The Community for Technology Leaders
RSS Icon
Issue No.01 - Jan. (2014 vol.13)
pp: 146-158
Yu Cheng , Dept. of Electr. & Comput. Eng., Illinois Inst. of Technol., Chicago, IL, USA
Weihua Zhuang , Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada
The distributed nature of the CSMA/CA-based wireless protocols, for example, the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate their backoff parameters and, thus, unfairly gain a large share of the network throughput. In this paper, we first design a real-time backoff misbehavior detector, termed as the fair share detector (FS detector), which exploits the nonparametric cumulative sum (CUSUM) test to quickly find a selfish malicious node without any a priori knowledge of the statistics of the selfish misbehavior. While most of the existing schemes for selfish misbehavior detection depend on heuristic parameter configuration and experimental performance evaluation, we develop a Markov chain-based analytical model to systematically study the performance of the FS detector in real-time backoff misbehavior detection. Based on the analytical model, we can quantitatively compute the system configuration parameters for guaranteed performance in terms of average false positive rate, average detection delay, and missed detection ratio under a detection delay constraint. We present thorough simulation results to confirm the accuracy of our theoretical analysis as well as demonstrate the performance of the developed FS detector.
Detectors, IEEE 802.11 Standards, Markov processes, Protocols, Delay, Analytical models, Real-time systems,CUSUM test, Detectors, IEEE 802.11 Standards, Markov processes, Protocols, Delay, Analytical models, Real-time systems, Markov chain model, Selfish misbehavior, real-time detection, IEEE 802.11
Jin Tang, Yu Cheng, Weihua Zhuang, "Real-Time Misbehavior Detection in IEEE 802.11-Based Wireless Networks: An Analytical Approach", IEEE Transactions on Mobile Computing, vol.13, no. 1, pp. 146-158, Jan. 2014, doi:10.1109/TMC.2012.227
[1] G. Bianchi, "Performance Analysis of the IEEE 802.11 Distributed Coordination Function," IEEE J. Selected Areas in Comm., vol. 18, no. 3, pp. 535-547, Mar. 2000.
[2] "MAD Wifi," http:/, 2013.
[3] A. Toledo and X. Wang, "Robust Detection of Selfish Misbehavior in Wireless Networks," IEEE J. Selected Areas in Comm., vol. 25, no. 6, pp. 1124-1134, Aug. 2007.
[4] A. Toledo and X. Wang, "A Robust Kolmogorov-Smirnov Detector for Misbehavior in IEEE 802.11 DCF," Proc. IEEE Int'l Conf. Comm. (ICC), pp. 1564-1569, 2007.
[5] S. Radosavac, J.S. Baras, and I. Koutsopoulos, "A Framework for MAC Protocol Misbehavior Detection in Wireless Networks," Proc. ACM Workshop Wireless Security, pp. 33-42, 2005.
[6] S. Radosavac, G. Moustakides, J. Baras, and I. Koutsopoulos, "An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks," ACM Trans. Information and Systems Security, vol. 11, no. 4,article 19, July 2008.
[7] Y. Rong, S. Lee, and H. Choi, "Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis," Proc. IEEE INFOCOM, pp. 1-13, 2006.
[8] P. Kyasanur and N. Vaidya, "Detection and Handling of MAC Layer Misbehavior in Wireless Networks," Proc. IEEE Int'l Conf. Dependable Systems and Networks (DSN '03), pp. 173-182, 2003.
[9] P. Kyasanur and N. Vaidya, "Selfish MAC Layer Misbehavior in Wireless Networks," IEEE Trans. Mobile Computing, vol. 4, no. 5, pp. 502-516, Sept./Oct. 2005.
[10] P. Serrano, A. Banchs, V. Targon, and J. Kukielka, "Detecting Selfish Configurations in 802.11 WLANs," IEEE Comm. Letters, vol. 14, no. 2, pp. 142-144, Feb. 2010.
[11] S. Szott, M. Natkaniec, and R. Canonico, "Detecting Backoff Misbehaviour in IEEE 802.11 EDCA," European Trans. Telecomm., vol. 22, no. 1, pp. 31-34, Jan. 2011.
[12] B. Brodsky and B. Darkhovsky, Nonparametric Methods in Change-Point Problems. Kluwer Academic, 1993.
[13] C.E. Koksal, H. Kassab, and H. Balakrishnan, "An Analysis of Short-Term Fairness in Wireless Media Access Protocols," Proc. ACM Int'l Conf. Measurement Modeling Computer Systems (SIGMETRICS '00), 2000.
[14] M. Cagalj, S. Ganeriwal, I. Aad, and J. Hubaux, "On Cheating in CSMA/CA Ad Hoc Networks," Technical Report LCA-REPORT-2004-017, EPFL, 2004.
[15] J. Konorski, "Protection of Fairness for Multimedia Traffic Streams in a Non-Cooperative Wireless LAN Setting," Proc. Sixth Int'l Conf. Protocols Multimedia Systems (PROMS '01), 2001.
[16] J. Konorski, "Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations," Proc. Second Int'l IFIP-TC6 Networking Conf. Networking Technologies, Services, and Protocols; Performance of Computer and Comm. Networks; and Mobile and Wireless Comm. (NETWORKING), 2002.
[17] M. Raya, J. Hubaux, and I. Aad, "DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots," Proc. ACM MobiSys, 2004.
[18] M. Raya, I. Aad, J. Hubaux, and A.El Fawal, "DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots," IEEE Trans. Mobile Computing, vol. 5, no. 12, pp. 1691-1705, Dec. 2006.
[19] J. Tang, Y. Cheng, and W. Zhuang, "An Analytical Approach to Real-Time Misbehavior Detection in IEEE 802.11 Based Wireless Networks," Proc. IEEE INFOCOM, 2011.
[20] H.V. Poor and O. Hadjiliadis, Quickest Detection. first ed. Cambridge Univ., 2008.
[21] J.R. Morris, Markov Chains. Cambridge Univ., 1997.
[22] "The Network Simulator - ns-2,", 2013.
104 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool