Skip to main content
Erschienen in:
Buchtitelbild

2015 | OriginalPaper | Buchkapitel

1. Modeling and Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the advancement with flexible and configurable wireless adapters, it becomes feasible for a node to modify its low-layer (e.g. physical or MAC layer) parameters, which can substantially affect the network performance of a wireless network. Backoff misbehavior, in which a node deliberately manipulates its backoff time, can induce significant network problems, such as severe unfairness and denial-of-service. Although great progress has been made towards the design of countermeasures to backoff misbehavior, little attention has been focused on quantifying the gain of backoff misbehaviors. In this chapter, to assess the gain that misbehaving nodes can obtain, we introduce a new metric, namely order gain, to characterize the performance benefits of misbehaving nodes in comparison to legitimate nodes in CSMA/CA-based wireless networks. We derive the order gains of a variety of misbehaviors and further investigate the relation between our metric, order gain, and the throughput gain for a misbehaving node. We show that in IEEE 802.11 networks, the throughput ratio of a backoff misbehaving node to a legitimate node is either bounded above or proportional to the number of legitimate nodes. We use both simulations and experiments to validate our theoretical analysis and to further demonstrate the impact of a wide range of backoff misbehaviors on network performance in CSMA/CA-based wireless networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The length of an idle slot varies upon different standards. For example, the durations of an idle slot is 20 μs in IEEE 802.11b for direct sequence spread spectrum (DSSS), and is 9 μs in IEEE 802.11g for orthogonal frequency-division multiplexing (OFDM) with 20 MHz channel spacing.
 
2
The minimum contention window is the initial value of the contention window. For example, the minimum contention window is 32 in IEEE 802.11b for DSSS.
 
3
The order gain of waiting time will be simplified as order gain thereafter; unless specified otherwise.
 
4
Throughout this chapter, we define the collision probability of a node as the probability that there is at least one other node transmitting when the node sends a packet. We also assume that it always holds that a collision probability is in (0,1) for our analytical analysis.
 
5
We say function f(x) is of the same order as function g(x) and write \(f(x) =\varTheta (g(x))\) if and only if there exist two positive real numbers c 1 and c 2 and a real number x 0 such that c 1 |g(x)|≤|f(x)|≤ c 2 |g(x)| for all x > x 0.
 
Literatur
1.
Zurück zum Zitat Bianchi G (2000) Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J Sel Areas Commun 18(3):535–547CrossRef Bianchi G (2000) Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J Sel Areas Commun 18(3):535–547CrossRef
2.
Zurück zum Zitat Bianchi G, Stefano AD, Giaconia C, Scalia L, Terrazzino G, Tinnirello I (2007) Experimental assessment of the backoff behavior of commercial IEEE 802.11b network cards. In: Proceedings of IEEE INFOCOM’07, pp 1181–1189 Bianchi G, Stefano AD, Giaconia C, Scalia L, Terrazzino G, Tinnirello I (2007) Experimental assessment of the backoff behavior of commercial IEEE 802.11b network cards. In: Proceedings of IEEE INFOCOM’07, pp 1181–1189
3.
Zurück zum Zitat Cagalj M, Ganeriwal S, Aad I, Hubaux JP (2005) On selfish behavior in CSMA/CA networks. In: Proceedings of IEEE INFOCOM’05, vol 4, pp 2513–2524 Cagalj M, Ganeriwal S, Aad I, Hubaux JP (2005) On selfish behavior in CSMA/CA networks. In: Proceedings of IEEE INFOCOM’05, vol 4, pp 2513–2524
4.
Zurück zum Zitat Cali F, Conti M, Gregori E (2000) Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit. IEEE/ACM Trans Netw 8(6):785–799CrossRef Cali F, Conti M, Gregori E (2000) Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit. IEEE/ACM Trans Netw 8(6):785–799CrossRef
5.
Zurück zum Zitat Cardenas AA, Radosavac S, Baras JS (2007) Performance comparison of detection schemes for MAC layer misbehavior. In: Proceedings of IEEE INFOCOM’07, pp 1496–1504 Cardenas AA, Radosavac S, Baras JS (2007) Performance comparison of detection schemes for MAC layer misbehavior. In: Proceedings of IEEE INFOCOM’07, pp 1496–1504
6.
Zurück zum Zitat Choi S, Park K, Kim CK (2005) On the performance characteristics of WLANs: revisited. In: Proceedings of ACM SIGMETRICS ’05, pp 97–108 Choi S, Park K, Kim CK (2005) On the performance characteristics of WLANs: revisited. In: Proceedings of ACM SIGMETRICS ’05, pp 97–108
7.
Zurück zum Zitat Guang L, Assi C, Benslimane A (2008) Enhancing IEEE 802.11 random backoff in selfish environments. IEEE Trans Veh Technol 57(3):1806–1822CrossRef Guang L, Assi C, Benslimane A (2008) Enhancing IEEE 802.11 random backoff in selfish environments. IEEE Trans Veh Technol 57(3):1806–1822CrossRef
8.
Zurück zum Zitat Guang L, Assi C, Benslimane A (2008) MAC layer misbehavior in wireless networks: challenges and solutions. IEEE Wirel Commun 15(4):6–14CrossRef Guang L, Assi C, Benslimane A (2008) MAC layer misbehavior in wireless networks: challenges and solutions. IEEE Wirel Commun 15(4):6–14CrossRef
9.
Zurück zum Zitat Hui J, Devetsikiotis M (2005) A unified model for the performance analysis of IEEE 802.11e EDCA. IEEE Trans Commun 53(9):1498–1510CrossRef Hui J, Devetsikiotis M (2005) A unified model for the performance analysis of IEEE 802.11e EDCA. IEEE Trans Commun 53(9):1498–1510CrossRef
11.
Zurück zum Zitat Konorski J (2006) A game-theoretic study of CSMA/CA under a backoff attack. IEEE/ACM Trans Netw 14(6):1167–1178CrossRef Konorski J (2006) A game-theoretic study of CSMA/CA under a backoff attack. IEEE/ACM Trans Netw 14(6):1167–1178CrossRef
12.
Zurück zum Zitat Kyasanur P, Vaidya NH (2003) Detection and handling of MAC layer misbehavior in wireless networks. In: Proceedings of IEEE DSN’03, pp 173–182 Kyasanur P, Vaidya NH (2003) Detection and handling of MAC layer misbehavior in wireless networks. In: Proceedings of IEEE DSN’03, pp 173–182
14.
Zurück zum Zitat Malone D, Duffy K, Leith D (2007) Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions. IEEE/ACM Trans Netw 15:159–172CrossRef Malone D, Duffy K, Leith D (2007) Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions. IEEE/ACM Trans Netw 15:159–172CrossRef
15.
Zurück zum Zitat Radosavac S, Baras JS, Koutsopoulos I (2008) An analytic framework for modeling and detecting access layer misbehavior in wireless networks. ACM Trans Inf Syst Secur 11(4):19:1–19:28 Radosavac S, Baras JS, Koutsopoulos I (2008) An analytic framework for modeling and detecting access layer misbehavior in wireless networks. ACM Trans Inf Syst Secur 11(4):19:1–19:28
16.
Zurück zum Zitat Ramaiyan V, Kumar A, Altman E (2005) Fixed point analysis of single cell IEEE 802.11e WLANs: uniqueness, multistability and throughput differentiation. In: Proceedings of ACM SIGMETRICS ’05, pp 109–120 Ramaiyan V, Kumar A, Altman E (2005) Fixed point analysis of single cell IEEE 802.11e WLANs: uniqueness, multistability and throughput differentiation. In: Proceedings of ACM SIGMETRICS ’05, pp 109–120
17.
Zurück zum Zitat Raya M, Aad I, Hubaux J, Fawal AE (2006) DOMINO: detecting MAC layer greedy behavior in IEEE 802.11 hotspots. IEEE Trans Mob Comput 5(12):1691–1705CrossRef Raya M, Aad I, Hubaux J, Fawal AE (2006) DOMINO: detecting MAC layer greedy behavior in IEEE 802.11 hotspots. IEEE Trans Mob Comput 5(12):1691–1705CrossRef
18.
Zurück zum Zitat Rong Y, Lee SK, Choi HA (2005) Detecting stations cheating on backoff rules in 802.11 networks using sequential analysis. In: Proceedings of IEEE INFOCOM’06 Rong Y, Lee SK, Choi HA (2005) Detecting stations cheating on backoff rules in 802.11 networks using sequential analysis. In: Proceedings of IEEE INFOCOM’06
19.
Zurück zum Zitat Sakurai T, Vu HL (2007) MAC access delay of IEEE 802.11 DCF. IEEE Trans Wireless Commun 6(5):1702–1710CrossRef Sakurai T, Vu HL (2007) MAC access delay of IEEE 802.11 DCF. IEEE Trans Wireless Commun 6(5):1702–1710CrossRef
20.
Zurück zum Zitat Szott S, Natkaniec M, Canonico R, Pach AR (2008) Impact of contention window cheating on single-hop IEEE 802.11e MANETs. In: Proceedings of IEEE WCNC’08, pp 1356–1361 Szott S, Natkaniec M, Canonico R, Pach AR (2008) Impact of contention window cheating on single-hop IEEE 802.11e MANETs. In: Proceedings of IEEE WCNC’08, pp 1356–1361
21.
Zurück zum Zitat Toledo AL, Wang X (2007) Robust detection of selfish misbehavior in wireless networks. IEEE J Sel Areas Commun 25(6):1124–1134CrossRef Toledo AL, Wang X (2007) Robust detection of selfish misbehavior in wireless networks. IEEE J Sel Areas Commun 25(6):1124–1134CrossRef
22.
Zurück zum Zitat Ziouva E, Antonakopoulos T (2002) CSMA/CA performance under high traffic conditions: throughput and delay analysis. Comput Commun 25:313–321CrossRef Ziouva E, Antonakopoulos T (2002) CSMA/CA performance under high traffic conditions: throughput and delay analysis. Comput Commun 25:313–321CrossRef
Metadaten
Titel
Modeling and Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks
verfasst von
Zhuo Lu
Wenye Wang
Cliff Wang
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-23288-1_1