing on cellbreathing for mitigating the harmful effects of the jammer.IV.
CLASSIFICATIONNowadays, a lot of Internet applications are available, andwe have improved our working by utilizing the Internetresources using enhanced and adaptive  the Internetprotocols. Sometimes we have achieved high speed with lessSecurity and vice-versa, but this is the time when we canemphasize designing a protocol which must have thecapability of simultaneously resisting the effects of maliciousnodes on performance of channel, as well as enhancing thedynamic behavior of MAC protocol to improve channelutilization  in different load scenario. It is very important torecognize and discard that attacking node after identification.We have also provided the smaller contention window size of active nodes during under-load situation to improve channelutilization.
To access a channel a node randomly selects a valuebetween [0, CW] (Initially CW=CWmin) under normalconditions, every node within the network operates accordingto basic working of a Binary Exponential Back-off Algorithmfor CSMA/CA IEEE 802.11 WLAN, which doubles itscontention window value up to a CWmax after each collisionor unsuccessful transmission.
Access Point observes the common shared channel and willbroadcast a message to all the nodes based on largest RTScounts to adapt the opportunist mode if the channel utilization is found poor. AP senses the channel using the Fibonacciseries to save the resources. This mode transforms nodes to alower density zone; the consequences of those are fewercollisions and improved throughput on the network.C.
A node found to be a cheater in terms of any MACmisbehavior and violating the rules of CSMA/CA categorizedas suspicious node and puts into a suspicious mode. TheAccess point kept under the observation on these nodes byrunning ARA-MAC attack detection technique. Nodes undersuspicious modes follow basic BEB rules or opportunist moderules depending upon its channel situation and its history table.D.
Access point declared a node as an attacker, after finding anode shifting from suspicious mode to attacking mode, aftercrossing the maximum allowable threshold. Activity of anattacker as a self-centre node is the basic motivating factor of this research. An attacker, in an attacking mode made collisionsas well as it utilized unused slots when it works in egocentricor greedy mode.
This work initiates an in line research for Attack Resilience,Adaptive MediumAccess Control Protocol  for WLAN802.11.
A node can adjust its back-off time to CWmin or lessat all times.
A node may scramble frames sent by other nodes inorder to increase their CW .
A node may delay CTS and ACK, or rejects RTS andDATA, so the sender doubles its CW andconsequently, the malicious node  gets morechances to occupy the channel.
A node may increase its data transmission time byenhancing the Network Allocation Vector (NAV)value to prevent  other nodes from contendingduring this period.
A node may also transmit when it senses the channelidle before waiting DIFS time.
A node only transmits RTS and never transmits dataafter getting CTS.
A node pair consistently transmits RTS and CTS toeach other because they are forever free to send, thisbehavior degrades fairness .
Back-off manipulation (cheating with fixed Contentionvalue) 
DIFS value Reduction.
Single Attacker and colluding attackers
Inter Layer attacks
Choice of a short fixed value of a back-off counter.Here the node always waits or varies a short amount of time before accessing the idle wireless channel.