This Article 
 Bibliographic References 
 Add to: 
Selfish MAC Layer Misbehavior in Wireless Networks
September/October 2005 (vol. 4 no. 5)
pp. 502-516
Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel. In this environment, selfish hosts that fail to adhere to the MAC protocol may obtain an unfair throughput share. For example, IEEE 802.11 requires hosts competing for access to the channel to wait for a "backoff” interval, randomly selected from a specified range, before initiating a transmission. Selfish hosts may wait for smaller backoff intervals than well-behaved hosts, thereby obtaining an unfair advantage. We present modifications to the IEEE 802.11 protocol to simplify detection of such selfish hosts and analyze the optimality of the chosen strategy. We also present a penalty scheme for punishing selfish misbehavior. We develop two misbehavior models to capture the behavior of misbehaving hosts. Simulation results under these misbehavior models indicate that our detection and penalty schemes are successful in handling MAC layer misbehavior.

[1] Draft Standard for Local and Metropolitan Area Networks— Port-Based Network Access Control, P802.1X, 2004.
[2] V. Bhargavan, A. Demers, S. Shenker, and L. Zhang, “Macaw: A Media Access Protocol for Wireless Lans,” Proc. ACM SigComm, Sept. 1994.
[3] S. Buchegger and J. Le Boudec, “Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks,” Proc. 10th Euromicro Workshop Parallel, Distributed and Network-Based Processing, pp. 403-410, Jan. 2002.
[4] S. Buchegger and J. Le Boudec, “Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes— Fairness In Dynamic Ad-Hoc NeTworks,” Proc. IEEE/ACM Symp. Mobile Ad Hoc Networking and Computing, June 2002.
[5] D.J. Burroughs, L.F. Wilson, and G.V. Cybenko, “Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods,” Proc. IEEE Int'l Performance Computing and Comm. Conf., Apr. 2002.
[6] “Report on a Working Session on Security in Wireless Ad Hoc Networks,” Mobile Computing and Comm. Rev., L. Buttyan and J. H, eds., vol. 6, no. 4, Nov. 2002.
[7] L. Buttyan and J. Hubaux, “Enforcing Service Availability in Mobile Ad-Hoc WANs,” Proc. IEEE/ACM Workshop Mobile Ad Hoc Networking and Computing, Aug. 2000.
[8] L. Buttyan and J. Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,” Technical Report DSC/2001/046, EPFL-DI-ICA, Aug. 2001.
[9] D. Ely, N. Spring, D. Wetherall, S. Savage, and T. Anderson, “Robust Congestion Signaling,” Proc. 2001 Int'l Conf. Network Protocols, Nov. 2001.
[10] K. Fall and K. Varadhan, “Ns Notes and Documentation,” technical report, Univ. of California at Berkley, LBL, USC/ISI, Xerox PARC, 2002.
[11] K. Goseva-Popstojanova, F. Wang, R. Wang, F. Gong, K. Vaidyanathan, K. Trivedi, and B. Muthusamy, “Characterizing Intrusion Tolerant Systems Using a State Transition Model,” Proc. DARPA Information Survivability Conf. and Exposition II, 2001.
[12] J. Hubaux, L. Buttyan, and S. Capkun, “The Quest for Security in Mobile Ad Hoc Networks,” Proc. ACM Symp. Mobile Ad Hoc Networking and Computing, Oct. 2001.
[13] IEEE Standard for Wireless LAN-Medium Access Control and Physical Layer Specification, P802.11, 1999.
[14] R. Jain, G. Babic, B. Nagendra, and C. Lam, “Fairness, Call Establishment Latency and Other Performance Metrics,” Technical Report ATM_Forum/96-1173, ATM Forum Document, Aug. 1996.
[15] P. Karn, “MACA— A New Channel Access Method for Packet Radio,” Proc. Ninth Ann. ARRL Networking Conf., 1990.
[16] D.E. Knuth, The Art of Computer Programming, third ed., vol. 2, chapter 3, pp. 10-17. Addison-Wesley, 2000.
[17] J. Konorski, “Protection of Fairness for Multimedia Traffic Streams in a Non-Cooperative Wireless LAN Setting,” Proc. Sixth Int'l Conf. Protocols for Multimedis Systems (PROMS), 2001.
[18] J. Konorski, “Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations,” Proc. Networking Conf., 2002.
[19] P. Kyasanur, “Selfish Misbehavior at Medium Access Control Layer in Wireless Networks,” master's thesis, Univ. of Illinois at Urbana-Champaign, Dec. 2003.
[20] P. Kyasanur and N.H. Vaidya, “Detection and Handling of MAC Layer Misbehavior in Wireless Networks,” Proc. 2003 Int'l Conf. Dependable Systems and Networks, pp. 173-182, 2003.
[21] A.B. MacKenzie and S.B. Wicker, “Game Theory and the Design of Self-Configuring, Adaptive Wireless Networks,” IEEE Comm. Magazine, vol. 39, no. 11, pp. 126-131, 2000.
[22] A.B. MacKenzie and S.B. Wicker, “Stability of Multipacket Slotted Aloha with Selfish Users and Perfect Information,” Proc. Infocom, 2003.
[23] S. Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. Mobile Computing and Networking Conf., pp. 255-265, 2000.
[24] P. Michiardi and R. Molva, “Game Theoretic Analysis of Security in Mobile Ad Hoc Networks,” Technical Report RR-02-070, Institut Eurecom, Apr. 2002.
[25] N. Nisan and A. Ronen, “Algorithmic Mechanism Design,” Proc. ACM Symp. Theory of Computing, pp. 129-140, 1999.
[26] V. Poor, An Introduction to Signal Detection and Estimation, second ed., vol. 1, chapter 2, pp. 22-29. Springer-Verlag, 1994.
[27] R. Rozovsky and P.R. Kumar, “SEEDEX: A MAC Protocol for Ad Hoc Networks,” Proc. ACM Symp. Mobile Ad Hoc Networking and Computing, pp. 67-75, Oct. 2001.
[28] W.H. Sanders, M. Cukier, F. Webber, P. Pal, and R. Watro, “Probabilistic Validation of Intrusion Tolerance,” Digest of Fast Abstracts: The Int'l Conf. Dependable Systems and Networks, June 2002.
[29] S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, “TCP Congestion Control with a Misbehaving Receiver,” ACM Computer Comm. Rev., pp. 71-78, Oct. 1999.
[30] F. Stajano and R. Anderson, “The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks,” Proc. Security Protocols, Seventh Int'l Workshop, pp. 172-194, Apr. 1999.
[31] Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad-Hoc Networks,” Proc. Mobile Computing and Networking, pp. 275-283, 2000.
[32] M. Raya, J.-P. Hubaux, and I. Aad, “DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots,” Proc. ACM Int'l Conf. Mobile Systems, Applications, and Services (MobiSys), 2004.

Index Terms:
Index Terms- Wireless communication, network monitoring, public networks, network-level security and protection.
Pradeep Kyasanur, Nitin H. Vaidya, "Selfish MAC Layer Misbehavior in Wireless Networks," IEEE Transactions on Mobile Computing, vol. 4, no. 5, pp. 502-516, Sept.-Oct. 2005, doi:10.1109/TMC.2005.71
Usage of this product signifies your acceptance of the Terms of Use.