Skip to main content

Playing CSMA/CA Game to Deter Backoff Attacks in Ad Hoc Wireless LANs

  • Conference paper
Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3738))

Included in the following conference series:

Abstract

The IEEE 802.11 MAC protocol is vulnerable to selfish backoff attacks exploiting the constituent CSMA/CA mechanism. Administrative prevention of such attacks fails in wireless ad-hoc LANs which cannot mandate stations’ behavior. We take a game-theoretic approach whereby stations are allowed to maximize their payoffs (success rates). Using a fairly accurate performance model we show that a noncooperative CSMA/CA game then arises with a payoff structure characteristic of a Prisoners’ Dilemma. For a repeated CSMA/CA game, a novel SPELL strategy is proposed. If the stations are rational players and wish to maximize a long-term utility, SPELL deters a single attacker by providing a disincentive to deviate from SPELL.

Effort sponsored by the Air Force Office of Scientific Research, Air Force Material Command, USAF, under grant nmber FA8655-04-1-3074. The U.S Government is authorized to reproduce and distribute reprints for Governmental purpose notwithstanding any copyright notation thereon. The views and conclusions contained herein are those of the author and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the AFOSR or the U.S. Government.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Altman, E., El Azouzi, R., Jimenez, T.: Slotted Aloha as a Game with Partial Information. Computer Networks 45, 701–713 (2004)

    Article  MATH  Google Scholar 

  2. Altman, E., Kumar, A., Kumar, D., Venkatesh, R.: Cooperative and Non-Cooperative Control in IEEE 802.11 WLANs. INRIA Tech. Rep. 5541 (2005)

    Google Scholar 

  3. Bellardo, J., Savage, S.: 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In: Proc. USENIX Security Symposium (2003)

    Google Scholar 

  4. Bianchi, G.: Performance Analysis of the IEEE 802.11 Distributed Coordination Function. IEEE J. Selected Areas Commun. SAC-18, 535–547 (2000)

    Google Scholar 

  5. Cagalj, M., Ganeriwal, S., Aad, I., Hubaux, J.-P.: On Selfish Behavior in CSMA/CA Networks. In: Proceedings of IEEE Infocom 2005, Miami, FL (2005)

    Google Scholar 

  6. Cardenas, A.A., Radosavac, S., Baras, J.S.: Detection and Prevention of MAC Layer Misbehavior in Ad Hoc Networks. Univ. of Maryland Tech. Rep. ISR TR 2004-30 (2004)

    Google Scholar 

  7. Chang, J.: Stochastic Processes Notes, http://www.stat.yale.edu/~chang/251/mc.pdf

  8. Feller, W.: An Introduction to Probability Theory and its Applications. Wiley, Chichester (1966)

    MATH  Google Scholar 

  9. Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1991)

    Google Scholar 

  10. IEEE Standard for Information Technology - Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, ISO/IEC 8802-11 (1999)

    Google Scholar 

  11. Knoblauch, V.: Computable Strategies for Repeated Prisoner’s Dilemma. Games and Economic Behavior 7, 381–389 (1994)

    Article  MATH  MathSciNet  Google Scholar 

  12. Konorski, J.: Multiple access in ad-hoc wireless lANs with noncooperative stations. In: Gregori, E., Conti, M., Campbell, A.T., Omidyar, G., Zukerman, M. (eds.) NETWORKING 2002. LNCS, vol. 2345, pp. 1141–1146. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  13. Kyasanur, P., Vaidya, N.H.: Detection and handling of MAC layer Misbehavior in Wireless Networks. In: Proc. Int. Conf. on Dependable Systems and Networks (2003)

    Google Scholar 

  14. MacKenzie, A.B., Wicker, S.B.: Game Theory and the Design of Self-configuring, Adaptive Wireless Networks. IEEE Comm. Magazine 39, 126–131 (2001)

    Article  Google Scholar 

  15. Milgrom, P., Roberts, J.: Adaptive and Sophisticated Learning in Normal Form Games. Games and Economic Behaviour 3, 82–100 (1991)

    Article  MATH  MathSciNet  Google Scholar 

  16. Queseth, O.: Cooperative and Selfish Behaviour in Unlicensed Spectrum Using the CSMA/CA Protocol. In: Proc. Nordic Radio Symposium (2004)

    Google Scholar 

  17. Raya, M., Hubaux, J.-P., Aad, I.: DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots. In: Proc. MobiSys Conference (2004)

    Google Scholar 

  18. Rom, R., Sidi, M.: Multiple Access Protocols Performance and Analysis. Springer, Heidelberg (1991)

    Google Scholar 

  19. Szpankowski, W.: Average Case Analysis of Algorithms on Sequences. Wiley, Chichester (2001)

    MATH  Google Scholar 

  20. Tan, G., Guttag, J.: The 802.11 MAC Protocol Leads to Inefficient Equilibria. In: Proceedings of IEEE Infocom 2005, Miami, FL (2005)

    Google Scholar 

  21. Wong, S.H., Wassell, I.J.: Application of Game Theory for Distributed Dynamic Channel Allocation. In: Proc. 55th IEEE Vehicular Technology Conference, pp. 404–408 (2002)

    Google Scholar 

  22. Yao, X.: Evolutionary Stability in the n-Person Iterated Prisoners’ Dilemma. BioSystems 39, 189–197 (1996)

    Article  Google Scholar 

  23. Ziouva, E., Antonakopoulos, T.: CSMA/CA Performance under High Traffic Conditions: Throughput and Delay Analysis. Computer Comm. 25, 313–321 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Konorski, J. (2005). Playing CSMA/CA Game to Deter Backoff Attacks in Ad Hoc Wireless LANs. In: Syrotiuk, V.R., Chávez, E. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2005. Lecture Notes in Computer Science, vol 3738. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11561354_12

Download citation

  • DOI: https://doi.org/10.1007/11561354_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29132-9

  • Online ISBN: 978-3-540-32086-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics