Abstract
In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper we offer a game-theoretic approach: we derive a formal model of opportunistic TRAs, define a TRA game with a heuristic rank-based payoff function, and propose a boundedly rational multistage attack strategy that both selfish and non-selfish nodes are free to use. Thus non-selfish nodes are allowed to respond in kind to selfish ones. We characterize the form of equilibrium that the multistage play reaches and verify via simulation that it often coincides with a Nash equilibrium in which harmful TRAs are curbed in the first place, whereas harmless ones need not be.
Citations
-
4
CrossRef
-
0
Web of Science
-
4
Scopus
Authors (2)
Cite as
Full text
- Publication version
- Accepted or Published Version
- License
- Copyright (2017 IEEE)
Keywords
Details
- Category:
- Conference activity
- Type:
- materiały konferencyjne indeksowane w Web of Science
- Title of issue:
- IEEE GLOBECOM 2017 Conference Proceedings strony 1 - 7
- Language:
- English
- Publication year:
- 2017
- Bibliographic description:
- Konorski J., Szott S..: Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network, W: IEEE GLOBECOM 2017 Conference Proceedings, 2017, ,.
- DOI:
- Digital Object Identifier (open in new tab) 10.1109/glocom.2017.8253959
- Bibliography: test
-
- B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, "A survey of routing attacks in mobile ad hoc networks," IEEE Wireless Communications, vol. 14, no. 5, pp. 85-91, 2007. open in new tab
- A. Hassanzadeh, Z. Xu, R. Stoleru, G. Gu, and M. Polychronakis, "PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks," Computers & Security, vol. 62, pp. 114-132, 2016. open in new tab
- Z. Movahedi, Z. Hosseini, F. Bayan, and G. Pujolle, "Trust-distortion resistant trust management frameworks on mobile ad hoc networks: A survey," IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1287-1309, 2016. open in new tab
- R. Stankiewicz, P. Cholda, and A. Jajszczyk, "QoX: What is it really?" Communications Magazine, IEEE, vol. 49, pp. 148-158, 2011. open in new tab
- J. Konorski and S. Szott, "Discouraging traffic remapping attacks in lo- cal ad hoc networks," IEEE Transactions on Wireless Communications, vol. 13, no. 7, pp. 3752-3767, 2014. open in new tab
- M. Li and B. Prabhakaran, "MAC layer admission control and priority re-allocation for handling QoS guarantees in non-cooperative wireless LANs," Springer Mobile Networks and Applications, vol. 10, pp. 947- 959, 2005. open in new tab
- M. Ghazvini and N. M. K. Jamshidi, "GTXOP: A game theoretic approach for QoS provisioning using transmission opportunity tuning," PLoS ONE, vol. 8, p. 8, 2013. open in new tab
- A. C. Politis, P. Kyramaridis, and C. S. Hilas, "A MAC-centric ap- proach to detect and mitigate EDCA misbehavior attacks," Journal of Engineering Science and Technology Review, vol. 9, no. 5, pp. 93-96, 2016. open in new tab
- J. Konorski and S. Szott, "Credibility of threats to jam anonymous traffic remapping attacks in ad hoc WLANs," IEEE Communications Letters, vol. 21, no. 3, pp. 624-627, 2017. open in new tab
- S. Szott, "Selfish insider attacks in IEEE 802.11s wireless mesh networks," Communications Magazine, IEEE, vol. 52, pp. 227-233, 2014. open in new tab
- S. Szott and J. Konorski, "Traffic remapping attacks in ad hoc net- works," IEEE Communications Magazine, 2017, to appear. open in new tab
- T.-H. Ho, "Finite automata play repeated Prisoner's Dilemma with information processing costs," Journal of Economic Dynamics and Control, vol. 20, no. 1, pp. 173-207, 1996. open in new tab
- S. Szott, M. Natkaniec, and A. R. Pach, "An IEEE 802.11 EDCA model with support for analysing networks with misbehaving nodes," EURASIP Journal on Wireless Communications and Networking, vol. 2010, p. 71, 2010. open in new tab
- D. Fudenberg and D. K. Levine, The Theory of Learning in Games. MIT Press, 1998. open in new tab
- E. Kalai and E. Lehrer, "Rational learning leads to Nash equilibrium," Econometrica, vol. 61, no. 5, pp. 1019-1045, 1993. open in new tab
- A. Banchs, A. Garcia-Saavedra, P. Serrano, and J. Widmer, "A game- theoretic approach to distributed opportunistic scheduling," IEEE/ACM Trans. Netw., vol. 21, no. 5, pp. 1553-1566, 2013. open in new tab
- Verified by:
- Gdańsk University of Technology
seen 87 times