Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures

In IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants in the two-hop relay topology, quantify their impact, and study defense measures.

[1]  Azzedine Boukerche,et al.  TCP-CC: cross-layer TCP pacing protocol by contention control on wireless networks , 2015, Wirel. Networks.

[2]  Szymon Szott,et al.  Impact of Contention Window Cheating on Single-Hop IEEE 802.11e MANETs , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[3]  Szymon Szott,et al.  Modeling a Traffic Remapping Attack Game in a Multi-Hop Ad Hoc Network , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[4]  Szymon Szott Selfish insider attacks in IEEE 802.11s wireless mesh networks , 2014, IEEE Communications Magazine.

[5]  Daniel Camps-Mur,et al.  SOLOR: Self-Optimizing WLANs With Legacy-Compatible Opportunistic Relays , 2015, IEEE/ACM Transactions on Networking.

[6]  Szymon Szott,et al.  Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks , 2014, IEEE Transactions on Wireless Communications.

[7]  David Malone,et al.  Policing 802.11 MAC Misbehaviours , 2013, IEEE Transactions on Mobile Computing.

[8]  Saurabh Ganeriwal,et al.  On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[9]  Szymon Szott,et al.  Impact of Misbehaviour on QoS in Wireless Mesh Networks , 2009, Networking.