Abstract
The behavior of selfish users, which does not respect the backoff procedure of IEEE 802.11 WLAN, has been nicely studied in game-theoretic frameworks. However, in these studies, the effect of physical carrier sense has not been properly incorporated into the analysis. In this paper, we study the problem of how carrier sense misbehavior can affect network performance in addition to backoff misbehavior. Our analysis shows that a cheater can increase its throughput by ignoring the carrier sense mechanism while a well-behaved user significantly loses its throughput. Consequently, not only a malicious user, but also a selfish one is motivated to disregard the carrier sense mechanism, which will result in significant throughput degradation of well-behaved ones. Our analysis also shows that carrier sense misbehavior corresponds to the case of virtually increasing the channel access probability of the cheater in the backoff procedure. We provide our preliminary simulation results, which verify our analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kyasanur, P., Vaidya, N.H.: Selfish MAC layer misbehavior in wireless networks. IEEE Transactions on Mobile Computing 4(5), 502–516 (2005)
Čagalj, M., Ganeriwal, S., Aad, I., Hubaux, J.P.: On selfish behavior in CSMA/CA networks. In: Proc. the 24th IEEE Conference on Computer Communications (INFOCOM 2005), Miami, FL, March 2005, pp. 2513–2524 (2005)
Konorski, J.: A game-theoretic study of CSMA/CA under a backoff attack. IEEE/ACM Transactions on Networking 14(6), 1167–1178 (2006)
Toledo, A., Wang, X.: Robust detection of selfish misbehavior in wireless networks. IEEE Journal on Selected Areas in Communications 25(6), 1124–1134 (2007)
Buttyán, L., Hubaux, J.P.: Security and Cooperation in Wireless Networks. Cambridge University Press, Cambridge (2007)
Pelechrinis, K., Yan, G., Eidenbenz, S., Krishnamurthy, S.: Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks. In: Proc. the 28th IEEE Conference on Computer Communications (INFOCOM 2009), Rio de Janiero, Brazil (April 2009)
Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1–24. Springer, Heidelberg (2001)
Stubblefield, A., Ioannidis, J., Rubin, A.D.: A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). ACM Transactions on Information and System Security 7(2), 319–332 (2004)
Bittau, A., Handley, M., Lackey, J.: The final nail in WEP’s coffin. In: Proc. the 27th IEEE Symposium on Security and Privacy, Oakland, CA, May 2006, pp. 386–400 (2006)
Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In: Proc. the 12th USENIX Security Symposium, Washington, DC, August 2003, pp. 15–27 (2003)
Bianchi, G.: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications 18(3), 535–547 (2000)
Chen, Q., Schmidt-Eisenlohr, F., Jiang, D., Torrent-Moreno, M., Delgrossi, L., Hartenstein, H.: Overhaul of ieee 802.11 modeling and simulation in ns-2. In: Proc. the 10th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems (MSWiM 2007), Chania, Crete Island, Greece, October 2007, pp. 159–168 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Park, KJ., Choi, J., Kang, K., Hu, YC. (2009). Malicious or Selfish? Analysis of Carrier Sense Misbehavior in IEEE 802.11 WLAN. In: Bartolini, N., Nikoletseas, S., Sinha, P., Cardellini, V., Mahanti, A. (eds) Quality of Service in Heterogeneous Networks. QShine 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 22. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10625-5_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-10625-5_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10624-8
Online ISBN: 978-3-642-10625-5
eBook Packages: Computer ScienceComputer Science (R0)