Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network - Publikacja - MOST Wiedzy

Wyszukiwarka

Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network

Abstrakt

In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper we offer a game-theoretic approach: we derive a formal model of opportunistic TRAs, define a TRA game with a heuristic rank-based payoff function, and propose a boundedly rational multistage attack strategy that both selfish and non-selfish nodes are free to use. Thus non-selfish nodes are allowed to respond in kind to selfish ones. We characterize the form of equilibrium that the multistage play reaches and verify via simulation that it often coincides with a Nash equilibrium in which harmful TRAs are curbed in the first place, whereas harmless ones need not be.

Cytowania

  • 4

    CrossRef

  • 0

    Web of Science

  • 4

    Scopus

Cytuj jako

Pełna treść

pobierz publikację
pobrano 54 razy
Wersja publikacji
Accepted albo Published Version
Licencja
Copyright (2017 IEEE)

Słowa kluczowe

Informacje szczegółowe

Kategoria:
Aktywność konferencyjna
Typ:
materiały konferencyjne indeksowane w Web of Science
Tytuł wydania:
IEEE GLOBECOM 2017 Conference Proceedings strony 1 - 7
Język:
angielski
Rok wydania:
2017
Opis bibliograficzny:
Konorski J., Szott S..: Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network, W: IEEE GLOBECOM 2017 Conference Proceedings, 2017, ,.
DOI:
Cyfrowy identyfikator dokumentu elektronicznego (otwiera się w nowej karcie) 10.1109/glocom.2017.8253959
Bibliografia: test
  1. B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, "A survey of routing attacks in mobile ad hoc networks," IEEE Wireless Communications, vol. 14, no. 5, pp. 85-91, 2007. otwiera się w nowej karcie
  2. A. Hassanzadeh, Z. Xu, R. Stoleru, G. Gu, and M. Polychronakis, "PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks," Computers & Security, vol. 62, pp. 114-132, 2016. otwiera się w nowej karcie
  3. Z. Movahedi, Z. Hosseini, F. Bayan, and G. Pujolle, "Trust-distortion resistant trust management frameworks on mobile ad hoc networks: A survey," IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1287-1309, 2016. otwiera się w nowej karcie
  4. R. Stankiewicz, P. Cholda, and A. Jajszczyk, "QoX: What is it really?" Communications Magazine, IEEE, vol. 49, pp. 148-158, 2011. otwiera się w nowej karcie
  5. J. Konorski and S. Szott, "Discouraging traffic remapping attacks in lo- cal ad hoc networks," IEEE Transactions on Wireless Communications, vol. 13, no. 7, pp. 3752-3767, 2014. otwiera się w nowej karcie
  6. M. Li and B. Prabhakaran, "MAC layer admission control and priority re-allocation for handling QoS guarantees in non-cooperative wireless LANs," Springer Mobile Networks and Applications, vol. 10, pp. 947- 959, 2005. otwiera się w nowej karcie
  7. M. Ghazvini and N. M. K. Jamshidi, "GTXOP: A game theoretic approach for QoS provisioning using transmission opportunity tuning," PLoS ONE, vol. 8, p. 8, 2013. otwiera się w nowej karcie
  8. A. C. Politis, P. Kyramaridis, and C. S. Hilas, "A MAC-centric ap- proach to detect and mitigate EDCA misbehavior attacks," Journal of Engineering Science and Technology Review, vol. 9, no. 5, pp. 93-96, 2016. otwiera się w nowej karcie
  9. J. Konorski and S. Szott, "Credibility of threats to jam anonymous traffic remapping attacks in ad hoc WLANs," IEEE Communications Letters, vol. 21, no. 3, pp. 624-627, 2017. otwiera się w nowej karcie
  10. S. Szott, "Selfish insider attacks in IEEE 802.11s wireless mesh networks," Communications Magazine, IEEE, vol. 52, pp. 227-233, 2014. otwiera się w nowej karcie
  11. S. Szott and J. Konorski, "Traffic remapping attacks in ad hoc net- works," IEEE Communications Magazine, 2017, to appear. otwiera się w nowej karcie
  12. T.-H. Ho, "Finite automata play repeated Prisoner's Dilemma with information processing costs," Journal of Economic Dynamics and Control, vol. 20, no. 1, pp. 173-207, 1996. otwiera się w nowej karcie
  13. S. Szott, M. Natkaniec, and A. R. Pach, "An IEEE 802.11 EDCA model with support for analysing networks with misbehaving nodes," EURASIP Journal on Wireless Communications and Networking, vol. 2010, p. 71, 2010. otwiera się w nowej karcie
  14. D. Fudenberg and D. K. Levine, The Theory of Learning in Games. MIT Press, 1998. otwiera się w nowej karcie
  15. E. Kalai and E. Lehrer, "Rational learning leads to Nash equilibrium," Econometrica, vol. 61, no. 5, pp. 1019-1045, 1993. otwiera się w nowej karcie
  16. A. Banchs, A. Garcia-Saavedra, P. Serrano, and J. Widmer, "A game- theoretic approach to distributed opportunistic scheduling," IEEE/ACM Trans. Netw., vol. 21, no. 5, pp. 1553-1566, 2013. otwiera się w nowej karcie
Weryfikacja:
Politechnika Gdańska

wyświetlono 89 razy

Publikacje, które mogą cię zainteresować

Meta Tagi