Malicious or Selfish? Analysis of Carrier Sense Misbehavior in IEEE 802.11 WLAN

The behavior of selfish users, which does not respect the backoff procedure of IEEE 802.11 WLAN, has been nicely studied in game-theoretic frameworks. However, in these studies, the effect of physical carrier sense has not been properly incorporated into the analysis. In this paper, we study the problem of how carrier sense misbehavior can affect network performance in addition to backoff misbehavior. Our analysis shows that a cheater can increase its throughput by ignoring the carrier sense mechanism while a well-behaved user significantly loses its throughput. Consequently, not only a malicious user, but also a selfish one is motivated to disregard the carrier sense mechanism, which will result in significant throughput degradation of well-behaved ones. Our analysis also shows that carrier sense misbehavior corresponds to the case of virtually increasing the channel access probability of the cheater in the backoff procedure. We provide our preliminary simulation results, which verify our analysis.

[1]  Nitin H. Vaidya,et al.  Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.

[2]  Srikanth V. Krishnamurthy,et al.  Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks , 2009, IEEE INFOCOM 2009.

[3]  John Ioannidis,et al.  A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP) , 2004, TSEC.

[4]  Levente Buttyán,et al.  Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing , 2007 .

[5]  Levente Buttyán,et al.  Security and Cooperation in Wireless Networks: References , 2007 .

[6]  Jerzy Konorski,et al.  A Game-Theoretic Study of CSMA/CA Under a Backoff Attack , 2006, IEEE/ACM Transactions on Networking.

[7]  Jean-Pierre Hubaux,et al.  Security and Cooperation in Wireless Networks , 2007, ESAS.

[8]  Saurabh Ganeriwal,et al.  On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[9]  Xiaodong Wang,et al.  Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.

[10]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[11]  Qi Chen,et al.  Overhaul of ieee 802.11 modeling and simulation in ns-2 , 2007, MSWiM '07.

[12]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[13]  Mark Handley,et al.  The final nail in WEP's coffin , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[14]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .