Abstrakt
In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper we offer a game-theoretic approach: we derive a formal model of opportunistic TRAs, define a TRA game with a heuristic rank-based payoff function, and propose a boundedly rational multistage attack strategy that both selfish and non-selfish nodes are free to use. Thus non-selfish nodes are allowed to respond in kind to selfish ones. We characterize the form of equilibrium that the multistage play reaches and verify via simulation that it often coincides with a Nash equilibrium in which harmful TRAs are curbed in the first place, whereas harmless ones need not be.
Cytowania
-
4
CrossRef
-
0
Web of Science
-
4
Scopus
Autorzy (2)
Cytuj jako
Pełna treść
- Wersja publikacji
- Accepted albo Published Version
- Licencja
- Copyright (2017 IEEE)
Słowa kluczowe
Informacje szczegółowe
- Kategoria:
- Aktywność konferencyjna
- Typ:
- materiały konferencyjne indeksowane w Web of Science
- Tytuł wydania:
- IEEE GLOBECOM 2017 Conference Proceedings strony 1 - 7
- Język:
- angielski
- Rok wydania:
- 2017
- Opis bibliograficzny:
- Konorski J., Szott S..: Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network, W: IEEE GLOBECOM 2017 Conference Proceedings, 2017, ,.
- DOI:
- Cyfrowy identyfikator dokumentu elektronicznego (otwiera się w nowej karcie) 10.1109/glocom.2017.8253959
- Bibliografia: test
-
- B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, "A survey of routing attacks in mobile ad hoc networks," IEEE Wireless Communications, vol. 14, no. 5, pp. 85-91, 2007. otwiera się w nowej karcie
- A. Hassanzadeh, Z. Xu, R. Stoleru, G. Gu, and M. Polychronakis, "PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks," Computers & Security, vol. 62, pp. 114-132, 2016. otwiera się w nowej karcie
- Z. Movahedi, Z. Hosseini, F. Bayan, and G. Pujolle, "Trust-distortion resistant trust management frameworks on mobile ad hoc networks: A survey," IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1287-1309, 2016. otwiera się w nowej karcie
- R. Stankiewicz, P. Cholda, and A. Jajszczyk, "QoX: What is it really?" Communications Magazine, IEEE, vol. 49, pp. 148-158, 2011. otwiera się w nowej karcie
- J. Konorski and S. Szott, "Discouraging traffic remapping attacks in lo- cal ad hoc networks," IEEE Transactions on Wireless Communications, vol. 13, no. 7, pp. 3752-3767, 2014. otwiera się w nowej karcie
- M. Li and B. Prabhakaran, "MAC layer admission control and priority re-allocation for handling QoS guarantees in non-cooperative wireless LANs," Springer Mobile Networks and Applications, vol. 10, pp. 947- 959, 2005. otwiera się w nowej karcie
- M. Ghazvini and N. M. K. Jamshidi, "GTXOP: A game theoretic approach for QoS provisioning using transmission opportunity tuning," PLoS ONE, vol. 8, p. 8, 2013. otwiera się w nowej karcie
- A. C. Politis, P. Kyramaridis, and C. S. Hilas, "A MAC-centric ap- proach to detect and mitigate EDCA misbehavior attacks," Journal of Engineering Science and Technology Review, vol. 9, no. 5, pp. 93-96, 2016. otwiera się w nowej karcie
- J. Konorski and S. Szott, "Credibility of threats to jam anonymous traffic remapping attacks in ad hoc WLANs," IEEE Communications Letters, vol. 21, no. 3, pp. 624-627, 2017. otwiera się w nowej karcie
- S. Szott, "Selfish insider attacks in IEEE 802.11s wireless mesh networks," Communications Magazine, IEEE, vol. 52, pp. 227-233, 2014. otwiera się w nowej karcie
- S. Szott and J. Konorski, "Traffic remapping attacks in ad hoc net- works," IEEE Communications Magazine, 2017, to appear. otwiera się w nowej karcie
- T.-H. Ho, "Finite automata play repeated Prisoner's Dilemma with information processing costs," Journal of Economic Dynamics and Control, vol. 20, no. 1, pp. 173-207, 1996. otwiera się w nowej karcie
- S. Szott, M. Natkaniec, and A. R. Pach, "An IEEE 802.11 EDCA model with support for analysing networks with misbehaving nodes," EURASIP Journal on Wireless Communications and Networking, vol. 2010, p. 71, 2010. otwiera się w nowej karcie
- D. Fudenberg and D. K. Levine, The Theory of Learning in Games. MIT Press, 1998. otwiera się w nowej karcie
- E. Kalai and E. Lehrer, "Rational learning leads to Nash equilibrium," Econometrica, vol. 61, no. 5, pp. 1019-1045, 1993. otwiera się w nowej karcie
- A. Banchs, A. Garcia-Saavedra, P. Serrano, and J. Widmer, "A game- theoretic approach to distributed opportunistic scheduling," IEEE/ACM Trans. Netw., vol. 21, no. 5, pp. 1553-1566, 2013. otwiera się w nowej karcie
- Weryfikacja:
- Politechnika Gdańska
wyświetlono 89 razy