Analysis of Effect of User Misbehaviours on the Reservation-Based MAC Protocols in Wireless Communication Networks

SUMMARY In a shared medium communication system, mobile users contend for channel access according to a given set of rules to avoid collisions and achieve efficient use of the medium. If one or more users do not comply with the agree rules either due to selfish or malicious behaviours, they will cause some impacts on the system performance, especially to the well-behaved users. In this paper, we consider the problem of user misbehaviours on the performance of a wireless infrastructure-based network using reservation-based MAC protocols. Key misbehaving strategies possible in such a network are identified and explained. To quantify the impact of these misbehaviours upon the network performance, three different misbehaving scenarios are developed to allow a systematic investigation of each misbehaving strategy. For each scenario, we have derived mathematical formulations for evaluating and analyzing the key performance metrics, i.e., probabilities of success of well-behaved and misbehaved users and the fairness index. Numerical results show that the presence of misbehaviours can cause different levels of damage depending on the misbehavior strategy used. The combined multi-token and increasing permission probability strategies where the misbehaved user selfishly accesses the channel more times and with higher probabilities than allowed is shown to cause the most severe impairment of performance and fairness.

[1]  Jin Soo Park,et al.  Throughput analysis of split-channel MAC with p-persistent CSMA on the control channel and reservation scheme , 2008, 2008 International Conference on Telecommunications.

[2]  Christos H. Papadimitriou,et al.  Selfish caching in distributed systems: a game-theoretic analysis , 2004, PODC '04.

[3]  Patrick P. C. Lee,et al.  On the detection of signaling DoS attacks on 3G/WiMax wireless networks , 2009, Comput. Networks.

[4]  Albert Banchs,et al.  Detecting selfish configurations in 802.11 WLANs , 2010, IEEE Communications Letters.

[5]  Patrick P. C. Lee,et al.  On the Detection of Signaling DoS Attacks on 3G Wireless Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[6]  Jerzy Konorski,et al.  A Game-Theoretic Study of CSMA/CA Under a Backoff Attack , 2006, IEEE/ACM Transactions on Networking.

[7]  George Kesidis,et al.  Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs , 2007, IEEE Journal on Selected Areas in Communications.

[8]  Stefano Tomasin,et al.  Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ , 2010, IEEE Transactions on Wireless Communications.

[9]  H. Inaltekin,et al.  The Analysis of Nash Equilibria of the One-Shot Random-Access Game for Wireless Networks and the Behavior of Selfish Nodes , 2008, IEEE/ACM Transactions on Networking.

[10]  Paolo Santi,et al.  The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes , 2008, IEEE Transactions on Mobile Computing.

[11]  S. Tasaka,et al.  Integrated video and data transmission in the TDD ALOHA-reservation wireless LAN , 1995, Proceedings IEEE International Conference on Communications ICC '95.

[12]  L. Wuttisittikulkij,et al.  Channel reservation techniques under misbehaved users in high bit-rate wireless communication systems , 2004, 2004 IEEE Region 10 Conference TENCON 2004..

[13]  Saurabh Ganeriwal,et al.  On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[14]  Maxim Raya,et al.  DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.

[15]  Maxim Raya,et al.  DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.

[16]  D. Raychaudhuri,et al.  ATM-based transport architecture for multiservices wireless personal communication networks , 1994, IEEE J. Sel. Areas Commun..

[17]  Victor C. M. Leung,et al.  Dynamic reservation TDMA protocol for wireless ATM networks , 2001, IEEE J. Sel. Areas Commun..

[18]  John S. Baras,et al.  Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers , 2007, J. Comput. Secur..

[19]  Bhaskar Ramamurthi,et al.  Packet reservation multiple access for local wireless communications , 1989, IEEE Trans. Commun..

[20]  Zhuo Lu,et al.  On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[21]  Chadi Assi,et al.  Enhancing IEEE 802.11 Random Backoff in Selfish Environments , 2008, IEEE Transactions on Vehicular Technology.

[22]  Dimitri P. Bertsekas,et al.  Data Networks , 1986 .

[23]  Oliver W. W. Yang,et al.  A New Mechanism to Detect Selfish Behavior in IEEE 802.11 Ad Hoc Networks , 2009, 2009 IEEE International Conference on Communications.

[24]  Giuseppe Di Battista,et al.  26 Computer Networks , 2004 .

[25]  Raj Jain,et al.  A Quantitative Measure Of Fairness And Discrimination For Resource Allocation In Shared Computer Systems , 1998, ArXiv.

[26]  Leonard Kleinrock,et al.  On queueing problems in random-access communications , 1985, IEEE Trans. Inf. Theory.

[27]  Nitin H. Vaidya,et al.  Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.

[28]  Yunghsiang Sam Han,et al.  Analyzing split channel medium access control schemes , 2006, IEEE Transactions on Wireless Communications.

[29]  Victor C. M. Leung,et al.  Analytical Modeling of Contention-Based Bandwidth Request Mechanism in IEEE 802.16 Wireless Networks , 2008, IEEE Transactions on Vehicular Technology.

[30]  Xiang-Yang Li,et al.  Low-cost routing in selfish and rational wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.

[31]  Victor O. K. Li,et al.  A multiple access scheme for multimedia traffic in wireless ATM , 1996, Mob. Networks Appl..

[32]  Lunchakorn Wuttisittikulkij,et al.  A Design and Performance Evaluation of a Class of Channel Reservation Techniques for Medium Access Control Protocols in High Bit-Rate Wireless Communications , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[33]  Larry J. Greenstein,et al.  Resource auction multiple access (RAMA) in the cellular environment , 1994, Proceedings of IEEE Vehicular Technology Conference (VTC).

[34]  Jianhua He,et al.  Modeling Contention Based Bandwidth Request Scheme for IEEE 802.16 Networks , 2007, IEEE Communications Letters.

[35]  Xiaodong Wang,et al.  Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks , 2008, IEEE Transactions on Information Forensics and Security.