Enhancing IEEE 802.11 Random Backoff in Selfish Environments

Wireless access protocols currently deployed in mobile ad hoc networks use distributed contention resolution mechanisms for sharing the wireless channel. In such an environment, selfish hosts that fail to adhere to the medium access control (MAC) protocol may obtain an unfair share of the channel bandwidth at the expense of performance degradation of well-behaved hosts. We present a novel access method, called predictable random backoff (PRB), that is capable of mitigating the misbehavior of selfish hosts, particularly hosts that deliberately do not respect the random deferment of the transmission of their packets. PRB is based on minor modifications of the IEEE 802.11 binary exponential backoff (BEB) and forces each node to generate a predictable backoff interval. The key idea is to adjust, in a predictable manner, the lower bound of the contention window to enhance the per-station fairness in selfish environments. Hosts that do not follow the operation of PRB are therefore easily detected and isolated. We present an accurate analytical model to compute the system throughput using a 3-D Markov chain. We evaluate the performance of PRB under the normal case and in the presence of selfish hosts. Our results show that PRB and BEB similarly perform in the former case. Selfish hosts, however, achieve substantially higher throughput than well-behaved hosts under BEB. PRB, on the other hand, can effectively enhance IEEE 802.11 BEB by mitigating the impacts of these MAC selfish misbehaviors and guarantee a fair share of the wireless channel for well-behaved hosts.

[1]  Ray Jain,et al.  The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.

[2]  Kevin R. Fall,et al.  Ns: notes and documentation , 1997 .

[3]  Michalis Faloutsos,et al.  Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.

[4]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[5]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[6]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[7]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[8]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.

[9]  Maxim Raya,et al.  DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.

[10]  Thierry Turletti,et al.  Enhancing IEEE 802.11 MAC in congested environments , 2004 .

[11]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[12]  Yihong Zhou,et al.  Analyzing and Preventing MAC-Layer Denial of Service Attacks for Stock 802 . 11 Systems , 2004 .

[13]  Pramod K. Varshney,et al.  A New Backoff Algorithm for the IEEE 802.11 Distributed Coordination Function , 2004 .

[14]  John S. Baras,et al.  Detection and prevention of MAC layer misbehavior in ad hoc networks , 2004, SASN '04.

[15]  Andrzej Duda,et al.  Idle sense: an optimal access method for high throughput and fairness in rate diverse wireless LANs , 2005, SIGCOMM '05.

[16]  Nitin H. Vaidya,et al.  Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.

[17]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[18]  Saurabh Ganeriwal,et al.  On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[19]  Sheng Zhong,et al.  On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques , 2005, MobiCom '05.

[20]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[21]  Chadi Assi,et al.  Interlayer Attacks in Mobile Ad Hoc Networks , 2006, MSN.

[22]  Chadi Assi,et al.  Modeling and analysis of predictable random backoff in selfish environments , 2006, MSWiM '06.

[23]  Chadi Assi,et al.  Mitigating Smart Selfish MAC Layer Misbehavior in Ad Hoc Networks , 2006, 2006 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[24]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[25]  Sheng Zhong,et al.  On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks , 2006, Wirel. Networks.