Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Medium Access Issues David Holmer
Contents IEEE MAC layer operation Basic CSMA/CA operation
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
Duke Selfish MAC Layer Misbehavior in Wireless Networks Author: Pradeep Kyasanur and Nitin H. Vaidya Some slides are borrowed from the author and others.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
CSMA/CA in IEEE Physical carrier sense, and Virtual carrier sense using Network Allocation Vector (NAV) NAV is updated based on overheard RTS/CTS/DATA/ACK.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Module C- Part 1 WLAN Performance Aspects
Collision Aware Rate Adaptation (CARA) Bob Kinicki Computer Science Department Computer Science Department Advanced Computer.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
TCP over ad hoc networks Ad Hoc Networks will have to be interfaced with the Internet. As such backward compatibility is a big issue. One might expect.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Cyclex An Efficient Cheating-Resistant MAC Protocol Jim Pugh Mentors: Imad Aad, Mario Čagalj, Prof. Jean-Pierre Hubaux.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
1 Introduction to Wireless Networks Michalis Faloutsos.
A Transmission Control Scheme for Media Access in Sensor Networks Presented by Jianhua Shao.
MAC Protocol By Ervin Kulenica & Chien Pham.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
DETERMINATION OF THE TOPOLOGY OF HIGH SURVIVAL HF RADIO COMMUNICATION NETWORK Andrea Abrardo.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
Wireless LAN Simulation - IEEE MAC Protocol
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Opersating Mode DCF: distributed coordination function
1 SenMetrics’05, San Diego, 07/21/2005 SOSBRA: A MAC-Layer Retransmission Algorithm Designed for the Physical-Layer Characteristics of Clustered Sensor.
MAC Protocols and Security in Ad hoc and Sensor Networks
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He J. Sobrinho and A. krishnakumar.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
Effects of Multi-Rate in Ad Hoc Wireless Networks
Chapter 6 Multiple Radio Access
Fundamentals of Computer Networks ECE 478/578
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
IEEE WLAN.
1/26 Module C - Part 2 DOMINO Detection Of greedy behavior in MAC layer of IEEE public NetwOrks Prof. JP Hubaux Mobile Networks
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Planning and Analyzing Wireless LAN
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Rami Melhem Sameh Gobriel & Daniel Mosse Modeling an Energy-Efficient MAC Layer Protocol.
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
WLAN.
Improving the scalability of MAC protocols in Wireless Mesh Networks Mthulisi Velempini (Mr.)
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
PAC: Perceptive Admission Control for Mobile Wireless Networks Ian D. Chakeres Elizabeth M. Belding-Royer.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Selfish MAC Layer Misbehavior in Wireless Networks ECE 299, Karthik Balasubramanian February 8, 2007 Nitin Vaidya and Pradeep Kyasanur.
Lab 7 – CSMA/CD (Data Link Layer Layer)
Distributed Medium Access Control in Wireless Networks
Topics in Distributed Wireless Medium Access Control
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Modified and Presented.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Self Organized Networks
Data Communication Networks
Wireless LAN Simulation IEEE MAC Protocol
Presentation transcript:

Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang

How is network contention resolved? Distributed Contention Function (DCF)  Relies on protocol adherence from all of the network. I’m transmitting guys! Ok everyone better wait the same amount! You got it! …What if I don’t want to…?

Problem Definition Selfish Host Backoff = rand[1,1] Normal Host Backoff = rand[0,CW] Normal Channel Usage Channel Usage with a Selfish Host t t

Problem Challenges Difference between a small backoff and differing usage by each node? Node channel conditions are different. A node can claim an idle channel.

Solution Modified MAC Protocol Goal: retain performance of while ensuring detection of misbehavior in a short interval Assumptions:  Misbehaving senders only. Receivers are assumed to be trusted.  No collusion between sender and receiver

Protocol Modifications - Backoff Receiver assigns random backoff and sends it in the CTS and ACK. Receiver is in control.

Protocol Modifications - Retransmission Sender adds attempt number to RTS Receiver estimates expected backoff from attempt number.

Penalty Scheme Penalize if:  B_actual < Alpha * B_expected (Alpha = 0.8) Penalty  Add to next backoff by an amount proportional to deviation and then some. Still not adhering? Identify as a selfish host. (Last W packets that deviated over total threshold T slots) Receiver is in control. Misbehavior with backoff cannot be spoofed by senders.

What happens after identification? Possibilities MAC Layer Receiver exiles sender by not responding to RTS. Network Layer Network routes around host.

Misdiagnosis Receiver senses a busy channel from 2 hops away when sender does not. Sender sends to receiver, receiver thinks sender did not adhere to assigned backoff. Solution: receiver does not count a busy channel for transmission, only during overheard RTS/CTS.

Results: Diagnostic Accuracy Notes: Low misdiagnosis rate Does not fully resolve selfish behavior problem. Only alleviates high end of deviation. Notice there is a threshold of misbehavior that can go undetected.

Results: Throughput Throughput comparison to Adheres closely to throughput of

Results: Fairness Fairness Index comparison to Fairness decreases with # of nodes Fairness deviates more when background traffic is high (TWO-FLOW)

Results: What about crafty clients? Correct Diagnosis % Protocol is worse at detecting adaptive misbehavior Throughput gain is not large because of penalty scheme HOWEVER

Pros and Cons Pros  Fast diagnosis, no need to collect tons of data  Low Misdiagnosis rate  Retains fairness and throughput of  Reduces workaround potential Cons  Additional overhead  Backwards compatibility  Spoofed MAC addresses

Addendum: Optimal Threshold Authors show a proof for an optimal threshold Threshold T is a function of assigned back-off value and # of slots. However, authors chose a static threshold in simulations. This suggests the data could be better.

Discussion/Consideration What does the police do? Why did the government create a police force? At what intrinsic layer does the government’s control end?

Discussion/Consideration Is this really the best place to handle selfish behavior? PC, Driver Wireless Network Adapter Regulated by IEEE Not Regulated by IEEE Base Station