Chapter 9: Selfish behavior at the MAC layer of CSMA/CA

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Contents IEEE MAC layer operation Basic CSMA/CA operation
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Module C- Part 1 WLAN Performance Aspects
IEEE b Wireless LANs Carey Williamson Department of Computer Science University of Calgary.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Mobile Communications: Wireless LANs Mobile Communications Chapter 7: Wireless LANs  Characteristics  IEEE  PHY  MAC  Roaming  HIPERLAN.
Network Technology CSE Network Technology CSE3020 Week 9.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
P. Bhagwat Specification overview. P. Bhagwat Specifications PLCP Sublayer PHY layer Management PMD Sublayer MAC sublayer MAC Layer Management.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
specifications overview Specifications MAC  Specification of layers below LLC  Associated management/control interfaces MIB Control Applications.
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 5 outline 5.1 Introduction and services
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture #2 Chapter 14 Wireless LANs.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Opersating Mode DCF: distributed coordination function
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Lecture 4 Wireless Medium Access Control
CWNA Guide to Wireless LANs, Second Edition
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
Chapter 6 Multiple Radio Access
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
1/26 Module C - Part 2 DOMINO Detection Of greedy behavior in MAC layer of IEEE public NetwOrks Prof. JP Hubaux Mobile Networks
Ch 14. Wireless LANs IEEE Specification for a wireless LAN – Cover physical and data link layers Basic service sets (BSS) and extended service.
An Introduction to Wireless LANs
Planning and Analyzing Wireless LAN
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Performance Characterization of Voice over Wireless LANs Lionel PEREZ August 3rd, 2005.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Wireless MAC.
CSE 4215/5431: Mobile Communications Winter 2011
Specification overview
Chapter 6 Medium Access Control Protocols and Local Area Networks
CSE 4215/5431: Mobile Communications Winter 2010
Specification overview
Self Organized Networks
Specification overview
Specification overview
Performance Evaluation of an Integrated-service IEEE Network
Specification overview
Specification overview
Specification overview
Presentation transcript:

Chapter 9: Selfish behavior at the MAC layer of CSMA/CA operating principles of IEEE 802.11; detecting selfish behavior in hot spots; selfish behavior in pure ad hoc networks;

Chapter outline 9.1 Operating principles of IEEE 802.11 9.2 Detecting selfish behavior in hotspots 9.3 Selfish behavior in pure ad hoc networks

Infrastructure vs. ad hoc networks Infrastructure network AP: Access Point AP AP wired network AP Ad hoc network Note: Slides 3 to 14 are derived from the slide show of the book “Mobile Communications” by Jochen Stiller, Addison-Wesley, 2003 9.1 Operating principles of IEEE 802.11

IEEE 802.11 - Architecture of an infrastructure network Station (STA) terminal with access mechanisms to the wireless medium and radio contact to the access point Basic Service Set (BSS) group of stations using the same radio frequency Access Point station integrated into the wireless LAN and the distribution system Portal bridge to other (wired) networks Distribution System interconnection network to form one logical network (ESS: Extended Service Set) based on several BSS 802.11 LAN 802.x LAN STA1 BSS1 Portal Access Point Distribution System Access Point ESS BSS2 STA2 STA3 802.11 LAN 9.1 Operating principles of IEEE 802.11 9

802.11 - Architecture of an ad-hoc network Direct communication within a limited range Station (STA): terminal with access mechanisms to the wireless medium Basic Service Set (BSS): group of stations using the same radio frequency 802.11 LAN STA3 STA1 BSS1 STA2 802.11 LAN BSS2 STA5 STA4 9.1 Operating principles of IEEE 802.11

Interconnection of IEEE 802.11 with Ethernet fixed terminal mobile station server infrastructure network access point application application TCP TCP IP IP 802.11 MAC 802.11 MAC 802.3 MAC 802.3 MAC 802.11 PHY 802.11 PHY 802.3 PHY 802.3 PHY 9.1 Operating principles of IEEE 802.11

802.11 - Layers and functions MAC MAC Management access mechanisms, fragmentation, encryption MAC Management synchronization, roaming, MIB, power management PLCP (Physical Layer Convergence Protocol) clear channel assessment signal (carrier sense) PMD (Physical Medium Dependent) modulation, coding PHY Management channel selection, MIB Station Management coordination of all management functions Station Management IP MAC MAC Management PLCP PHY Management PHY PMD 9.1 Operating principles of IEEE 802.11

802.11 - Physical layer 3 versions: 2 radio: DSSS and FHSS (both typically at 2.4 GHz), 1 IR data rates 1, 2, 5 or 11 Mbit/s DSSS (Direct Sequence Spread Spectrum) DBPSK modulation (Differential Binary Phase Shift Keying) or DQPSK (Differential Quadrature PSK) chipping sequence: +1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1 (Barker code) max. radiated power 1 W (USA), 100 mW (EU), min. 1mW FHSS (Frequency Hopping Spread Spectrum) spreading, despreading, signal strength min. 2.5 frequency hops/s, two-level GFSK modulation (Gaussian Frequency Shift Keying) Infrared 850-950 nm, diffuse light, around 10 m range carrier detection, energy detection, synchronization 9.1 Operating principles of IEEE 802.11

802.11 - MAC layer principles (1/2) Traffic services Asynchronous Data Service (mandatory) exchange of data packets based on “best-effort” support of broadcast and multicast Time-Bounded Service (optional) implemented using PCF (Point Coordination Function) Access methods (called DFWMAC: Distributed Foundation Wireless MAC) DCF CSMA/CA (mandatory) collision avoidance via randomized „back-off“ mechanism minimum distance between consecutive packets ACK packet for acknowledgements (not for broadcasts) DCF with RTS/CTS (optional) avoids hidden terminal problem PCF (optional) access point polls terminals according to a list DCF: Distributed Coordination Function PCF: Point Coordination Function 9.1 Operating principles of IEEE 802.11

802.11 - MAC layer principles (2/2) Priorities defined through different inter frame spaces no guaranteed, hard priorities SIFS (Short Inter Frame Spacing) highest priority, for ACK, CTS, polling response PIFS (PCF IFS) medium priority, for time-bounded service using PCF DIFS (DCF, Distributed Coordination Function IFS) lowest priority, for asynchronous data service DIFS DIFS PIFS SIFS medium busy contention next frame t direct access if medium is free  DIFS time slot Note : IFS durations are specific to each PHY 9.1 Operating principles of IEEE 802.11

802.11 - CSMA/CA principles contention window (randomized back-off mechanism) DIFS DIFS medium busy next frame direct access if medium has been free for at least DIFS t time slot station ready to send starts sensing the medium (Carrier Sense based on CCA, Clear Channel Assessment) if the medium is free for the duration of an Inter-Frame Space (IFS), the station can start sending (IFS depends on service type) if the medium is busy, the station has to wait for a free IFS, then the station must additionally wait a random back-off time (collision avoidance, multiple of slot-time) if another station occupies the medium during the back-off time of the station, the back-off timer stops (to increase fairness) 9.1 Operating principles of IEEE 802.11 12

802.11 – CSMA/CA broadcast = DIFS DIFS DIFS DIFS boe bor boe bor boe busy station1 boe busy station2 busy station3 boe busy (detection by upper layer) station4 boe bor boe busy (detection by upper layer) station5 t Here St4 and St5 happen to have the same back-off time busy medium not idle (frame, ack etc.) boe elapsed backoff time packet arrival at MAC bor residual backoff time The size of the contention window can be adapted (if more collisions, then increase the size) Note: broadcast is not acknowledged

802.11 - CSMA/CA unicast Sending unicast packets station has to wait for DIFS before sending data receiver acknowledges at once (after waiting for SIFS) if the packet was received correctly (CRC) automatic retransmission of data packets in case of transmission errors DIFS data sender SIFS ACK receiver DIFS data other stations NAV (DATA) t waiting time Contention window The ACK is sent right at the end of SIFS (no contention) NAV: Net Allocation Vector 9.1 Operating principles of IEEE 802.11

802.11 – DCF with RTS/CTS Sending unicast packets station can send RTS with reservation parameter after waiting for DIFS (reservation determines amount of time the data packet needs the medium) acknowledgement via CTS after SIFS by receiver (if ready to receive) sender can now send data at once, acknowledgement via ACK other stations store medium reservations distributed via RTS and CTS DIFS RTS data sender SIFS SIFS SIFS CTS ACK receiver DIFS NAV (RTS) data other stations NAV (CTS) t defer access Contention window RTS/CTS can be present for some packets and not for other NAV: Net Allocation Vector 9.1 Operating principles of IEEE 802.11

Chapter outline 9.1 Operating principles of IEEE 802.11 9.2 Detecting selfish behavior in hotspots 9.3 Selfish behavior in pure ad hoc networks

Section outline Motivation System model Misbehavior techniques Components of DOMINO (System for Detection Of greedy behavior in the MAC layer of IEEE 802.11 public NetwOrks) Simulation Implementation Related work Conclusion 9.2 Detecting selfish behavior in hotspots

Motivation How to detect? Internet access through public hotspots Problem: misuse of protocols What about MAC-layer misbehavior? Considerable bandwidth gains Hidden from the upper layers Always usable If the misbehavior is detected, the WISP can take measures How to detect? 9.2 Detecting selfish behavior in hotspots

System model Infrastructure mode DCF (Distributed Coordination Function) Single trusted AP operated by a WISP Misbehavior is greedy as opposed to malicious DOMINO is implemented only at the AP 9.2 Detecting selfish behavior in hotspots

Example scenario DOMINO Well-behaved node Cheater Well-behaved node 9.2 Detecting selfish behavior in hotspots

IEEE 802.11 MAC – Brief reminder 9.2 Detecting selfish behavior in hotspots

Misbehavior techniques – Overview Uplink traffic (stations AP) Example scenarios: backup, webcam, … Downlink traffic (AP stations) Constitutes most of the wireless traffic Over 90% is TCP Example scenarios: Web browsing, FTP, video streaming, … 9.2 Detecting selfish behavior in hotspots 9.2.1 Misbehavior techniques

Uplink traffic – Frame scrambling 9.2 Detecting selfish behavior in hotspots 9.2.1 Misbehavior techniques

Solution: Number of retransmissions Lost frames are retransmitted Sequence numbers in the MAC header distinguish retransmissions Cheater’s retransmissions are fewer than those of well-behaved stations By counting retransmissions, the AP can single out the cheater 9.2 Detecting selfish behavior in hotspots 9.2.2 A possible solution: DOMINO

Uplink traffic – Oversized NAV 9.2 Detecting selfish behavior in hotspots 9.2.1 Misbehavior techniques

Solution: Comparison of NAVs AP measures the actual NAV and compares to the received one A repeated pattern of oversized NAVs distinguishes the cheater 9.2 Detecting selfish behavior in hotspots 9.2.2 A possible solution: DOMINO

Uplink traffic – Short DIFS 9.2 Detecting selfish behavior in hotspots 9.2.1 Misbehavior techniques

Solution: Comparison of DIFS The value of DIFS is constant and provided by the IEEE 802.11 standard A short DIFS cannot be but the result of cheating 9.2 Detecting selfish behavior in hotspots 9.2.2 A possible solution: DOMINO

Uplink traffic – Backoff 9.2 Detecting selfish behavior in hotspots 9.2.1 Misbehavior techniques

Solution (1/2): Actual backoff test Compares the average actual backoff of each station to the average actual backoff of the AP Collisions are not taken into account Unsuitable for sources with interframe delays (e.g., due to TCP congestion control) 9.2 Detecting selfish behavior in hotspots 9.2.2 A possible solution: DOMINO

Solution (2/2): Consecutive backoff test Useful when cheaters have interframe delays (mainly TCP sources) Does not work if the traffic is very high due to the lack of samples Complementary to the actual backoff test 9.2 Detecting selfish behavior in hotspots 9.2.2 A possible solution: DOMINO

Downlink traffic – TCP ACK scrambling Server receives no TCP ACK and slows down the TCP flow Repeated scrambling kills the TCP connection The AP receives less packets destined to the well-behaved station Packets destined to the cheater are delayed less in AP’s queue 9.2 Detecting selfish behavior in hotspots 9.2.1 Misbehavior techniques

TCP DATA scrambling with MAC forging Tries to kill the TCP connection like the previous attack MAC ACK contains no source address The forged MAC ACK prevents the AP from retransmitting the lost packet 9.2 Detecting selfish behavior in hotspots 9.2.1 Misbehavior techniques

Solution: Dummy frame injection AP periodically injects dummy frames destined to non- existing stations If it receives corresponding MAC ACKs, there is cheating Higher-layer mechanisms will identify the cheater (e.g., by monitoring the TCP flows of stations) 9.2 Detecting selfish behavior in hotspots 9.2.2 A possible solution: DOMINO

Components of DOMINO Cheating method Detection test Frame scrambling Number of retransmissions Oversized NAV Comparison of the declared and actual NAV values Transmission before DIFS Comparison of the idle time after the last ACK with DIFS Backoff manipulation Actual backoff Consecutive backoff Frame scrambling with MAC forging Periodic dummy frame injection 9.2 Detecting selfish behavior in hotspots 9.2.2 A possible solution: DOMINO

Simulation – Topology ns-2 Backoff manipulation CBR / UDP traffic FTP / TCP traffic misbehavior coefficient (m): cheater chooses its backoff from the fixed contention window (1 - m) x CWmin 9.2 Detecting selfish behavior in hotspots 9.2.3 Simulation results

Simulation – DOMINO performance – UDP case 9.2 Detecting selfish behavior in hotspots 9.2.3 Simulation results

Simulation – DOMINO performance – TCP case 9.2 Detecting selfish behavior in hotspots 9.2.3 Simulation results

Implementation Equipment Misbehavior (backoff) Monitoring Adapters based on the Atheros AR5212 chipset MADWIFI driver Misbehavior (backoff) Write to the register containing CWmin and CWmax (in driver) Monitoring The driver in MONITOR mode prism2 frame header 9.2 Detecting selfish behavior in hotspots 9.2.4 Implementation

Implementation – Throughput 9.2 Detecting selfish behavior in hotspots 9.2.4 Implementation

Implementation – Backoff and DOMINO 9.2 Detecting selfish behavior in hotspots 9.2.4 Implementation

Discussion Hidden terminals Security Adaptive cheating Overhead Well-chosen detection thresholds can reduce false positives Security Hybrid attacks: limited efficiency Adaptive cheating Hard to implement Overhead Negligible 9.2 Detecting selfish behavior in hotspots 9.2.4 Discussion

Related work Detection at the MAC layer (Kyasanur and Vaidya, DSN’03) Concept: the receiver assigns backoff values to the sender Detection: compares expected and observed backoffs Correction: assigns penalty to the cheater Issues: Modification of IEEE 802.11 The receiver can control the sender Communication and computation overhead 9.2 Detecting selfish behavior in hotspots

Conclusion on Section 9.2 MAC-layer greedy behavior can be a serious problem DOMINO is a simple and efficient solution compatible with the existing infrastructure DOMINO can be seamlessly integrated with existing WiFi security tools to provide ultimate protection First proof-of-concept implementation prototype http://domino.epfl.ch 9.2 Detecting selfish behavior in hotspots

Chapter outline 9.1 Operating principles of IEEE 802.11 9.2 Detecting selfish behavior in hotspots 9.3 Selfish behavior in pure ad hoc networks

Section outline System Model and Assumptions Bianchi’s Model Static CSMA/CA Game Repeated CSMA/CA Game Implementation 9.3 Selfish behavior in pure ad hoc networks

9.3.1 System Model and Assumptions Ad hoc mode (no access point) N wireless nodes transmit to N receivers (N links) Any node can hear any other node (single-collision domain) IEEE 802.11 CSMA/CA MAC layer Bianchi’s Model for throughput calculation Cheater Well-behaved 9.3 Selfish behavior in pure ad hoc networks 9.3.1 System Model and Assumptions

Bianchi’s Model: Topology and Parameters N links with the same physical condition (single-collision domain): 3 2 4 1 2 3 N 1 AP N-2 N N-1 PHY Layer MAC Layer P p = Probability of Transmission = Probability of Collision = More than one transmission at the same time = 1 – (1- p)N-1 9.3 Selfish behavior in pure ad hoc networks Bianchi’s Model

Bianchi’s Model: Two Dimensional Markov chain (s(t), b(t)) (Backoff Stage, Backoff Timer) 9.3 Selfish behavior in pure ad hoc networks Bianchi’s Model

Bianchi’s Model: Two Dimensional Markov chain Stationary distribution: Probability of transmission: 9.3 Selfish behavior in pure ad hoc networks Bianchi’s Model

Bianchi’s Model: Two Dimensional Markov chain Successful Transmission 9.3 Selfish behavior in pure ad hoc networks Bianchi’s Model

Bianchi’s Model: Two Dimensional Markov chain Collision 9.3 Selfish behavior in pure ad hoc networks Bianchi’s Model

Bianchi’s Model: Stationary Distribution of Chain bi,0 = p bi-1,0 ( i , ) 1 2 CW - p / bm,0 = p bm-1,0 + p bm,0 9.3 Selfish behavior in pure ad hoc networks Bianchi’s Model

Bianchi’s Model: Solution for p and p After some derivations  system of two nonlinear equations with two variables p and p:  Can be solved numerically to obtain p and p 9.3 Selfish behavior in pure ad hoc networks Bianchi’s Model

Bianchi’s model: Throughput Calculation Throughput of node i: Pis: Probability of successful transmission of i during a random time slot L: Average packet payload size Ts: Average time to transmit a packet of size L Pid: Probability of the channel being idle Tid: Duration of the idle period Pc: Probability of collision Tc: Average time of collision 9.3 Selfish behavior in pure ad hoc networks Bianchi’s Model

9.3.2 CSMA/CA Game: GCSMA/CA A single cheater Selfish Tends to use the full channel capacity Does not respect the binary exponential backoff Keeps her W after a collision unchanged (m=0) Strategy set: Payoff function: 9.3 Selfish behavior in pure ad hoc networks 9.3.2 CSMA/CA Game

GCSMA/CA : cheaters payoff function Access probability of cheater i: Throughput of cheater i: . If for all j in P\{i}: strict inequality, so throughput: strictly decreasing function of Wi by unilaterally decreasing its own Wi: a selfish node can increase its throughput 9.3 Selfish behavior in pure ad hoc networks 9.3.2 CSMA/CA Game

Model Verification 9.3 Selfish behavior in pure ad hoc networks 9.3.2 CSMA/CA Game

NE of the GCSMA/CA Lemma 9.1: For any strategy profile W that constitutes a NE, such that Wi = 1 Theorem 9.1: GCSMA/CA admits exactly NEs. 9.3 Selfish behavior in pure ad hoc networks 9.3.2 CSMA/CA Game

NE of the GCSMA/CA Define: D = {i: Wi=1, i Є P} Two families of NE: |D|=1: only one player receives a non-null throughput and throughput = 0 for all others |D|>1: throughput = 0 for all players. Some NE from the first family are Pareto optimal. Example: W = (W1=1, W2=W∞, …, W|P|=W∞) is a Pareto optimal NE NE of the 2nd family: tragedy of the commons (misuse of the public good). 9.3 Selfish behavior in pure ad hoc networks 9.3.2 CSMA/CA Game

Uniqueness, Fairness and Pareto Optimality two families of NE: 1st: great unfairness, a single player gets some positive payoff 2nd: highly inefficient NE, zero payoff for every player none is satisfactory A desirable solution: Uniqueness Pareto optimality Fairness 9.3 Selfish behavior in pure ad hoc networks 9.3.2 CSMA/CA Game

Uniqueness, Fairness and Pareto Optimality Transformation of the Pareto-optimal point to a NE: Repeated games Selective jamming 9.3 Selfish behavior in pure ad hoc networks 9.3.2 CSMA/CA Game

9.3.3 Repeated CSMA/CA Game: G∞CSMA/CA G∞CSMA/CA = GCSMA/CA played repeatedly T times. Payoff function: the cheaters’ per stage payoff function change to pf: penalty function 9.3 Selfish behavior in pure ad hoc networks 9.3.3 Repeated CSMA/CA Game

Penalty Function Penalty function: if: Then ui has a unique maximizer . (Lemma 9.2) 9.3 Selfish behavior in pure ad hoc networks 9.3.3 Repeated CSMA/CA Game

Subgame Perfect NE (SPNE) of G∞CSMA/CA Theorem 9.4: The strategy profile is a SPNE of the G∞CSMA/CA. Corollary 9.1: any strategy profile such that can be made a SPNE. 9.3 Selfish behavior in pure ad hoc networks 9.3.3 Repeated CSMA/CA Game

Making W* a NE: practical penalty function Two players k and i k selectively jams i if k calculates the penalty to be inflicted on i: ui has a unique maximizer: so, , i.e. is a unique NE. equal payoffs for two players at NE. 9.3 Selfish behavior in pure ad hoc networks 9.3.3 Repeated CSMA/CA Game

Example: Penalization 9.3 Selfish behavior in pure ad hoc networks 9.3.3 Repeated CSMA/CA Game

9.3.4 Implementation: Detection Mechanism each cheating node measures the throughput of all the others. cheater j is deviating if for Tobs. 9.3 Selfish behavior in pure ad hoc networks 9.3.4 Implementation

Adaptive Strategy When cheater i is jammed (penalized) during Δ: increases her W by steps of size γ. 9.3 Selfish behavior in pure ad hoc networks 9.3.4 Implementation

Reaching the Pareto-optimal Point Wi=Winit for all cheaters Every cheater sets up a random timer to increase her W by γ. X increase her W to Wxinit + γ. X detects all other cheaters as deviating: begin penalizing them. Penalized cheater: disable the timer and use the adaptive strategy system will stabilize, when Wiinit = Wiinit + γ for all. Then, every cheater compares her new throughput with previous: if a decrease in throughput: terminate the search for W* Otherwise: increase her W by γ. 9.3 Selfish behavior in pure ad hoc networks 9.3.4 Implementation

Fully Distributed Implementation 7 cheaters step size = 5 9.3 Selfish behavior in pure ad hoc networks 9.3.4 Implementation

Fully Distributed Implementation 9.3 Selfish behavior in pure ad hoc networks 9.3.4 Implementation

Summary of Section 9.3 Addressed the Problem of cheating in single collision domain CSMA/CA networks Formalism for the systematic study of rational cheating in CSMA/CA ad hoc networks Single cheater as well as several cheaters acting without restraint Transformation of the Pareto optimal point into a Subgame Perfect Nash Equilibrium (repeated games) Smart cheaters can collectively find this point 9.3 Selfish behavior in pure ad hoc networks

Conclusion on Chapter 9 Selfish behavior is relatively easy to implement at the MAC layer Upcoming technologies such as cognitive radios will further facilitate this kind of misbehavior In the case of IEEE 802.11, we have shown how to thwart it, both from the engineering and the analytical points of view.