Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,

Slides:



Advertisements
Similar presentations
Cooperative Transmit Power Estimation under Wireless Fading Murtaza Zafer (IBM US), Bongjun Ko (IBM US), Ivan W. Ho (Imperial College, UK) and Chatschik.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
A Centralized Scheduling Algorithm based on Multi-path Routing in WiMax Mesh Network Yang Cao, Zhimin Liu and Yi Yang International Conference on Wireless.
MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
Duke Selfish MAC Layer Misbehavior in Wireless Networks Author: Pradeep Kyasanur and Nitin H. Vaidya Some slides are borrowed from the author and others.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Evaluate IEEE e EDCA Performance Tyler Ngo CMPE 257.
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
IEEE OpComm 2006, Berlin, Germany 18. September 2006 A Study of On-Off Attack Models for Wireless Ad Hoc Networks L. Felipe Perrone Dept. of Computer Science.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
Opportunistic Packet Scheduling and Media Access Control for Wireless LANs and Multi-hop Ad Hoc Networks Jianfeng Wang, Hongqiang Zhai and Yuguang Fang.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Prenseted by Ronak Bhuta Date : October 9, 2007 Kaixin Xu Mario Gerla Lantao.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
Copyright: UC Riverside Alleviating the effects of mobility on TCP Performance Signal Strength based Link Management Fabius Klemm *, Srikanth Krishnamurthy.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Elec 599 Report: Modeling Media Access in Embedded Two-Flow Topologies of Multi-hop Wireless Networks Jingpu Shi Advisor: Dr. Edward Knightly Department.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Delay Analysis of IEEE in Single-Hop Networks Marcel M. Carvalho, J.J.Garcia-Luna-Aceves.
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
Selecting Transmit Powers and Carrier Sense Thresholds in CSMA Jason Fuemmeler, Nitin Vaidya, Venugopal Veeravalli ECE Department & Coordinated Science.
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
Enhancing TCP Fairness in Ad Hoc Wireless Networks using Neighborhood RED Kaixin Xu, Mario Gerla UCLA Computer Science Department
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Improving Loss Resilience with Multi- Radio Diversity in Wireless Networks by Allen Miu, Hari Balakrishnan and C.E. Koksal Appeared in ACM MOBICOM 2005,
1/26 Module C - Part 2 DOMINO Detection Of greedy behavior in MAC layer of IEEE public NetwOrks Prof. JP Hubaux Mobile Networks
Planning and Analyzing Wireless LAN
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Rami Melhem Sameh Gobriel & Daniel Mosse Modeling an Energy-Efficient MAC Layer Protocol.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
Spectrum Sensing In Cognitive Radio Networks
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
On Mitigating the Broadcast Storm Problem with Directional Antennas Sheng-Shih Wang July 14, 2003 Chunyu Hu, Yifei Hong, and Jennifer Hou Dept. of Electrical.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
Countering Selfish Misbehavior in Multi-channel MAC protocols Yan Zhang and Loukas Lazos Dept. of Electrical and Computer Engineering University of Arizona.
Selfish MAC Layer Misbehavior in Wireless Networks ECE 299, Karthik Balasubramanian February 8, 2007 Nitin Vaidya and Pradeep Kyasanur.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
Performance Enhancement of Multirate IEEE WLANs with Geographically Scattered Stations 1 Duck-Yong Yang, 2 Tae-Jin Lee, 3 Kyunghun Jang, 3 Jin-Bong.
Wireless LANs Wireless proliferating rapidly.
TCP and MAC interplay in Wireless Ad Hoc Networks
Presented by Jason L.Y. Lin
Self Organized Networks
The Fundamental Role of Hop Distance in IEEE 80
Javad Ghaderi, Tianxiong Ji and R. Srikant
A Study of On-Off Attack Models for Wireless Ad Hoc Networks
Presentation transcript:

Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar, and Dharmaiah Manjunath Dept. of Computer Science & Engineering, UC Riverside Dept. of Electrical Engineering, Indian Institute of Technology - Mumbai ICDCS 2006

Problem Malicious nodes can cause a denial of service attack by simply manipulating the back-off timers prior to a transmission. –By not adhering to the IEEE standard. –By choosing a small/constant back-off interval prior to a transmission. Consequences: –Misbehaving nodes can gain an unfair advantage by acquiring the wireless channel more often. –Causing bandwidth starvation of the well-behaved nodes.

Motivation The lack of centralized arbiter (such as an access point) makes it hard to detect timer violations. Can we design a distributed framework to –discourage such attacks and, –detect such attacks and identify the misbehaving attackers?

Contributions We propose a combination of deterministic and statistical methods that facilitate our objectives. Only involve minor changes to the standard. Our performance evaluations shows that with our methods, it is possible to detect a malicious node with a probability close to one. Furthermore, the probability of false alarms (wrongly classifying a node as a misbehaving node) is lower than 1%.

Roadmap The System Model Our Proposed Framework Simulation Results Conclusions

System Model Using Verifiable Back-off timers –Use a deterministic/known sequence of back-off values that each node has to follow. –Each node announces the state of its pseudo-random sequence generator in the RTS messages. Each node is aware of the back-off timers used by its neighbors. Making Sense of the Uncertainty in System State –Due to the interference effects, a node may not be able to deterministically ascertain the legitimacy of the back-off patterns of a neighbor. –Therefore, it estimates the probability of the neighbor’s misbehavior statistically based on observed patterns.

Estimating the system state of neighbors Goal: To allow a monitoring node to estimate the back-off timers used by its neighbors. Example: Let’s node R be monitoring node S –R wants to determine if S is misbehaving -- how? –R will estimate the system state of S and compare it with the value announced by S. System state: The number of idle (I) / busy (B) slots of the monitored node (i.e., node S) in a period of N observed slots. R can approximately estimate the number of idle (I est ) and busy (B est ) slots observed by S: Prob(S senses idle | R senses idle) Prob(S senses idle | R senses busy)

Determining P I/I and P I/B analytically Assumptions: –Only the interference effects within a two-hop neighborhood are considered. –Nodes are uniformly distributed. –The steady state load experienced by all nodes within the two hops radius are identical. (Due to the fairly large interference radius) –Node is aware of the position of its neighbors. The areas of A2, A3, A4 and A5 can be easily computed. The area A1 can be estimated by assuming a minimum overlap between S S and S R. Sx: sensing range of node x Tx: transmission range of node x n nodes k nodes Node R is monitoring node S

Determining P I/I Deriving P B/I : Prob(S senses busy | R senses idle) –For R to sense idle No transmission can occur in A3, A4 and A5 However, transmissions can occur in A1  A2 –For S to sense busy Transmissions can only occur in A2 n nodes k nodes Probability that at least one node transmits in A1  A2. Probability that the transmission occurs in A2.

Determining P I/B Deriving P I/B : Prob(S senses idle | R senses busy) –For S to sense idle No transmission can occur in A2, A3 and A4 However, transmissions can occur in A1 and A5 –For R to sense busy Transmissions can only occur in A5 Probability that transmissions occur in A5. Probability that S senses the channel to be idle. n nodes k nodes

Our proposed framework Let us call the node being monitored the tagged node. Overview of the approach: The monitoring node obtains the pseudo-random sequence generator announced by the tagged node. The monitoring node can compare the expected back-off times of the tagged node and the announced back-off times. In some cases, the monitoring node cannot deterministically determine if the tagged node is misbehaving (due to interference). Therefore, the monitoring node uses a hypothesis test (Wilcoxon rank sum test) based on the estimation of P I/I and P I/B, to determine if the tagged node is misbehaving.

Details of the proposed framework The seed of the pseudo-random number generator (PRNG) –The MAC address of the node. Simple modification to the RTS message –SeqOff#: The offset to the PRNG. Increment by one upon each transmission. –Attempt#: The number of retransmission attempts. –MD: The message digest of the DATA packet. To prevent nodes from cheating on the Attempt#. The wilcoxon rank sum test –Two populations: “x” be the sequential population of the dictated sequence of the back-off timers; “y” be the sequential population of the estimated sequence of the back-off timers. –Use the rank sum test to compute the significance probability p of the two populations. –If p is small, the tagged node is likely to be malicious.

Simulation Set up NS-2 simulator with extension of our framework. Shadow channel fading model is considered. Poisson and CBR traffic. Grid and Random topologies. Static and Mobility scenarios. Parameters of interest: –Traffic intensity –Percentage of Misbehavior (PM) Metrics of interest: –Probability of correct diagnosis.

Analysis v.s. Simulation: on P I/B and P B/I Two scenarios: –Grid topology with Poisson traffic –Random topology with CBR traffic Monitoring and tagged nodes are one-hop away and are placed at the center of the simulation area. All nodes are well behaved. The analysis results match with the simulation results. –Justify the assumptions that we made earlier Poisson traffic, Grid topology CBR traffic, Random topology

Probability of correct diagnosis Percentage of misbehavior (PM) of m% means a malicious node transmits a packet after counting down to (100-m)% of the dictated back-off value. The probability of detecting misbehavior is close to one when the PM is large and the sample size is large. In scenario with mobility, a larger number samples is required for convergence as compared to the case with no mobility. Static grid topology With mobility

Probability of misdiagnosis The misdiagnosis probability is very low (<0.01) even when the sample size is 10. The misdiagnosis probability decreases drastically when the sample size is increased. With smaller load, the misdiagnosis probability is usually higher. This is because a longer time is needed to detect misbehavior. Static grid scenario Mobility scenario, Load=0.6

Conclusions In this work, we focus on the problem of detecting back- off timer violations with the IEEE MAC. We propose a framework that is based on a combination of deterministic and statistical methods to discern timer violations by neighboring nodes. Our extensive simulations show that our protocol can provide accurate assessments of the node misbehavior within short periods and with extremely low probability of false alarms.