Diagnosing and Penalizing MAC Layer Misbehavior in Wireless Networks

Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel. In this environment, selfish hosts that fail to adhere to the MAC protocol may obtain an unfair share of the channel bandwidth. For example, IEEE 802.11 requires nodes competing for access to the channel to wait for a “backoff” interval, randomly selected from a specified range, before initiating a transmission. Selfish nodes may wait for smaller backoff intervals than well-behaved nodes, thereby obtaining an unfair advantage. Such selfish misbehavior may arise in those wireless networks where it is not feasible to validate the MAC protocol being used by individual users. We present modifications to the IEEE 802.11 protocol to simplify detection of such selfish hosts. We also present a correction scheme for penalizing selfish misbehavior. Simulation results indicate that our detection and correction schemes are successful in handling MAC layer misbehavior.

[1]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[2]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[3]  Nitin H. Vaidya,et al.  Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[4]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[5]  Songwu Lu,et al.  Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.

[6]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[7]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[8]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[9]  Jerzy Konorski,et al.  Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations , 2002, NETWORKING.

[10]  L. F. Wilson,et al.  Analysis of distributed intrusion detection systems using Bayesian methods , 2002, Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference (Cat. No.02CH37326).

[11]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[12]  Stefan Savage,et al.  Robust congestion signaling , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[13]  Stephen B. Wicker,et al.  Game theory and the design of self-configuring, adaptive wireless networks , 2001, IEEE Commun. Mag..

[14]  Jerzy Konorski,et al.  Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting , 2001, PROMS.

[15]  Stephen B. Wicker,et al.  Selfish users in Aloha: a game-theoretic approach , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).

[16]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[17]  Kishor S. Trivedi,et al.  Characterizing intrusion tolerant systems using a state transition model , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[18]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[19]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[20]  Stefan Savage,et al.  TCP congestion control with a misbehaving receiver , 1999, CCRV.

[21]  Noam Nisan,et al.  Algorithms for Selfish Agents , 1999, STACS.

[22]  Ron Lavi,et al.  Algorithmic Mechanism Design , 2008, Encyclopedia of Algorithms.

[23]  Scott Shenker,et al.  Design guidelines for robust Internet protocols , 2003, CCRV.

[24]  Levente Buttyán,et al.  Report on a working session on security in wireless ad hoc networks , 2003, MOCO.

[25]  Pietro Michiardi,et al.  Making greed work in mobile ad hoc networks , 2002 .

[26]  Pietro Michiardi,et al.  Game theoretic analysis of security in mobile ad hoc networks , 2002 .

[27]  Kevin R. Fall,et al.  Ns: notes and documentation , 1997 .

[28]  Somesh Jha,et al.  A model checker for authentication protocols , 1997 .

[29]  R. Jain,et al.  Fairness, call es-tablishment latency and other performance metrics , 1996 .