© The Institution of Engineering and Technology
When a node is not abiding by the rules of the protocol of a wireless network for its own benefit, it can cause severe degradation to network performance. Therefore it is important to detect such selfish behaviour. However, this is not an easy task. The main difficulty comes from the random operation of the carrier-sense multiple-access with collision avoidance (CSMA/CA) protocol, and is exacerbated by the nature of the wireless medium itself. The authors propose in this study a simple and quick algorithm, called sliding window non-parametric cumulative sum (SWN-CUSUM), to detect selfish nodes that deliberately modify its backoff window to gain unfair access to the network resources. SWN-CUSUM uses a sliding window to prevent unlimited build-up of the cumulating sum used in the protocol. The efficiency of this detection algorithm has been validated by extensive simulations using a Qualnet simulator. Comparative analysis of the proposed algorithm with a traditional CUSUM method demonstrates its superior performance with high detection accuracy and low false alarm rate. In addition, the authors compared SWN-CUSUM with other detection techniques, such as sequential probability ratio test and exponentially weighted moving average, the results show that our algorithm has a good performance in detection delay.
References
-
-
1)
-
Scalable Network Technologies: ‘Qualnet simulator version 3.9’, www.scalable-networks.com.
-
2)
-
H.V. Poor
.
(1988)
An introduction to signal detection and estimation.
-
3)
-
Toledo, A., Wang, X.: `A robust Kolmogorov-Smirnov detector for misbehavior in IEEE 802.11 DCF', Proc. IEEE Int. Conf. Communication, June 2007, Glasgow, UK, p. 1564–1569.
-
4)
-
Radosavac, S., Baras, J., Koutsopoulos, I.: `A framework for MAC protocol misbehavior detection in wireless networks', Proc. ACM Workshop Wireless Security, September 2005, Cologne, Germany, p. 33–42.
-
5)
-
P. Kyasanur ,
N. Vaidya
.
Selfish MAC layer misbehavior in wireless networks.
IEEE Trans. Mob. Comput.
,
5 ,
502 -
516
-
6)
-
Michiardi, P., Molva, R.: `Game theoretic analysis of security in mobile and ad hoc networks', Technical report RR-02-070, April 2002.
-
7)
-
E.S. Page
.
Continuous inspection schemes.
Biometrika
,
100 -
115
-
8)
-
Rong, Y., Lee, S., Choi, H.: `Detecting stations cheating on backoff rules in 802.11 networks using sequential analysis', Proc. IEEE INFOCOM, April 2006, Barcelona, Spain, p. 1–13.
-
9)
-
Kyasanur, P., Vaidya, N.: `Detection and handling of MAC layer misbehavior in wireless networks', Proc. Int. Conf. Dependable Systems and Networks, June 2003, San Francisco, USA, p. 173–182.
-
10)
-
M. Raya ,
I. Aad ,
J. Hubaux ,
A. Fawal
.
DOMINO: detecting MAC layer greedy behavior in IEEE 802.11 hotspots.
IEEE Trans. Mob. Comput.
,
12 ,
1691 -
1705
-
11)
-
Wang, H., Zhang, D., Shin, K.: `Detecting SYN flooding attacks', Proc. INFOCOM, June 2002, NY, USA, p. 1530–1539.
-
12)
-
Chen, Y., Trappe, W., Martin, R.: `Detecting and localizing wireless spoofing attacks', Proc. IEEE SECON, October 2007, San Diego, USA, p. 193–202.
-
13)
-
M. Basseville ,
I.V. Nikiforov
.
(1993)
Detection of abrupt changes: theory and application.
-
14)
-
Liu, C., Shu, Y., Yang, O., Li, M.: `A new mechanism to detect selfish behavior in IEEE 802.11 ad hoc networks', Proc. IEEE Int. Conf. Communication, June 2009, Dresden, Germany, p. 519–643.
-
15)
-
L. Guang ,
C. Assi
.
Enhancing IEEE 802.11. Random backoff in selfish environments.
IEEE. Trans. Veh. Technol.
,
3 ,
1806 -
1822
-
16)
-
ISO/IEC 8802-11:1999(E): ‘IEEE standard for wireless LAN medium access control (MAC) and physical layer (PHY) specifications’, August 1999.
-
17)
-
A. Toledo ,
X. Wang
.
Robust detection of selfish misbehavior in wireless networks.
IEEE J. Sel. Areas Commun.
,
6 ,
1124 -
1134
-
18)
-
Buchegger, S., Boudec, J.: `Performance analysis of the CONFIDANT protocol', Proc. MobiHoc, June 2002, Lausanne, Switzerland, p. 226–236.
-
19)
-
Bellardo, J., Savage, S.: `802.11 denial-of-service attacks: Real vulnerabilities and practical solutions', Proc. USENIX Security Symp., August 2003, Washington, DC, USA, p. 15–28.
-
20)
-
L. Li ,
J. Zhou ,
N. Xiao
.
(2007)
DDoS attack detection algorithms based on entropy computing.
-
21)
-
Aad, I., Hubaux, J., Knightly, E.: `Denial of service resilience in ad hoc networks', Proc. ACM Mobicom, September 2004, PA, USA, p. 202–215.
-
22)
-
Wang, H., Zhang, D., Shin, K.: `SYN-dog: sniffing SYN flooding sources', Proc. 22nd IEEE Int. Conf. Distributed Computing Systems, July 2002, Vienna, Austria, p. 421–428.
-
23)
-
Cárdenas, A., Radosavac, S., Baras, J.: `Detection and prevention of MAC layer misbehavior in ad hoc networks', Proc. ACM SASN, October 2004, TX, USA, p. 17–22.
-
24)
-
Brik, V., Banerjee, S., Gruteser, M.: `Wireless device identification with radiometric signatures', Proc. Mobicom, September 2008, San Francisco, CA, USA, p. 116–127.
-
25)
-
B. Brodsky ,
B. Darkhovsky
.
(1993)
Nonparametric methods in change point problems.
-
26)
-
Cagalj, M., Ganeriwal, S., Aad, I.: `On cheating in CSMA/CA ad hoc networks', Technical Report IC/2004/27, March 2004.
-
27)
-
H. Wang ,
D. Zhang ,
K. Shin
.
Change-point monitoring for the detection of DoS attacks.
IEEE Trans. Dependable Secur. Comput.
,
4 ,
193 -
208
-
28)
-
Ahmed, E., Clark, A., Mohay, G.: `A novel sliding window based change detection algorithm for asymmetric traffic', Proc. 2008 IFIP Int. Conf. Network and Parallel Computing, October 2008, Shanghai, China, p. 168–175.
-
29)
-
Pelechrinis, K., Yan, G., Eidenbenz, S.: `Detecting selfish exploitation of carrier sensing in 802.11 networks', Proc. IEEE INFOCOM, 2009, Rio De Janeiro, Brazil, p. 657–665.
-
30)
-
A. Wald
.
(1947)
Sequential analysis.
-
31)
-
Faria, D., Cheriton, D.: `Detecting identity-based attacks in wireless networks using signalprints', Proc. ACM Workshop on Wireless Security, September 2006, Los Angeles, CA, USA, p. 43–52.
-
32)
-
Y. Jin ,
G. Kesidis
.
Distributed contention window control for selfish users in IEEE 802.11 wireless LANs.
IEEE J. Sel. Areas Commun.
,
6 ,
1113 -
1123
-
33)
-
Gupta, V., Krishnamurthy, S., Faloutsous, M.: `Denial of service attacks at the MAC layer in wireless ad hoc networks', Proc. MILCOM, 2002, CA, USA, p. 1118–1123.
-
34)
-
S. Radosavac ,
G. Moustakides ,
J. Baras
.
An analytic framework for modeling and detecting access layer misbehaviorin wireless networks.
ACM Trans. Inf. Syst. Sec.
,
4 ,
19:1 -
19:24
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2010.0278
Related content
content/journals/10.1049/iet-com.2010.0278
pub_keyword,iet_inspecKeyword,pub_concept
6
6