Cyclex An Efficient Cheating-Resistant MAC Protocol Jim Pugh Mentors: Imad Aad, Mario Čagalj, Prof. Jean-Pierre Hubaux.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Ethernet – CSMA/CD Review
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Lecture 9: Multiple Access Protocols
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
Doc.: IEEE b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Medium Access Control in Wireless Sensor Networks.
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
Module C- Part 1 WLAN Performance Aspects
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Teknik Akses Jaringan Carrier Sense Pertemuan 12 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
An Energy-efficient MAC protocol for Wireless Sensor Networks
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Opersating Mode DCF: distributed coordination function
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He J. Sobrinho and A. krishnakumar.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
CWNA Guide to Wireless LANs, Second Edition
An Energy-Efficient MAC Protocol for Wireless Sensor Networks (S-MAC) Wei Ye, John Heidemann, Deborah Estrin.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 21 February 2005.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi- Channel Hidden Terminals Using a Single Transceiver (MMAC) Paper by Jungmin So and Nitin Vaidya.
Medium Access Control Sub Layer
Chapter 6 Multiple Radio Access
1/26 Module C - Part 2 DOMINO Detection Of greedy behavior in MAC layer of IEEE public NetwOrks Prof. JP Hubaux Mobile Networks
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Token-DCF, COMSNET(2013) -> MOBICOM(2014). Introduction ▣ To improve standard MAC protocol of IEEE for WLAN. ▣ S-MAC, A-MAC, SPEED-MAC, and etc.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Medium Access Control in Wireless networks
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
doc.: IEEE /183r0 Submission March 2002 David Beberman, Corporate Wave Net, Inc.Slide 1 Single Burst Contention Resolution “Wireless Collision.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray,Jeffrey B. Carruthers and David Starobinski WCNC 2003.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
Wireless Sensor Networks 4. Medium Access
Lab 7 – CSMA/CD (Data Link Layer Layer)
Topics in Distributed Wireless Medium Access Control
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Data Communication Networks
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Presentation transcript:

Cyclex An Efficient Cheating-Resistant MAC Protocol Jim Pugh Mentors: Imad Aad, Mario Čagalj, Prof. Jean-Pierre Hubaux

Outline Problem with current protocol Cyclex protocol description How Cyclex solves current problem Pros and cons of Cyclex

IEEE Cheating Problem Nodes can modify their protocol to allow themselves to gain throughput without incurring any penalty (cheat) Instead of choosing a randomized backoff time, nodes will choose some low number Cheating nodes send packets more often than non-cheating nodes Difficult to detect, due to random nature of

Our Solution: Cyclex Alternative to IEEE for infrastructure mode Uses a turn-based approach to achieve time division multiple access (TDMA) cycle structure Cycle structure allows for easy cheating detection Operates on two different channels instead of one Uses Fast Collision Recovery to preserve order in cycle

System Model Infrastructure mode with 1 access point, many nodes Reliable communication channels Nodes may join or leave network at any time

Two Channel Approach Based on “A Jamming-Based MAC Protocol to Improve the Performance of Wireless Multihop Ad Hoc Networks” by Ye et al Upon hearing transmission from node on channel A, access point (AP) begins sending “busy tone” on channel B Eliminates hidden node problem

Two Channel Approach

Fast Collision Recovery Can detect collisions at nodes more quickly using two channel approach If error detected in packet header, AP will change from busy tone to “error tone” on channel B Transmitting nodes that hear error tone will know collision occurred immediately; can attempt to transmit again sooner than nodes in IEEE

Fast Collision Recovery

Maintaining Order with Fast Collision Recovery In IEEE , colliding nodes may have long delay before next transmission With Fast Collision Recovery, colliding nodes can transmit soon after collision; all other nodes wait longer If the maximum random backoff is short enough, we can guarantee that colliding nodes will transmit before any other nodes Preserves order, which is important for turn- based algorithm

Full Protocol Description Nodes take turn transmitting; specific order Transmissions form a “cycle” Acknowledgements from access point include node identity; possible for all nodes to track who transmits

Cyclex Operation

Joining the Cycle To join, node must either wait X consecutive slot counts of channel idle time or hear a complete “cycle” If no nodes present, after X slot counts, node will start a cycle If nodes present, after hearing cycle (same node transmit twice), node will insert itself into cycle by preempting next node transmission

Joining the Cycle

Leaving the Cycle If node misses transmission, may have no data or may have left network If node misses transmission, next node waits one slot count, then transmits; if two nodes in a row miss transmission, next node waits two slot counts; etc If node misses Y transmissions in a row, it is removed from cycle

Leaving the Cycle

Collisions Nodes in cycle don’t collide since ordered Joining nodes don’t collide with nodes in cycle since preempting is faster Only collisions occur from nodes joining the cycle simultaneously Worst case analysis: 0.15% loss of time In case of glitch, fast collision recovery allows order of network to be maintained

Cyclex Cheating Detection Cheating difficult to detect in IEEE due to random nature Cyclex is ordered; easy cheating detection Active nodes listen to who transmits between their transmissions; if some node transmits twice, it is cheating Once cheating detected, measures can be taken to punish node

Cheating Detection

Pros of Cyclex Solves hidden node problem; less collisions occur, and time saved from not using RTS and CTS Cheating-resistant Very little lost transmission time in stable network operation

Cons of Cyclex Two channels needed instead of one Busy tone means more power used by access point Current design only works in infrastructure mode

Possible Modifications of Protocol Consecutive slot counts required before joining network Missed transmissions before node removal from cycle Adapt protocol for use in ad hoc networks

References M. Raya, J. P. Hubaux, and I. Aad, “DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots.” M. Cagalj, S. Ganeriwal, I. Aad, and J. P. Hubaux, “On Cheating in CSMA/CA Ad Hoc Networks.” C. E. Koksal, H. Kassab, and H. Balakrishnan, “An Analysis of Short-Term Fairness in Wireless Media Access Protocols,” in Proc. ACM SIGMETRICS’00, Santa Clara, CA, June J. L. Sobrinho and A. S. Krishnakumar, “Quality-of-Service in Ad Hoc Carrier Sense Multiple Access Wireless Networks,” IEEE Journal on Selected Areas in Communications, Vol. 17, No. 8, August S. R. Ye, Y. C. Wang, and Y. C. Tseng, “A Jamming-Based MAC Protocol to Improve the Performance of Wireless Multihop Ad Hoc Networks.”