Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network - Publication - Bridge of Knowledge

Search

Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network

Abstract

In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper we offer a game-theoretic approach: we derive a formal model of opportunistic TRAs, define a TRA game with a heuristic rank-based payoff function, and propose a boundedly rational multistage attack strategy that both selfish and non-selfish nodes are free to use. Thus non-selfish nodes are allowed to respond in kind to selfish ones. We characterize the form of equilibrium that the multistage play reaches and verify via simulation that it often coincides with a Nash equilibrium in which harmful TRAs are curbed in the first place, whereas harmless ones need not be.

Citations

  • 4

    CrossRef

  • 0

    Web of Science

  • 4

    Scopus

Cite as

Full text

download paper
downloaded 51 times
Publication version
Accepted or Published Version
License
Copyright (2017 IEEE)

Keywords

Details

Category:
Conference activity
Type:
materiały konferencyjne indeksowane w Web of Science
Title of issue:
IEEE GLOBECOM 2017 Conference Proceedings strony 1 - 7
Language:
English
Publication year:
2017
Bibliographic description:
Konorski J., Szott S..: Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network, W: IEEE GLOBECOM 2017 Conference Proceedings, 2017, ,.
DOI:
Digital Object Identifier (open in new tab) 10.1109/glocom.2017.8253959
Bibliography: test
  1. B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, "A survey of routing attacks in mobile ad hoc networks," IEEE Wireless Communications, vol. 14, no. 5, pp. 85-91, 2007. open in new tab
  2. A. Hassanzadeh, Z. Xu, R. Stoleru, G. Gu, and M. Polychronakis, "PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks," Computers & Security, vol. 62, pp. 114-132, 2016. open in new tab
  3. Z. Movahedi, Z. Hosseini, F. Bayan, and G. Pujolle, "Trust-distortion resistant trust management frameworks on mobile ad hoc networks: A survey," IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1287-1309, 2016. open in new tab
  4. R. Stankiewicz, P. Cholda, and A. Jajszczyk, "QoX: What is it really?" Communications Magazine, IEEE, vol. 49, pp. 148-158, 2011. open in new tab
  5. J. Konorski and S. Szott, "Discouraging traffic remapping attacks in lo- cal ad hoc networks," IEEE Transactions on Wireless Communications, vol. 13, no. 7, pp. 3752-3767, 2014. open in new tab
  6. M. Li and B. Prabhakaran, "MAC layer admission control and priority re-allocation for handling QoS guarantees in non-cooperative wireless LANs," Springer Mobile Networks and Applications, vol. 10, pp. 947- 959, 2005. open in new tab
  7. M. Ghazvini and N. M. K. Jamshidi, "GTXOP: A game theoretic approach for QoS provisioning using transmission opportunity tuning," PLoS ONE, vol. 8, p. 8, 2013. open in new tab
  8. A. C. Politis, P. Kyramaridis, and C. S. Hilas, "A MAC-centric ap- proach to detect and mitigate EDCA misbehavior attacks," Journal of Engineering Science and Technology Review, vol. 9, no. 5, pp. 93-96, 2016. open in new tab
  9. J. Konorski and S. Szott, "Credibility of threats to jam anonymous traffic remapping attacks in ad hoc WLANs," IEEE Communications Letters, vol. 21, no. 3, pp. 624-627, 2017. open in new tab
  10. S. Szott, "Selfish insider attacks in IEEE 802.11s wireless mesh networks," Communications Magazine, IEEE, vol. 52, pp. 227-233, 2014. open in new tab
  11. S. Szott and J. Konorski, "Traffic remapping attacks in ad hoc net- works," IEEE Communications Magazine, 2017, to appear. open in new tab
  12. T.-H. Ho, "Finite automata play repeated Prisoner's Dilemma with information processing costs," Journal of Economic Dynamics and Control, vol. 20, no. 1, pp. 173-207, 1996. open in new tab
  13. S. Szott, M. Natkaniec, and A. R. Pach, "An IEEE 802.11 EDCA model with support for analysing networks with misbehaving nodes," EURASIP Journal on Wireless Communications and Networking, vol. 2010, p. 71, 2010. open in new tab
  14. D. Fudenberg and D. K. Levine, The Theory of Learning in Games. MIT Press, 1998. open in new tab
  15. E. Kalai and E. Lehrer, "Rational learning leads to Nash equilibrium," Econometrica, vol. 61, no. 5, pp. 1019-1045, 1993. open in new tab
  16. A. Banchs, A. Garcia-Saavedra, P. Serrano, and J. Widmer, "A game- theoretic approach to distributed opportunistic scheduling," IEEE/ACM Trans. Netw., vol. 21, no. 5, pp. 1553-1566, 2013. open in new tab
Verified by:
Gdańsk University of Technology

seen 87 times

Recommended for you

Meta Tags