Abstract
The IEEE 802.11 MAC protocol is vulnerable to selfish backoff attacks exploiting the constituent CSMA/CA mechanism. Administrative prevention of such attacks fails in wireless ad-hoc LANs which cannot mandate stations’ behavior. We take a game-theoretic approach whereby stations are allowed to maximize their payoffs (success rates). Using a fairly accurate performance model we show that a noncooperative CSMA/CA game then arises with a payoff structure characteristic of a Prisoners’ Dilemma. For a repeated CSMA/CA game, a novel SPELL strategy is proposed. If the stations are rational players and wish to maximize a long-term utility, SPELL deters a single attacker by providing a disincentive to deviate from SPELL.
Effort sponsored by the Air Force Office of Scientific Research, Air Force Material Command, USAF, under grant nmber FA8655-04-1-3074. The U.S Government is authorized to reproduce and distribute reprints for Governmental purpose notwithstanding any copyright notation thereon. The views and conclusions contained herein are those of the author and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the AFOSR or the U.S. Government.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Altman, E., El Azouzi, R., Jimenez, T.: Slotted Aloha as a Game with Partial Information. Computer Networks 45, 701–713 (2004)
Altman, E., Kumar, A., Kumar, D., Venkatesh, R.: Cooperative and Non-Cooperative Control in IEEE 802.11 WLANs. INRIA Tech. Rep. 5541 (2005)
Bellardo, J., Savage, S.: 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In: Proc. USENIX Security Symposium (2003)
Bianchi, G.: Performance Analysis of the IEEE 802.11 Distributed Coordination Function. IEEE J. Selected Areas Commun. SAC-18, 535–547 (2000)
Cagalj, M., Ganeriwal, S., Aad, I., Hubaux, J.-P.: On Selfish Behavior in CSMA/CA Networks. In: Proceedings of IEEE Infocom 2005, Miami, FL (2005)
Cardenas, A.A., Radosavac, S., Baras, J.S.: Detection and Prevention of MAC Layer Misbehavior in Ad Hoc Networks. Univ. of Maryland Tech. Rep. ISR TR 2004-30 (2004)
Chang, J.: Stochastic Processes Notes, http://www.stat.yale.edu/~chang/251/mc.pdf
Feller, W.: An Introduction to Probability Theory and its Applications. Wiley, Chichester (1966)
Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1991)
IEEE Standard for Information Technology - Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, ISO/IEC 8802-11 (1999)
Knoblauch, V.: Computable Strategies for Repeated Prisoner’s Dilemma. Games and Economic Behavior 7, 381–389 (1994)
Konorski, J.: Multiple access in ad-hoc wireless lANs with noncooperative stations. In: Gregori, E., Conti, M., Campbell, A.T., Omidyar, G., Zukerman, M. (eds.) NETWORKING 2002. LNCS, vol. 2345, pp. 1141–1146. Springer, Heidelberg (2002)
Kyasanur, P., Vaidya, N.H.: Detection and handling of MAC layer Misbehavior in Wireless Networks. In: Proc. Int. Conf. on Dependable Systems and Networks (2003)
MacKenzie, A.B., Wicker, S.B.: Game Theory and the Design of Self-configuring, Adaptive Wireless Networks. IEEE Comm. Magazine 39, 126–131 (2001)
Milgrom, P., Roberts, J.: Adaptive and Sophisticated Learning in Normal Form Games. Games and Economic Behaviour 3, 82–100 (1991)
Queseth, O.: Cooperative and Selfish Behaviour in Unlicensed Spectrum Using the CSMA/CA Protocol. In: Proc. Nordic Radio Symposium (2004)
Raya, M., Hubaux, J.-P., Aad, I.: DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots. In: Proc. MobiSys Conference (2004)
Rom, R., Sidi, M.: Multiple Access Protocols Performance and Analysis. Springer, Heidelberg (1991)
Szpankowski, W.: Average Case Analysis of Algorithms on Sequences. Wiley, Chichester (2001)
Tan, G., Guttag, J.: The 802.11 MAC Protocol Leads to Inefficient Equilibria. In: Proceedings of IEEE Infocom 2005, Miami, FL (2005)
Wong, S.H., Wassell, I.J.: Application of Game Theory for Distributed Dynamic Channel Allocation. In: Proc. 55th IEEE Vehicular Technology Conference, pp. 404–408 (2002)
Yao, X.: Evolutionary Stability in the n-Person Iterated Prisoners’ Dilemma. BioSystems 39, 189–197 (1996)
Ziouva, E., Antonakopoulos, T.: CSMA/CA Performance under High Traffic Conditions: Throughput and Delay Analysis. Computer Comm. 25, 313–321 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Konorski, J. (2005). Playing CSMA/CA Game to Deter Backoff Attacks in Ad Hoc Wireless LANs. In: Syrotiuk, V.R., Chávez, E. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2005. Lecture Notes in Computer Science, vol 3738. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11561354_12
Download citation
DOI: https://doi.org/10.1007/11561354_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29132-9
Online ISBN: 978-3-540-32086-9
eBook Packages: Computer ScienceComputer Science (R0)