Countering Selfish Misbehavior in Multi-channel MAC protocols Yan Zhang and Loukas Lazos Dept. of Electrical and Computer Engineering University of Arizona.

Slides:



Advertisements
Similar presentations
Università degli Studi di Firenze 08 July 2004 COST th MCM - Budapest, Hungary 1 Cross-layer design for Multiple access techniques in wireless communications.
Advertisements

Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
Combating the effects of Hidden Terminals in Multi Channel MAC Protocols Mthulisi Velempini.
Duke Selfish MAC Layer Misbehavior in Wireless Networks Author: Pradeep Kyasanur and Nitin H. Vaidya Some slides are borrowed from the author and others.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Nov 2011 Neng Xue Tianxu Wang.
Vivek Raghunathan (joint work with Min Cao, P. R. Kumar) Coordinated Science Laboratory University of Illinois, Urbana-Champaign Exploiting MAC layer diversity.
1 DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas Harkirat Singh & Suresh Singh Portland State University, OR, USA.
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3m: Medium Access Control Protocols.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Receiver-Initiated Channel Hopping (RICH) Makis Tzamaloukas Computer and Communications Research Group (CCRG)
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang, Mario Gerla INFOCOM2003,
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up For Wireless Sensor Networks Zhihui Chen; Ashfaq Khokhar ECE/CS Dept., University of.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
1 TDMA Scheduling in Competitive Wireless Networks Mario CagaljHai Zhan EPFL - I&C - LCA February 9, 2005.
1 Collision-Free Asynchronous Multi-Channel Access in Ad Hoc Networks IEEE Globecom 2009, Hawaii University of California Santa Cruz* Palo Alto Research.
MIMO and TCP: A CASE for CROSS LAYER DESIGN Soon Y. Oh, Mario Gerla Computer Science Dept. University of California, Los Angeles {soonoh,
IEEE Wireless Communication Magazine Design and Performance of an Enhanced IEEE MAC Protocol for Multihop Coverage Extension Frank H.P. Fitzek, Diego.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CCH: Cognitive Channel Hopping in Vehicular Ad Hoc Networks Brian Sung Chul Choi, Hyungjune Im, Kevin C. Lee, and Mario Gerla UCLA Computer Science Department.
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
Khaled Hatem Almotairi and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering University of Waterloo 200 University Avenue West Waterloo,
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
Enhancing TCP Fairness in Ad Hoc Wireless Networks using Neighborhood RED Kaixin Xu, Mario Gerla UCLA Computer Science Department
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
1 MAC Protocols that use Directional Antennnas. 2 Directional Antenna  Directional communication  Less Energy in the wrong direction Better Spatial.
1 Performance Analysis of the Distributed Coordination Function under Sporadic Traffic joint work with C.-F. Chiasserini (Politecnico di Torino)
Multi-Channel MAC for Ad Hoc Networks: Handling Multi- Channel Hidden Terminals Using a Single Transceiver (MMAC) Paper by Jungmin So and Nitin Vaidya.
Fundamentals of Computer Networks ECE 478/578
SEEDEX: A MAC protocol for ad hoc networks R. Rozovsky and P. R. Kumar ACM ACM MobiHoc 2001 speaker: Chien-Wen.
Angular MAC: a framework for directional antennas in wireless mesh networks Erdem Ulukan and Özgür Gürbüz Faculty of Engineering and Natural Sciences,
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
Chih-Min Chao and Yao-Zong Wang Department of Computer Science and Engineering National Taiwan Ocean University, Taiwan IEEE WCNC 2010 A Multiple Rendezvous.
Special Topics in Computer Engineering
1/26 Module C - Part 2 DOMINO Detection Of greedy behavior in MAC layer of IEEE public NetwOrks Prof. JP Hubaux Mobile Networks
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
Chih-Min Chao and Kuo-Hsiang Lu Department of Computer Science and Engineering National Taiwan Ocean University IEEE Sensor Networks, Ubiquitous and Trustworthy.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
Khaled Hatem Almotairi and Xuemin (Sherman) Shen IEEE Globecom 2010 Speak: Huei-Rung, Tsai Symmetrical Power Control for Multi- channel Multi-hop Wireless.
INFOCOM What is MMAC? ▣ Multi-Channel MAC  Channel negotiation and assignment (sender – destination pair)  Destination discovery (same channel)
ECE 256, Spring 2009 __________ Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver __________________.
Multi-Channel MAC Protocol for Multi-Hop Wireless Networks: Handling Multi-Channel Hidden Node Problem Using Snooping Myunghwan Seo, Yonggyu Kim, and Joongsoo.
Tsung-Chin Shih 、 Tsung-Chin Shih 、 Shun-Ren Yang National Tsing Hua University, Hsinchu, Taiwan, R.O.C. IEEE IWCMC 2011 A Cooperative MAC Protocol in.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
A Cooperative Multi-Channel MAC Protocol for Wireless Networks IEEE Globecom 2010 Devu Manikantan Shila, Tricha Anjali and Yu Cheng Dept. of Electrical.
EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks ACM MobiHoc 2011 (Best Paper Award) Lei Tang 1, Yanjun Sun 2,
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
Fen Hou 、 Lin X. Cai, University of Waterloo Xuemin Shen, Rutgers University Jianwei Huang, Northwestern University IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,
Fast and Slow Hopping MAC Protocol for Single-hop Ad Hoc Wireless Networks Khaled Hatem Almotairi, Xuemin (Sherman) Shen Department of Electrical and Computer.
FD-MMAC: Combating Multi-channel Hidden and Exposed Terminals Using a Single Transceiver Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, and Swetha Shivaramaiah.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
Shou-Chih Lo and Chia-Wei Tseng National Dong Hwa University A Novel Multi-channel MAC Protocol for Wireless Ad Hoc Networks VTC 2007-spring.
An Opportunistic Directional MAC Protocol for Multi-hop Wireless Networks with Switched Beam Directional Antennas Osama Bazan and Muhammad Jaseemuddin.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
A Bidirectional Multi-channel MAC Protocol for Improving TCP Performance on Multihop Wireless Ad Hoc Networks Tianbo Kuang and Carey Williamson Department.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Dept. of Computer.
Contention-based protocols with Reservation Mechanisms
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Modified and Presented.
Subject Name: Adhoc Networks Subject Code: 10CS841
Presentation transcript:

Countering Selfish Misbehavior in Multi-channel MAC protocols Yan Zhang and Loukas Lazos Dept. of Electrical and Computer Engineering University of Arizona INFOCOM 2013

Channel Access in Multi-channel Wireless Networks 2 A - D B - E C - F 4/18/2013 Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona A B D E F C F - D A - B E - C C - A B - F D - E F - C B - A E - D f1f1 f2f2 f3f3 collision domain Multiple Tx - Rx pairs within same collision domain share access to a common set of frequency bands -Schedule-based -Contention-based

Prior-Art on Multi-Channel MAC (MMAC) Protocols 34/18/2013 Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona Design goals Allow transmitters to discover the residing frequency of receivers Maximize throughput (aggregate, individual) Ensure fairness Dedicated control channel designs Nodes equipped with multiple radios one of which is always tuned to the control channel Frequency hopping rendezvous designs Nodes rendezvous at different channels via hopping - no contention Split-phase designs Single half-duplex transceiver is assumed

Problem Statement 4 MMAC protocols effectively coordinate access if contenders are benign and protocol-compliant Misbehavior in MMAC Protocols - What if nodes behave selfishly to gain an unfair share of the available channels? - What are the possible misbehaviors and optimal misbehavior strategies? - What is the misbehavior impact on throughput and fairness? - How can this misbehavior be mitigated? - Can misbehaving nodes be identified? 4/18/2013 Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona A-D B-E C-F A-D C-B E-F A-D B-F C-E A-D B-C E-F f1f1 f2f2 f3f3 A-D

Our Contributions 54/18/2013 Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona We study possible misbehaviors in split-phase MMAC designs Backoff Manipulation Attack (BMA) Multi-Reservation Attack (MRA) Combination of both attacks We derive adaptive misbehavior strategies for isolating a desired subset of channels We develop misbehavior mitigation methods that provide fair channel access opportunities We develop misbehavior detection methods that identify the misbehaving nodes

f1f1 RES PCL B f1f1 MED f2f2 f3f3 PCL B f1f1 LOW(1) f2f2 MED f3f3 PCL B f1f1 LOW(1) f2f2 f3f3 MED PCL B f1f1 LOW(1) f2f2 f3f3 HIGH reservation request acknowledgment response Reservations are placed based on a three-way handshake Channel selection criteria: balance traffic load - Preferable Channel List (PCL) REQ ACK RES C- F F(f1)F(f1) A B C C(f1)C(f1)D(f2)D(f2)E(f3)E(f3) A(f2)A(f2) B(f3)B(f3) Control Phase Data Phase A B D E F C MAC for Multi-channel Networks ( MMAC) Split-Phase MMAC Design REQ ACK f2f2 f3f3 A-D B-E f1f1 f2f2 f3f3 4/18/20136 Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona

Node A systematically selects small backoff values to capture the control channel (similar to misbehavior in single-channel MAC protocols) Solutions from the single-channel domain cannot be directly ported Backoff monitors may disperse to multiple channels Sender-monitor pair may collude (e.g., if monitor is a receiver) Backoff Manipulation Attack (BMA) 4/18/20137 Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona REQ ACK RES C-F A C D(f2)D(f2) F(f1)F(f1) A(f2)A(f2) C(f1)C(f1) Control Phase Data Phase A B D E F C A-D f1f1 f2f2 f3f3

Reservations with fictitious nodes I 1, I 2, and I 3 are presumed to be hidden terminals to nodes B to F Multi-reservation Attack (MRA) 4/18/20138 Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona REQ ACK RES F(f 1 ) A C C(f 1 ) D(f 2 ) A(f 2 ) Control Phase A B D E F C C - F f1f1 f2f2 I1I1 I2I2 I3I3 ACK(f 2 ) ACK A(f 2 ) fake reservations REQ ACK RES B E(f 1 ) B(f 1 ) Data Phase f1f1 f2f2 B - E C - F B - E PCL B f1f1 MED f2f2 PCL B f1f1 MED f2f2 LOW(1) PCL B f1f1 MED f2f2 LOW(4) PCL B f1f1 LOW(1) f2f2 LOW(4) PCL B f1f1 HIGH f2f2 LOW(4) A - D

MRA – Incomplete Negotiations 4/18/20139 Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona C D BA REQ(PCL A ) ACK(f 1 ) REQ(PCL A ) ACK(f 1 ) PCL D f1f1 MED f2f2 PCL D f1f1 LOW(1) f2f2 MED

Misbehavior Throughput Advantage in BMA+MRA 20ms control phase (about 8 negotiations/phase ) 30ms control phase (about 12 negotiations/phase ) 4/18/ Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona Simulation setup (OPNET) - Single-hop network, 10 well-behaved pairs, 1 misbehaving pair - 3 orthogonal channels of 2Mbps, data phase: 80ms - Poisson distributed traffic with parameter λ

Adaptive Misbehavior Strategy To isolate n m out of n channels: Step 1: Place n m reservations on n m channels of choice Step 2: Allow for (n - n m ) reservations from other pairs Step 3: Repeat Steps 1 and 2 E.g., n = 3, n m = 1 4/18/ Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona reservations from misbehaving node RSV W RSV M RSV W …… reservations from well-behaved nodes RSV M RSV W PCL X f1f1 MED f2f2 f3f3 PCL X f1f1 LOW(1) f2f2 MED f3f3 PCL X f1f1 LOW(1) f2f2 f3f3 PCL X f1f1 LOW(2) f2f2 LOW(1) f3f3 PCL X f1f1 LOW(2) f2f2 f3f3

Evaluation of Adaptive Misbehavior Adaptive strategy requires significantly less reservations than placing a fixed # of reservations a priori collisions 4/18/ Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona d: fixed # of reservations for guaranteeing isolation of one channel

Detection of BMA – Backoff Generation Module number of retransmissions 4/18/ Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona G s i seed G(q i, s i ) in [0,1] Node i publishes a random seed s i used to compute its random backoff times q i : packet # Backoff for the q i th packet from i

Detection of BMA – Backoff Monitoring Module 4/18/ Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona Control PhaseData Phase f1f1 f2f2 f3f3 REQ (1,0) ACK RES (1,0) RES (1,0) RTS (2,0) RTS (2,0) CTS DATA ACK Monitored backoff < b I (1,0) ? Monitored backoff < b i (2,0)? Transmitting node includes (q i, r i ) with every control packet transmitted during the control and data phases Monitoring nodes keep track of (q i, r i ) and identify misbehaving nodes based on b i (q i, r i )

Manipulation of (q i, r i ) 4/18/ Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona Scenario A: Misbehaving node i avoids incrementation of (q i, r i ) if its REQ collides Collisions are receiver-dependent – another neighbor may have successfully received REQ(q i, r i ) A B F C D REQ(q A, r A ) Scenario B: Misbehaving node i takes advantage of other collisions to advance q i by k (k > 1), with G(q i + k, s i ) << G(q i,+1 s i ) With the advancement of q by k, r must also advance by k. Delay for k collisions/backoffs must be added to backoff delay

Mitigation of MRA – Modified PCL Rules 4/18/ Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona ACK RES F(f 1 ) A C C(f 1 ) D(f 2 ) A(f 2 ) Control Phase A B D E F C f1f1 f2f2 I1I1 I2I2 I3I3 ACK(f 2 ) ACK A(f 2 ) fake reservations ACK RES B E(f 2 ) B(f 2 ) PCL B f1f1 MED f2f2 PCL B f1f1 MED f2f2 LOW(1) PCL B f1f1 LOW(1) f2f2 PCL B f1f1 LOW(1) f2f2 HIGH A source can change the priority of a channel at most once per control phase Misbehaving node A does not isolate f 2 ATIM

Mitigation of MRA – Secure Neighbor Discovery Discover 2-hop topology and record hidden terminals F is hidden terminal to all but M  M is suspected of misbehavior Execute challenge-response between A and F 4/18/ Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona Detecting fictitious sources F M A B D C Topological information n: direct neighbor, h: non-direct neighbor

Effect of Mitigation Techniques 4/18/ Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona

Conclusions and Future Work Studied the impact of misbehavior on split-phase MMAC protocols Derived adaptive misbehavior strategies which are able to monopolize a desired subset of channels 4/18/ Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona Future work Investigate misbehavior strategies for dedicated control channel and frequency hopping MMAC designs Couple misbehavior detection with a reputation system Proposed detection/mitigation schemes that identify misbehaving nodes and further provide fair channel access opportunities

Thank you! 4/18/2013 Yan Zhang and Loukas Lazos, INFOCOM 2013, Univ. of Arizona 20