A game-theoretic study of CSMA/CA under a backoff attack

被引:59
|
作者
Konorski, Jerzy [1 ]
机构
[1] Gdansk Univ Technol, Fac ETI, Dept Informat Syst, PL-80952 Gdansk, Poland
关键词
ad hoc LAN; game theory; MAC protocol; selfish behavior;
D O I
10.1109/TNET.2006.886298
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
CSMA/CA, the contention mechanism of the IEEE 802.11 DCF medium access protocol, has recently been found vulnerable to selfish backoff attacks consisting in nonstandard configuration of the constituent backoff scheme. Such attacks can greatly increase a selfish station's bandwidth share at the expense of honest stations applying a standard configuration. The paper investigates the distribution of bandwidth among anonymous network stations, some of which are selfish. A station's obtained bandwidth share is regarded as a payoff in a noncooperative CSMA/CA game. Regardless of the IEEE 802.11 parameter setting, the payoff function is found similar to a multiplayer Prisoners' Dilemma; moreover, the number (though not the identities) of selfish stations can be inferred by observation of successful transmission attempts. Further, a repeated CSMA/CA game is defined, where a station can toggle between standard and nonstandard backoff configurations with a view of maximizing a long-term utility. It is argued that a desirable station strategy should yield a fair, Pareto efficient, and subgame perfect Nash equilibrium. One such strategy, called CRISP, is described and evaluated.
引用
收藏
页码:1167 / 1178
页数:12
相关论文
共 50 条
  • [1] Repeated Game Analysis of a CSMA/CA Network under a Backoff Attack
    Parras, Juan
    Zazo, Santiago
    [J]. SENSORS, 2019, 19 (24)
  • [2] Game-Theoretic Queue-Stabilizing Backoff Algorithm in S-ALOHA and CSMA Systems
    Seo, Jun-Bae
    [J]. IEEE COMMUNICATIONS LETTERS, 2016, 20 (08) : 1663 - 1666
  • [3] A Game-Theoretic Approach to Prioritized Transmission in Wireless CSMA/CA Networks
    Galluccio, Laura
    [J]. 2009 IEEE VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, 2009, : 33 - 37
  • [4] Mitigating Jamming Attack: A Game-Theoretic Perspective
    Wang, Qiwei
    Thinh Nguyen
    Khanh Pham
    Kwon, Hyuck
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (07) : 6063 - 6074
  • [5] A game-theoretic study of load redistribution attack and defense in power systems
    Xiang, Yingmeng
    Wang, Lingfeng
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 2017, 151 : 12 - 25
  • [6] Game-Theoretic Wireless CSMA MAC Protocols: Measurements from an Indoor Testbed
    Chakraborty, Sandip
    Dash, Dipti
    Sanyal, Debarshi Kumar
    Chattopadhyay, Samiran
    Chattopadhyay, Matangini
    [J]. 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2016,
  • [7] Detecting Selfish Backoff Attack in IEEE 802.15.4 CSMA/CA using Logistic Classification
    Kim, Joongheon
    Kim, Kyeong Seon
    [J]. 2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 26 - 27
  • [8] A Game-theoretic View on Objective Function Attack and Its Defense
    Feng, Guangsheng
    Zhao, Xiaoyu
    Wang, Huiqiang
    Zhao, Qian
    [J]. 2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 1152 - 1156
  • [9] Resource Allocation in Pollution Attack and Defense: A Game-Theoretic Perspective
    Tong, Wei
    Zhong, Sheng
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 3057 - 3062
  • [10] Playing CSMA/CA game to deter backoff attacks in ad hoc wireless LANs
    Konorski, J
    [J]. AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2005, 3738 : 127 - 140