Competition and cooperation in wireless access misbehavior

With the proliferation of access points and terminals, wireless access misbehavior emerges as important means of protocol misuse, whereby network entities aim at obtaining higher channel share than the one in legitimate operation. We consider the instantiation of misbehavior in the back-off mechanism in IEEE 802.11. First, we study the competition between two malicious entities that affect each other. Each entity has some private target gain in terms of access probability and attempts to misuse the protocol to its benefit so as to prolong the time until detection. We derive conditions for existence of the unique Nash Equilibrium Point (NEP). This is influenced by attacker gains and topology parameters that capture the level of contention from neighboring nodes. These quantities need to be small in order for the NEP to exist. Next, we consider simple types of cooperation between attackers that aim at alleviating the contention caused to each other.

[1]  John S. Baras,et al.  Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers , 2007, J. Comput. Secur..

[2]  Richard J. La,et al.  DIMACS Series in Discrete Mathematics and Theoretical Computer Science A Game-theoretic Look at the Gaussian Multiaccess Channel , 2022 .

[3]  Nitin H. Vaidya,et al.  Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.

[4]  Jerzy Konorski A game-theoretic study of CSMA/CA under a backoff attack , 2006, TNET.

[5]  Saurabh Ganeriwal,et al.  On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[6]  Jerzy Konorski,et al.  A Game-Theoretic Study of CSMA/CA Under a Backoff Attack , 2006, IEEE/ACM Transactions on Networking.

[7]  George Kesidis,et al.  Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs , 2007, IEEE Journal on Selected Areas in Communications.

[8]  John S. Baras,et al.  Game Theoretic Modeling of Malicious Users in Collaborative Networks , 2008, IEEE Journal on Selected Areas in Communications.

[9]  H. Poor An Introduction to Signal Detection and Estimation-Second Edition Chapter III: Selected Solutions , 2005 .

[10]  J. Andel Sequential Analysis , 2022, The SAGE Encyclopedia of Research Design.

[11]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[12]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[13]  Michalis Faloutsos,et al.  Routing amid Colluding Attackers , 2007, 2007 IEEE International Conference on Network Protocols.

[14]  Zhu Han,et al.  Coalitional game theory for communication networks , 2009, IEEE Signal Processing Magazine.

[15]  Xiaodong Wang,et al.  Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.

[16]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[17]  Zhuo Lu,et al.  On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[18]  Maxim Raya,et al.  DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.

[19]  John S. Baras,et al.  An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks , 2008, TSEC.