Selfish MAC Layer Misbehavior in Wireless Networks ECE 299, Karthik Balasubramanian February 8, 2007 Nitin Vaidya and Pradeep Kyasanur.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Medium Access Issues David Holmer
Contents IEEE MAC layer operation Basic CSMA/CA operation
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
Duke Selfish MAC Layer Misbehavior in Wireless Networks Author: Pradeep Kyasanur and Nitin H. Vaidya Some slides are borrowed from the author and others.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
CSMA/CA in IEEE Physical carrier sense, and Virtual carrier sense using Network Allocation Vector (NAV) NAV is updated based on overheard RTS/CTS/DATA/ACK.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Module C- Part 1 WLAN Performance Aspects
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
Cyclex An Efficient Cheating-Resistant MAC Protocol Jim Pugh Mentors: Imad Aad, Mario Čagalj, Prof. Jean-Pierre Hubaux.
Distributed Fair Scheduling in a Wireless LAN Gautam Kulkarni EE206A (Spring 2001) Nitin Vaidya, Paramvir Bahl and Seema Gupta (appeared in Mobicom 2000.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
MAC Protocol By Ervin Kulenica & Chien Pham.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
1 Some Issues in Ad Hoc Networks Nitin Vaidya University of Illinois at Urbana-Champaign Keynote talk presented at the International.
Sep 12, 2002Wireless Networking Seminar1 Does IEEE Work Well in Multi-hop Wireless Network? Author: Shugong Xu, Tarek Saadawi City University of.
Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Wireless LAN Simulation - IEEE MAC Protocol
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Opersating Mode DCF: distributed coordination function
PLANETE group, INRIA Sophia-Antipolis July 1, 2003 Adaptive Channel allocation for QoS Enhancement in IEEE Wireless LANs Presented by: Mohammad.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
A Virtual Collision Mechanism for IEEE DCF
MAC Protocols and Security in Ad hoc and Sensor Networks
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He J. Sobrinho and A. krishnakumar.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
Enhancing TCP Fairness in Ad Hoc Wireless Networks using Neighborhood RED Kaixin Xu, Mario Gerla UCLA Computer Science Department
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Fundamentals of Computer Networks ECE 478/578
IEEE WLAN.
1/26 Module C - Part 2 DOMINO Detection Of greedy behavior in MAC layer of IEEE public NetwOrks Prof. JP Hubaux Mobile Networks
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
Rami Melhem Sameh Gobriel & Daniel Mosse Modeling an Energy-Efficient MAC Layer Protocol.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
ECE 256, Spring 2009 __________ Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver __________________.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Protocol Security for Wireless Networks Yih-Chun Hu Illinois Center for Wireless Systems.
LECTURE 13 CT1303 LAN. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL CSMA\CA Carrier Sense Multiple Access\Collision Avoidance CSMA\CA Each station will sense.
An Opportunistic Directional MAC Protocol for Multi-hop Wireless Networks with Switched Beam Directional Antennas Osama Bazan and Muhammad Jaseemuddin.
MAC Protocols for Sensor Networks
EA C451 (Internetworking Technologies)
Distributed Medium Access Control in Wireless Networks
Topics in Distributed Wireless Medium Access Control
On the Physical Carrier Sense in Wireless Ad-hoc Networks
Self Organized Networks
Wireless LAN Simulation IEEE MAC Protocol
Presentation transcript:

Selfish MAC Layer Misbehavior in Wireless Networks ECE 299, Karthik Balasubramanian February 8, 2007 Nitin Vaidya and Pradeep Kyasanur

2 The problem: a game theory approach CheatDon’t Cheat Cheat 1, 1 3, 0 Don’t cheat 0, 3 2, 2 Node B Node A Need incentive structure to prevent cheating

3 Review: contention schemes Point Contention Function (PCF) Centralized controller required No ad-hoc networks optional feature Distributed Contention Function (DCF) Suitable for ad-hoc networks Suitable for fluctuating number of nodes and hosts Uses Carrier Sense Multiple Access/Collision Avoidance What paper focuses on

4 Review: collision avoidance and backoff Randomly choose backoff value B in range [0,CW] -CW is the Contention Window Count down backoff by 1 every idle slot wait Transmit wait B2=10 B1=20 B2=10 B1=0 S1 S2 CW=31 B1=15 B2=25 Source: Pradeep Kyasanur and Nitin Vaidya, UIUC

5 Cheating Transmit wait B1 = 1 B2 = 20 Transmit wait B2 = 19 B1 = 1 Misbehaving node Well-behaved node Source: Pradeep Kyasanur and Nitin Vaidya, UIUC What if I always choose B=1? Good for me, bad for you

6 Goal 1: detect cheating Method: Sender backoff data collection -Measure actual backoff durations of individual nodes -If backoff from skewed distribution, cheating suspected Method weaknesses -Cheating cannot be immediately diagnosed -High chance for misdiagnosis if small sample size -Requires significant computation Current not sufficient for good detection

modification: B selected by receiver 1. R provides backoff B to S in ACK B selected from [0,CW min ] DATA Sender S Receiver R CTS ACK(B) RTS 2. S uses B for backoff RTS B Source: Pradeep Kyasanur and Nitin Vaidya, UIUC

8 Detection Receiver counts number of idle slots Bobsr Condition for detecting deviations: B obsr <  B 0 <  <= 1 Sender S Receiver R ACK(B) RTS Backoff B obsr Source: Pradeep Kyasanur and Nitin Vaidya, UIUC

9 Goal 2: punish cheating Punishment -Must be effective deterrent -Must not hinder overall throughput If Σ( deviations) > threshold, cheater identified -Pass on to higher layers: “telling Daddy on you” -Appropriate action can be taken

10 Punishment  When B obsr <  B, penalty P added  P proportional to  B– B obsr ACK(B+P) CTS DATA  Total backoff assigned = B + P B obsr Sender S Receiver R ACK(B) RTS Actual backoff < B Source: Pradeep Kyasanur and Nitin Vaidya, UIUC

11 Simulation Setup Misbehaving Node Source: Pradeep Kyasanur and Nitin Vaidya, UIUC

12 Diagnosis Correct Diagnosis Misdiagnosis Percentage of Misbehavior (of misbehaving node) Percentage Source: Pradeep Kyasanur and Nitin Vaidya, UIUC

13 Throughput Proposed Scheme Percentage of Misbehavior Throughput (Kbps per node) Avg. with penalty Avg. with Source: Pradeep Kyasanur and Nitin Vaidya, UIUC

14 Throughput with no misbehavior Proposed Scheme Number of sender nodes Throughput (Kbps per node) Source: Pradeep Kyasanur and Nitin Vaidya, UIUC

15 Discussion/Limitations Requires modification for efficient detection Breakdown at high cheating levels No enforcement mechanism presented Questions?