Selfish Misbehavior in Wireless Networks

Slides:



Advertisements
Similar presentations
Wireless Testbed in Tsinghua University Fenghua Li Network Research Center of Tsinghua University AsianFI 2008.
Advertisements

Security Challenges for Future Internet Design Cybertrust PI Meeting Breakout.
End-host Perspectives on Congestion Management Murari Sridharan CONEX BOF, IETF 76, Hiroshima.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Jacques Bus, Head of Unit DG Information Society and Media EU-US Cooperation in Network and Information Security 17 Mar, 2008 – Yale, US.
IPv4 to IPv6 Migration strategies. What is IPv4  Second revision in development of internet protocol  First version to be widely implied.  Connection.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 16 Integrating Wireless Technology in business.
Introduction to Windows 8. Window 8 Introduction Newest member of the Windows family Newest member of the Windows family Microsoft reimagined Windows.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 3: Trust assumptions and.
Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.
Designing your wireless network. What to consider Dead spots Elevators & 2.4 devices Walls Number of people.
BMWnet Wshnt.kuas.edu.tw Mesh Networks Prof. W.S. Hwang.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Advisor: Quincy Wu Speaker: Kuan-Ta Lu Date: Aug. 19, 2010
1 The Importance of Being Earnest * Nitin Vaidya Illinois Center for Wireless Systems University of Illinois at Urbana-Champaign NSF Workshop, Reston,
Research Challenges for Wireless Internet Access (some thoughts) David K. Y. Yau Purdue University Department of Computer Science.
Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 3: Trust assumptions and.
Design and Implementation of a Multi-Channel Multi-Interface Network Chandrakanth Chereddi Pradeep Kyasanur Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Cognitive Radio Networks
Designing for High Density Wireless LANs Last Update Copyright Kenneth M. Chipps Ph.D.
Wireless Networks Fall 2009 Saewoong Bahk. –Room: Office hours: Tue,Thu 4-5PM TA: 남창원
P Future Directions Sajeev Manikkoth. Cognitive Layer Cognitive layer inclusion in Whitespace radio spec Whitespace and Geo-db operation related.
1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois Slightly revised version of slides used for.
1 Exploiting Diversity in Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign Presentation at Mesh.
New Features for IP Telephony. ISDN Quotes - IP Telephony The study found that smaller enterprises have a very limited understanding, awareness or even.
3.2 Software Fundamentals. A protocol is a formal description of digital message formats and the rules for exchanging those messages in or between computing.
Illinois Center for Wireless Systems Wireless Networks: Algorithms and Optimization R. Srikant ECE/CSL.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
Protocol Security for Wireless Networks Yih-Chun Hu Illinois Center for Wireless Systems.
Tom Lovett and Eamonn O’Neill Department of Computer Science University of Bath Bath BA2 7AY UK +44 (0) Social sensing:
Selfish MAC Layer Misbehavior in Wireless Networks ECE 299, Karthik Balasubramanian February 8, 2007 Nitin Vaidya and Pradeep Kyasanur.
Mesh Networks and DTN Break Out Group  Common research challenges  A representative experiment  Issues for a one page writeup  what incentive for the.
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
Personal Communication Services & WiFi
MOBILE COMMUNICATION SYSTEM
Multiple Access Methods
Wired vs Wireless Discussion
Intro By Victoria Menzies.
Figure 1. Different approaches to control wireless interfaces in SDWMN
Integrating Wireless Technology in business
Wireless Technologies
Wireless NETWORKS NET 434 Topic No 8 Wireless PANs ZiGBee NEtworks
(Phy-Link) Layers in the Brave New World
Management in mobile wireless networks: The case for client-assistance
TV Whitespace Common Functions across IEEE Tutorial
Wireless Local Area Network (WLAN)
WIMAX Presented By JAGADEESH.S 13X41A0546.
User Interference Effect on Routing of Cognitive Radio Ad-Hoc Networks
Chapter 1: WAN Concepts Connecting Networks
Environment-Aware Reputation Management for Ad Hoc Networks
Congestion Control, Internet transport protocols: udp
NETWORKING TECHNOLOGIES (II)
ANALYSIS OF WIRED EQUIVALENT PRIVACY
Wireless Ad-Hoc Networking
Mobile ad hoc networking: imperatives and challenges
Cognitive Radio Networks
​​​​​​​​Brooklyn, New York, United States, 2 October 2018
basics Richard Dunn CSE July 2, 2003.
Data Communication Networks
Inclusive recruitment and workplaces
EEL 6935 Wireless Ad Hoc Networks
Multiple Access Methods
Chapter One Introduction to Computer Networks and Data Communications
Cross-layer Analysis for detecting Wireless Misbehavior
Communication Networks
Spatial Backoff in Wireless Networks
TV Whitespace Common Functions across IEEE Tutorial
IEEE Wireless Local Area Networks (RF-LANs)
Presentation transcript:

Selfish Misbehavior in Wireless Networks Nitin Vaidya University of Illinois at Urbana-Champaign www.crhc.uiuc.edu/wireless

Increasing Wireless Deployment in Unlicensed Bands Hot-spots Community wireless networks Home networks Sensors …

Users Must Trust the Network “Wired-equivalent” privacy mechanisms Going beyond privacy … Users must be able to rely on “ fair ” competition

} } Unlicensed Bands The New Wild Wild West ? Increasing demand Limited resources Few rules ! Increasingly programmable devices } Incentive for misbehavior } Tools for misbehavior

Impact of Selfish Misbehavior Benefits misbehaving users, at the cost of others Reduces trustworthiness of the network Analogy : Speeding on the highways

Examples of Misbehavior Misbehavior can occur at all layers of the protocol stack

Example: Physical Layer Using unnecessarily high transmit power

Example: Medium Access Control Layer 802.11 a wait-before-you-talk protocol By waiting less than recommended, misbehaving users benefit

Example: Network Layer In mesh networks, misbehaving users may use their links only when convenient to self

Selfish Misbehavior Not unique to wireless networks But … TCP misbehaviors identified in the past But … Wireless brings new challenges Misbehavior more likely in wireless networks due to limited resources

Fundamental Challenges Wireless channel varies over space & time Impossible to detect misbehavior with 100% accuracy How to do “well enough” ? What are the limits on accuracy ?

Fundamental Challenges Misbehavior cannot always be handled at the layer at which it occurs Cross-layer detection & response

Fundamental Challenges Different protocols must co-exist on same slice of wireless spectrum Different protocols don’t necessarily know each other

Research Agenda A Civil Wireless Society Protocol mechanisms to Deter, Detect and Penalize misbehaviors, and Encourage Cooperation Layer-based classification of misbehaviors Determine fundamental limits

Thanks! www.crhc.uiuc.edu/wireless