A game-theoretic analysis of denial of service attacks in wireless random access

In wireless access, transmitter nodes need to make individual decisions for distributed operation and do not necessarily cooperate with each other. We consider a single-receiver random access system of non-cooperative transmitters with the individual objectives of optimizing their throughput rewards, transmission energy costs and delay costs. The non-cooperative transmitter behavior may be purely selfish or may also reflect malicious objectives of generating interference to prevent the successful transmissions of the other nodes as a form of denial of service attack. Our goal is to evaluate the interactions between selfish and malicious nodes that have the dual objectives of optimizing their individual performance measures and blocking the packet transmissions of the other selfish nodes. We assume saturated packet queues of infinite buffer capacities and consider a general multi-packet reception channel that allows packet captures in the presence of simultaneous transmissions. In this context, we formulate a non-cooperative random access game of selecting the individual probabilities of transmitting packets to a common receiver. We derive the non-cooperative transmission strategies in Nash equilibrium. The analysis provides insights for the optimal strategies to block random access of selfish nodes as well as the optimal defense mechanisms against the possible denial of service attacks of malicious nodes in wireless networks. The results are also compared with the cooperative equilibrium strategies that optimize the total system utility (separately under random access and scheduled access). A pricing scheme is presented to improve the non-cooperative operation. For distributed implementation, we formulate a repeated game of the best-response strategy updates and introduce adaptive heuristics (based on the channel feedback only) provided that the system parameters are not explicitly known at the individual transmitters.

[1]  Anthony Ephremides,et al.  On the stability of interacting queues in a multiple-access system , 1988, IEEE Trans. Inf. Theory.

[2]  Jens Zander,et al.  Jamming in Slotted ALOHA Multihop Packet , 1991 .

[3]  Venkat Anantharam The stability region of the finite-user slotted ALOHA protocol , 1991, IEEE Trans. Inf. Theory.

[4]  Wei Luo,et al.  Stability of N interacting queues in random-access systems , 1999, IEEE Trans. Inf. Theory.

[5]  Stephen B. Wicker,et al.  Game theory and the design of self-configuring, adaptive wireless networks , 2001, IEEE Commun. Mag..

[6]  Stephen B. Wicker,et al.  Selfish users in Aloha: a game-theoretic approach , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).

[7]  Rachid El Azouzi,et al.  Slotted Aloha as a Stochastic Game with Partial Information , 2003 .

[8]  George Kesidis,et al.  Equilibria of a noncooperative game for heterogeneous users of an ALOHA network , 2002, IEEE Communications Letters.

[9]  Michalis Faloutsos,et al.  Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.

[10]  Stephen B. Wicker,et al.  Stability of multipacket slotted Aloha with selfish users and perfect information , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[11]  Anthony Ephremides,et al.  Power control and rate adaptation as stochastic games for random access , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[12]  Eitan Altman,et al.  Slotted Aloha as a game with partial information , 2004, Comput. Networks.

[13]  Peter Marbach,et al.  Transmission costs, selfish nodes, and protocol design , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[14]  Jeff S. Shamma,et al.  Dynamic fictitious play, dynamic gradient play, and distributed convergence to Nash equilibria , 2005, IEEE Transactions on Automatic Control.

[15]  Anthony Ephremides,et al.  On the throughput, capacity, and stability regions of random multiple access , 2005, IEEE Transactions on Information Theory.

[16]  H. Inaltekin,et al.  A one-shot random access game for wireless networks , 2005, 2005 International Conference on Wireless Networks, Communications and Mobile Computing.

[17]  Lang Tong,et al.  Stability and delay of finite-user slotted ALOHA with multipacket reception , 2005, IEEE Transactions on Information Theory.

[18]  Cristina Comaniciu,et al.  A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.

[19]  A. Ephremides,et al.  A Game-Theoretic Look at Throughput and Stability in Random Access , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[20]  Anthony Ephremides,et al.  A game-theoretic look at simple relay channel , 2006, Wirel. Networks.

[21]  A. Robert Calderbank,et al.  Utility-Optimal Medium Access Control: Reverse and Forward Engineering , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[22]  Cristina Comaniciu,et al.  Cooperation and Fairness for Slotted Aloha , 2007, Wirel. Pers. Commun..

[23]  John S. Baras,et al.  Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers , 2007, J. Comput. Secur..

[24]  Anthony Ephremides,et al.  On Joint MAC and Network Coding in Wireless Ad Hoc Networks , 2007, IEEE Transactions on Information Theory.

[25]  Peter Marbach,et al.  Transmission costs, selfish nodes, and protocol design , 2008, Wirel. Networks.