The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.08 - Aug. (2012 vol.11)
pp: 1331-1344
Cliff Wang , U.S. Army Research Laboratory, Research Triangle Park
ABSTRACT
Backoff misbehavior, in which a wireless node deliberately manipulates its backoff time, can induce significant network problems, such as severe unfairness and denial of service. Although great progress has been made toward the design of countermeasures to backoff misbehavior, little attention has been focused on quantifying the gain of backoff misbehaviors. In this paper, to assess the gain that misbehaving nodes can obtain, we define and study two general classes of backoff misbehavior: continuous misbehavior, which keeps manipulating the backoff time unless it is disabled by countermeasures, and intermittent misbehavior, which tends to evade the detection of countermeasures by performing misbehavior sporadically. Our approach is to introduce a new performance metric, namely order gain, to characterize the performance benefits of misbehaving nodes in comparison to legitimate nodes in CSMA/CA-based wireless networks. We derive the order gains of both continuous and intermittent misbehaviors and further investigate the relation between our metric, order gain, and the throughput gain for a misbehaving node. We show that in IEEE 802.11 networks, the throughput ratio of a backoff misbehaving node to a legitimate node is either bounded above or proportional to the number of legitimate nodes. We use both simulations and experiments to validate our theoretical analysis and to further demonstrate the impact of a wide range of backoff misbehaviors on network performance in CSMA/CA-based wireless networks.
INDEX TERMS
Multiaccess communication, Wireless networks, IEEE 802.11 Standards, Throughput, Distribution functions, Protocols, wireless networks., CSMA/CA, random backoff, misbehaving nodes, performance gain
CITATION
Cliff Wang, "Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks", IEEE Transactions on Mobile Computing, vol.11, no. 8, pp. 1331-1344, Aug. 2012, doi:10.1109/TMC.2011.164
REFERENCES
[1] P. Kyasanur and N.H. Vaidya, "Detection and Handling of MAC Layer Misbehavior in Wireless Networks," Proc. IEEE Int'l Conf. Dependable Systems and Networks (DSN '03), pp. 173-182, June 2003.
[2] S. Szott, M. Natkaniec, R. Canonico, and A.R. Pach, "Impact of Contention Window Cheating on Single-Hop IEEE 802.11e MANETs," Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '08), pp. 1356-1361, Apr. 2008.
[3] L. Guang, C. Assi, and A. Benslimane, "MAC Layer Misbehavior in Wireless Networks: Challenges and Solutions," IEEE Wireless Comm., vol. 15, no. 4, pp. 6-14, Aug. 2008.
[4] Y. Rong, S.-K. Lee, and H.-A. Choi, "Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis," Proc. IEEE INFOCOM, Apr. 2005.
[5] M. Raya, I. Aad, J. Hubaux, and A.E. Fawal, "DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots," IEEE Trans. Mobile Computing, vol. 5, no. 12, pp. 1691-1705, Dec. 2006.
[6] A.A. Cardenas, S. Radosavac, and J.S. Baras, "Performance Comparison of Detection Schemes for MAC Layer Misbehavior," Proc. IEEE INFOCOM, pp. 1496-1504, Apr. 2007.
[7] M. Cagalj, S. Ganeriwal, I. Aad, and J.-P. Hubaux, "On Selfish Behavior in CSMA/CA Networks," Proc. IEEE INFOCOM, vol. 4, pp. 2513-2524, Mar. 2005.
[8] J. Konorski, "A Game-Theoretic Study of CSMA/CA Under a Backoff Attack," IEEE/ACM Trans. Networking, vol. 14, no. 6, pp. 1167-1178, Dec. 2006.
[9] S. Radosavac, J.S. Baras, and I. Koutsopoulos, "An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks," ACM Trans. Information and Systems Security, vol. 11, no. 4, pp. 19:1-19:28, July 2008.
[10] S. Choi, K. Park, and C. kwon Kim, "On the Performance Characteristics of WLANs: Revisited," Proc. ACM SIGMETRICS Int'l Conf. Measurement and Modeling of Computer Systems (SIGMETRICS '05), pp. 97-108, 2005.
[11] G. Bianchi, A.D. Stefano, C. Giaconia, L. Scalia, G. Terrazzino, and I. Tinnirello, "Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards," Proc. IEEE INFOCOM, pp. 1181-1189, May 2007.
[12] L. Guang, C. Assi, and A. Benslimane, "Enhancing IEEE 802.11 Random Backoff in Selfish Environments," IEEE Trans. Vehicular Technology, vol. 57, no. 3, pp. 1806-1822, May 2008.
[13] W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. ACM MobiHoc, pp. 46-57, 2005.
[14] E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa, "On the Performance of IEEE 802.11 under Jamming," Proc. IEEE INFOCOM, pp. 1265-1273, Apr. 2008.
[15] G. Bianchi, "Performance Analysis of the IEEE 802.11 Distributed Coordination Function," IEEE J. Selected Areas in Comm., vol. 18, no. 3, pp. 535-547, Mar. 2000.
[16] E. Ziouva and T. Antonakopoulos, "CSMA/CA Performance under High Traffic Conditions: Throughput and Delay Analysis," Computer Comm., vol. 25, pp. 313-321, 2002.
[17] Z. Lu, W. Wang, and C. Wang, "On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-Based Wireless Networks," Proc. IEEE INFOCOM, Mar. 2010.
[18] V. Ramaiyan, A. Kumar, and E. Altman, "Fixed Point Analysis of Single Cell IEEE 802.11e WLANs: Uniqueness, Multistability and Throughput Differentiation," Proc. ACM SIGMETRICS Int'l Conf. Measurement and Modeling of Computer Systems (SIGMETRICS '05), pp. 109-120, 2005.
[19] F. Cali, M. Conti, and E. Gregori, "Dynamic Tuning of the IEEE 802.11 Protocol to Achieve a Theoretical Throughput Limit," IEEE/ACM Trans. Networking, vol. 8, no. 6, pp. 785-799, Dec. 2000.
[20] J. Hui and M. Devetsikiotis, "A Unified Model for the Performance Analysis of IEEE 802.11e EDCA," IEEE Trans. Comm., vol. 53, no. 9, pp. 1498-1510, Sept. 2005.
[21] D. Malone, K. Duffy, and D. Leith, "Modeling the 802.11 Distributed Coordination Function in Nonsaturated Heterogeneous Conditions," IEEE/ACM Trans. Networking, vol. 15, no. 1, pp. 159-172, Feb. 2007.
[22] T. Sakurai and H.L. Vu, "MAC Access Delay of IEEE 802.11 DCF," IEEE Trans. Wireless Comm., vol. 6, no. 5, pp. 1702-1710, May 2007.
[23] A.L. Toledo and X. Wang, "Robust Detection of Selfish Misbehavior in Wireless Networks," IEEE J. Selected Areas in Comm., vol. 25, no. 6, pp. 1124-1134, Aug. 2007.
[24] Madwifi, http:/madwifi.org, 2012.
[25] Iperf, http://sourceforge.net/projectsiperf, 2012.
12 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool