Top Banner
Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang
18

Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

Dec 22, 2015

Download

Documents

Osborne York
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

Selfish MAC Layer Misbehavior in Wireless Networks

Pradeep Kyasanur and Nitin H. Vaidya

2005 IEEE

Reviewed by Dean Chiang

Page 2: Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

How is network contention resolved?

Distributed Contention Function (DCF) Relies on protocol adherence from all of the

network.

I’m transmitting

guys!

Ok everyone better wait the same amount!

You got it!

…What if I don’t want

to…?

Page 3: Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

Problem Definition

Selfish Host

Backoff = rand[1,1]

Normal Host

Backoff = rand[0,CW]

Normal Channel Usage

Channel Usage with a Selfish Host

t

t

Page 4: Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

Problem Challenges

Difference between a small backoff and differing usage by each node?

Node channel conditions are different. A node can claim an idle channel.

Page 5: Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

Solution

Modified MAC ProtocolGoal: retain performance of 802.11 while

ensuring detection of misbehavior in a short interval

Assumptions: Misbehaving senders only. Receivers are

assumed to be trusted. No collusion between sender and receiver

Page 6: Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

Protocol Modifications - Backoff

Receiver assigns random backoff and sends it in the CTS and ACK. Receiver is in control.

Page 7: Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

Protocol Modifications - Retransmission

Sender adds attempt number to RTS

Receiver estimates expected backoff from attempt number.

Page 8: Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

Penalty Scheme

Penalize if: B_actual < Alpha * B_expected (Alpha = 0.8)

Penalty Add to next backoff by an amount proportional to deviation and

then some.

Still not adhering? Identify as a selfish host. (Last W packets that deviated over total threshold T slots)

Receiver is in control. Misbehavior with backoff cannot be spoofed by senders.

Page 9: Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

What happens after identification?

Possibilities

MAC LayerReceiver exiles sender by not responding

to RTS.Network LayerNetwork routes around host.

Page 10: Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

Misdiagnosis

Receiver senses a busy channel from 2 hops away when sender does not.

Sender sends to receiver, receiver thinks sender did not adhere to assigned backoff.

Solution: receiver does not count a busy channel for transmission, only during overheard RTS/CTS.

Page 11: Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

Results: Diagnostic Accuracy

Notes:

•Low misdiagnosis rate

•Does not fully resolve selfish behavior problem. Only alleviates high end of deviation.

•Notice there is a threshold of misbehavior that can go undetected.

Page 12: Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

Results: Throughput

Throughput comparison to 802.11

•Adheres closely to throughput of 802.11

Page 13: Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

Results: Fairness

Fairness Index comparison to 802.11

•Fairness decreases with # of nodes

•Fairness deviates more when background traffic is high (TWO-FLOW)

Page 14: Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

Results: What about crafty clients?

Correct Diagnosis %

Protocol is worse at detecting adaptive misbehavior

Throughput gain is not large because of penalty scheme

HOWEVER

Page 15: Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

Pros and Cons

Pros Fast diagnosis, no need to collect tons of data Low Misdiagnosis rate Retains fairness and throughput of 802.11 Reduces workaround potential

Cons Additional overhead Backwards compatibility Spoofed MAC addresses

Page 16: Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

Addendum: Optimal Threshold

Authors show a proof for an optimal threshold

Threshold T is a function of assigned back-off value and # of slots.

However, authors chose a static threshold in simulations. This suggests the data could be better.

Page 17: Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

Discussion/Consideration

What does the police do?

Why did the government create a police force?

At what intrinsic layer does the government’s control end?

http://www.thunderroadlaser.com/images/thunderimages/05_Police%20Badge%20-%2072dpi.jpg

Page 18: Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.

Discussion/Consideration

Is this really the best place to handle selfish behavior?

PC, DriverWireless Network Adapter

Regulated by IEEE

Regulated by IEEE

Not Regulated by IEEE

http://compuplus.com.mx/tienda/images/WAP54G.jpg

Base Station

http://store.madtux.org/images/PC319a.jpg

http://images.belkin.com/F6D3000/PRN1_F6D3000.jpg