Characterizing the greedy behavior in wireless ad hoc networks

While the problem of greedy behavior at the MAC layer has been widely explored in the context of wireless local area networks (WLAN), its study for multi-hop wireless networks still almost an unexplored and unexplained problem. Indeed, in a wireless local area network, an access point mostly forwards packets sent by wireless nodes over the wired link. In this case, a greedy node can easily get more bandwidth share and starve all other associated contending nodes by manipulating intelligently MAC layer parameters. However, in wireless ad hoc environment, all packets are transmitted in a multi-hop fashion over wireless links. In this case, an attempting greedy node, if it behaves similarly as in a WLAN, trying to starve all its neighbors, then its next hop forwarder will be also prevented from forwarding its own traffic, which leads obviously to an end to end throughput collapse. In this paper, we show that in order to have a more beneficial greedy behavior in wireless ad hoc network, a node must adopt a different approach than in WLAN to achieve a better performance of its own flows. Then, we present a new strategy to launch such a greedy attack in a proactive routing based wireless ad hoc network. A detailed description of the proposed strategy is provided along with its validation through extensive simulations. The obtained results show that a greedy node, applying the defined strategy, can gain more bandwidth than its neighbors and keep the end-to-end throughput of its own flows highly reasonable. Copyright © 2010 John Wiley & Sons, Ltd.

[1]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[2]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[3]  Lili Qiu,et al.  Impact of Interference on Multi-Hop Wireless Network Performance , 2003, MobiCom '03.

[4]  Soufiene Djahel,et al.  A Fuzzy Logic Based Scheme to Detect Adaptive Cheaters in Wireless LAN , 2009, 2009 IEEE International Conference on Communications.

[5]  Mario Gerla,et al.  Effectiveness of RTS/CTS handshake in IEEE 802.11 based ad hoc networks , 2003, Ad Hoc Networks.

[6]  John S. Baras,et al.  Detection and prevention of MAC layer misbehavior in ad hoc networks , 2004, SASN '04.

[7]  Gregory A. Hansen,et al.  The Optimized Link State Routing Protocol , 2003 .

[8]  Xiaodong Wang,et al.  Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.

[9]  John S. Baras,et al.  Application of sequential detection schemes for obtaining performance bounds of greedy users in the IEEE 802.11 MAC , 2008, IEEE Communications Magazine.

[10]  Sang Kyu Lee,et al.  Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[11]  F. Massey The Kolmogorov-Smirnov Test for Goodness of Fit , 1951 .

[12]  Nitin H. Vaidya,et al.  Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.

[13]  Chadi Assi,et al.  Enhancing IEEE 802.11 Random Backoff in Selfish Environments , 2008, IEEE Transactions on Vehicular Technology.

[14]  Michalis Faloutsos,et al.  Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.

[15]  Akira Tanaka,et al.  The worst-case time complexity for generating all maximal cliques and computational experiments , 2006, Theor. Comput. Sci..

[16]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[17]  Akira Tanaka,et al.  The Worst-Case Time Complexity for Generating All Maximal Cliques , 2004, COCOON.

[18]  William C. Y. Lee,et al.  Mobile Communications Engineering , 1982 .

[19]  J. Andel Sequential Analysis , 2022, The SAGE Encyclopedia of Research Design.

[20]  Yu Wang,et al.  Performance of collision avoidance protocols in single-channel ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[21]  Brahim Bensaou,et al.  Fair bandwidth sharing algorithms based on game theory frameworks for wireless ad-hoc networks , 2004, IEEE INFOCOM 2004.

[22]  Leonard Kleinrock,et al.  Optimal Transmission Ranges for Randomly Distributed Packet Radio Terminals , 1984, IEEE Trans. Commun..

[23]  Martin Nilsson,et al.  Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[24]  Saurabh Ganeriwal,et al.  On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[25]  Maxim Raya,et al.  DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.