Skip to main content

Malicious or Selfish? Analysis of Carrier Sense Misbehavior in IEEE 802.11 WLAN

  • Conference paper

Abstract

The behavior of selfish users, which does not respect the backoff procedure of IEEE 802.11 WLAN, has been nicely studied in game-theoretic frameworks. However, in these studies, the effect of physical carrier sense has not been properly incorporated into the analysis. In this paper, we study the problem of how carrier sense misbehavior can affect network performance in addition to backoff misbehavior. Our analysis shows that a cheater can increase its throughput by ignoring the carrier sense mechanism while a well-behaved user significantly loses its throughput. Consequently, not only a malicious user, but also a selfish one is motivated to disregard the carrier sense mechanism, which will result in significant throughput degradation of well-behaved ones. Our analysis also shows that carrier sense misbehavior corresponds to the case of virtually increasing the channel access probability of the cheater in the backoff procedure. We provide our preliminary simulation results, which verify our analysis.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kyasanur, P., Vaidya, N.H.: Selfish MAC layer misbehavior in wireless networks. IEEE Transactions on Mobile Computing 4(5), 502–516 (2005)

    Article  Google Scholar 

  2. Čagalj, M., Ganeriwal, S., Aad, I., Hubaux, J.P.: On selfish behavior in CSMA/CA networks. In: Proc. the 24th IEEE Conference on Computer Communications (INFOCOM 2005), Miami, FL, March 2005, pp. 2513–2524 (2005)

    Google Scholar 

  3. Konorski, J.: A game-theoretic study of CSMA/CA under a backoff attack. IEEE/ACM Transactions on Networking 14(6), 1167–1178 (2006)

    Article  Google Scholar 

  4. Toledo, A., Wang, X.: Robust detection of selfish misbehavior in wireless networks. IEEE Journal on Selected Areas in Communications 25(6), 1124–1134 (2007)

    Article  Google Scholar 

  5. Buttyán, L., Hubaux, J.P.: Security and Cooperation in Wireless Networks. Cambridge University Press, Cambridge (2007)

    Book  Google Scholar 

  6. Pelechrinis, K., Yan, G., Eidenbenz, S., Krishnamurthy, S.: Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks. In: Proc. the 28th IEEE Conference on Computer Communications (INFOCOM 2009), Rio de Janiero, Brazil (April 2009)

    Google Scholar 

  7. Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1–24. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  8. Stubblefield, A., Ioannidis, J., Rubin, A.D.: A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). ACM Transactions on Information and System Security 7(2), 319–332 (2004)

    Article  Google Scholar 

  9. Bittau, A., Handley, M., Lackey, J.: The final nail in WEP’s coffin. In: Proc. the 27th IEEE Symposium on Security and Privacy, Oakland, CA, May 2006, pp. 386–400 (2006)

    Google Scholar 

  10. Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In: Proc. the 12th USENIX Security Symposium, Washington, DC, August 2003, pp. 15–27 (2003)

    Google Scholar 

  11. Bianchi, G.: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications 18(3), 535–547 (2000)

    Article  Google Scholar 

  12. Chen, Q., Schmidt-Eisenlohr, F., Jiang, D., Torrent-Moreno, M., Delgrossi, L., Hartenstein, H.: Overhaul of ieee 802.11 modeling and simulation in ns-2. In: Proc. the 10th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems (MSWiM 2007), Chania, Crete Island, Greece, October 2007, pp. 159–168 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Park, KJ., Choi, J., Kang, K., Hu, YC. (2009). Malicious or Selfish? Analysis of Carrier Sense Misbehavior in IEEE 802.11 WLAN. In: Bartolini, N., Nikoletseas, S., Sinha, P., Cardellini, V., Mahanti, A. (eds) Quality of Service in Heterogeneous Networks. QShine 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 22. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10625-5_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10625-5_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10624-8

  • Online ISBN: 978-3-642-10625-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics